Acceptable Use of Information Technologies
The University provides information technology resources, such as computing and networking, to the University community. It is the user's responsibility to properly use and protect those information technology resources, as well as comply with all University policies, state and federal laws, regulations, and contractual obligations.
Use of information technology resources owned or operated by the University imposes certain responsibilities and obligations. The University considers use of information technology resources to be a privilege that is granted on the condition that each member of the University community respects the integrity of information technology resources and the rights of other users.
Use of University information technology resources in a manner that violates the provisions set forth in this policy can lead to revocation of all access privileges as well as other disciplinary action, up to and including dismissal from the University.
Reason for Policy
This policy is designed to establish the acceptable and appropriate use of all information technology resources that support University business and its mission of education, research and service. Other uses are secondary.
Related Policy Information
Use of Resources
The University's information technology resources may not be used for unlawful or malicious purposes. For example, individuals may not:
- Attempt to damage or to degrade the performance of the University's information technology resources.
- Disclose his/her passwords to others.
- Unlawfully transmit or receive copyrighted material.
Please see the Appendix, Standards for the Acceptable Use of Information Technology Resources for further examples of behaviors and actions that violate this policy.
Expectation of Privacy
The University's Chief Information Officer (CIO) delegates responsibilities to authorized individuals to monitor users' data, programs, or any other activities to:
- perform routine maintenance,
- prevent damage to systems,
- ensure security, confidentiality, availability, and integrity of data and resources,
- ensure compliance with University policies, procedures, rules, or regulations as well as state and federal rules, regulations and laws, or
- as requested by authorized individuals.
Users of Michigan Tech's information technology resources are hereby notified that they should have no expectation of privacy in connection with the use of information technology resources beyond the provisions of this policy.