- Home »
- Acceptable Use of Computing and Electronic Resources Policy
Acceptable Use of Computing and Electronic Resources
The University of North Carolina at Greensboro
- (Formerly Computer Use Policy for University Employees and Computer Use Policy for University Students;
Approved by the Chancellor, May 13, 1998)
- (Approved by the Chancellor, July 19, 2004)
- (Approved by the Chancellor, March 10, 2009)
- (Approved by the Chancellor, May 15, 2010)
- (Approved by the Chancellor, July 16, 2012)
The purpose of this policy is to outline the acceptable use of information systems and information systems infrastructure owned or provided by The University of North Carolina at Greensboro (hereinafter "the University") or which contain University information assets, or which utilize the information system infrastructure maintained by the University.
This policy applies to all users of information systems owned or provided by the University.
This policy applies to all users of information systems which contain University information assets.
This policy applies to all users of systems which utilize the University information system infrastructure, even if the systems are not University property.
Individuals subject to this policy are responsible for exercising good judgment regarding the use of technology and information systems. Use of these systems is permitted, with the following restrictions and conditions:
- The use is lawful and not prohibited by University of North Carolina Board of Governors or University policies, including rules regarding academic integrity, harassment, discrimination, copyright, trademark, and rules prohibiting use of State property for private gain or to advocate for or against a candidate or issue in an election.
- The use does not violate administrative controls or contractual agreements such as terms-of-use that the University and/or user is subject to.
- The use does not negatively impact other information systems or information system infrastructure.
- The use does not circumvent administrative controls or in any way attempt to gain or provide unauthorized access to information systems or data.
- No user shall send unsolicited mass communications without proper authorization from the manager with jurisdiction over the population to be reached. This includes the sending of "spam" (junk e-mail) or other commercial advertising material to individuals.
- Although reasonable and limited personal use is not prohibited by this policy, such use must not violate policies or interfere with an employee's job performance or activities which directly support the University mission, and unit managers have discretion to further restrict or forbid personal use as they reasonably deem necessary.
- All use of University information systems must be identified as to the individual or device using the system. Obfuscation or misrepresentation of identity (e.g. shared credentials, spoofed communications, etc.) for any purpose, including the access and use of information systems, is prohibited.
- Information Technology Services (hereinafter "ITS") is charged with providing the information system infrastructure of the University. The infrastructure may not be extended or otherwise modified without the oversight and approval of ITS.
- Individual units and departments may enforce additional administrative controls concerning use, as long as such controls are in accordance with this and other University policies and are within the scope of their assigned areas of oversight.
- Other Conditions of Use:
- By activating one's University computer account, one agrees to receive via email University security breach notifications covered by the N.C. Identity Theft Protection Act and other official University communication.
- All data created or received for work purposes are public records. Public Records are available to the public upon request, unless subject to an exception in the Public Records Act or protected by another law. All public records are to be maintained and disposed of according to state approved records retention and disposition schedules. See http://www.ncga.state.nc.us/gascripts/Statutes/StatutesTOC.pl?Chapter=0132.
- No University employee, student or any other user shall have any expectation of privacy in the material or information sent or received using any portion of the University information system infrastructure, information systems, or systems containing University information assets. For security, legal, investigative, policy compliance, quality of service, and infrastructure maintenance purposes, authorized employees within ITS, and those University employees outside ITS with responsibilities necessitating access, may monitor information system and infrastructure activity and/or content, in the course of discharging their duties.
ITS, in cooperation with other University authorities and administrators, will enforce this policy, and establish standards, procedures, and protocols in support of the policy.
Any violation of this policy by a University student is subject to the Student Code of Conduct in the student handbook. For employees, any violation of this policy is "misconduct" under EPA policies (faculty and EPA non-faculty) and "unacceptable personal conduct" under SPA policies, including any appeal rights stated therein. Violations of law may also be referred for criminal or civil prosecution. Additionally, violations of this policy may result in termination or suspension of access, in whole or in part, to University information systems at the discretion of ITS where such action is reasonable to protect the University or the University information infrastructure.
The Chancellor has approved the Acceptable Use of Computing and Electronic Resources Policy and ITS will periodically review the policy as appropriate.
Links to Related University Policies
Information System - a set of programs on an electronic device that process or store data for the use of an individual or organization, and the hardware on which the programs operate. (Common examples include accounting software, database systems, servers, workstations, smart phones, etc.)
Information System Infrastructure - the physical and software systems necessary for the support and operation of information systems. (Common examples include authentication services, networking services, power backup services, etc.)
Administrative control - protecting a system through policy, procedure, training, directives from an authority, or similar efforts which instruct and require individuals to take correct actions
Comments or questions? Email the Policy Administrator.