The following links contain important background information related to Acceptable Use of Information Technology Resources at IUP:
What is an “Acceptable Use of Information Technology Resources Policy,” and why does IUP need one?
Information Technology (IT) resources are intended to support the university’s instructional, research, and administrative operations. The objective of the Acceptable Use of Information Technology Resources Policy (AUP) is to create a framework to ensure that IT resources are used in an appropriate fashion and support the university’s mission and institutional goals. In addition to legal requirements surrounding computing—such as compliance with those regulating copyright—IUP must create additional requirements upon its user community so its computer network and university-owned computer equipment function in an efficient, cost-effective manner in support of the university’s mission as well as within requirements of the Pennsylvania State System of Higher Education (PASSHE). The Acceptable Use Policy (AUP) is intended to address these additional requirements.
I understand that I must abide by the law when using the IUP computer network and university-owned IT equipment. As long as I do this, am I automatically in compliance with IUP’s AUP?
No. See the AUP’s Responsibilities of Users of IT Resources section for details.
What are considered to be “unacceptable” uses of IUP IT resources in addition to those uses that are illegal?
A variety of activities would violate the AUP. See the AUP’s Prohibited Uses of IT Resources section for details.
I am a student that uses the Internet for social networking, gaming, and downloading movies and music. Are these considered acceptable?
Yes—to the extent that the usage complies with the AUP (all legal requirements observed and all AUP compliances met).
What happens if I am charged with violating the Acceptable Use Policy?
Specifics can be found in the AUP’s Procedures section.
I am interested in learning more about illegal computer activities, such as those related to copyright infringement. Where can I learn more?
There are numerous websites with important information. The following links are just some of these:
I am a university employee and would like to use the Internet for personal use over lunch, during my break time, or during off hours. Is this permissible?
Strictly from the AUP perspective, this is permissible to the extent that the usage complies with the AUP (all legal requirements observed and all AUP compliances met). Employment restrictions could exist that are outside the scope of the AUP.
What is considered to be confidential communication via e-mail?
E-mail contents should always be considered “public” because the sender does not know who the receiver will forward the e-mail to. Thus, while IUP does have an E-Mail as an Official Means of Communication Policy designed to reduce paper and delivery costs, this policy never requires that sensitive and/or confidential information be transmitted via e-mail, and users should be extremely cautious in using this medium for that purpose.
How can I interfere with the normal operation and proper IT function?
IUP deploys a variety of restrictions in order to protect network integrity for all users. For example, IUP controls wireless bandwidth within the university setting so that non-university traffic does not interfere with IUP wireless users. IUP also prohibits the connecting of devices to the network that could compromise the monitoring of the entire network.
How does IUP define a “user” of the IUP computer network?
Anyone using an information technology-related resource that is owned and/or operated by the university is considered to be a user of the network. See the Definitions portion of the AUP for more details.
I am a faculty member with a business related to my academic discipline. Is use of the IUP network for my business an acceptable use of the network?
Strictly from the AUP perspective, this is permissible to the extent that the usage complies with the AUP (all legal requirements observed and all AUP compliances met). Restrictions could exist from other agreements or requirements outside the scope of the AUP.
IUP encourages civic engagement among students and faculty. May students, faculty, and staff use the IUP computing network to engage in civic activities?
May the university monitor my use of the IUP computing network?
While the university recognizes the role of privacy in institutions of higher learning and will endeavor to honor that ideal, there is no expectation of privacy of information stored on or sent through PASSHE/university-owned IT resources, except as required by law.
Who is responsible for providing security for my Internet-connected devices on the IUP network?
The user and their actions are at the core of security practices. See the Responsibilities of Users of IT Resources section in the AUP for details.
What happens to my use of the system if my computer becomes infected with a virus?
No explicit action is taken by the university. If, however, the virus subsequently results in activity that in some manner violates the AUP, it is possible IUP may take steps to disable connections to the network by that individual and/or machine until the situation is resolved.
If a user uses too much of the system, can the user be disconnected from the system?
The university is obligated to maintain the integrity of its IT resources, and therefore reserves the right to disable access when the integrity is jeopardized by an individual user’s excessive bandwidth usage.
If so, how would I know when I'm using too much of the system?
Only extreme situations would typically result in a user having their access disabled due to excessive use, though the university retains the right to adjust these measures as the situation warrants. In a shared user community such as IUP’s, a number of factors would determine if the usage was considered excessive for the given situation—such as the demands of other users at the time.
May I use the system to help me find my lost pet or to sell my house?
Strictly from the AUP perspective, this is permissible to the extent that the usage complies with the AUP (all legal requirements observed and all AUP compliances met). Restrictions could exist from other agreements or requirements outside the scope of the AUP. However, members of the IUP community are strongly encouraged to utilize website-centric avenues such as IUP Daily and/or the Beak to communicate this type of information.
Fraud, Waste, and Abuse Hotline
© 2007-2015 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100