Information Technology Use Rules

(Refer to for URPs regarding Information Technology and Related Topics.)

Access to the information resource infrastructure both within the University and beyond the campus, sharing information, and security of the intellectual products of the academic community, all require that each and every user accept responsibility to protect the rights of other users. Any member of the University community who, without authorization, accesses, uses, destroys, alters, dismantles or disfigures the University information resources, properties or facilities, including those owned by third parties, thereby threatens the atmosphere of increased access and sharing of information, threatens the security within which members of the community may create intellectual products, and maintains records and engages in unethical and unacceptable conduct. Access to the information technology systems at the University is provided as a privilege and must be treated as such by all users of these systems. Members of the University community should strive for the most responsible use of the institution’s resources. Users accept the responsibility to: 1) respect the legal protection provided by copyright and licensing of programs and date; 2) respect the privacy and rights of other users; and 3) respect the intended usage of resources.

Information resources in this statement are meant to include any information in electronic or audiovisual format or any hardware or software that make possible the storage and use of such information (i.e., electronic mail, local databases, externally accessed databases, CDROM, motion picture film, recorded magnetic media, photographs, digitized information, voice mail, faxes). For more information go to


Article ID: 24762
Mon 2/13/17 7:38 AM
Mon 8/24/20 1:54 PM