The purpose of this policy is to make Users of University Information Technology (IT) Resources aware of their privileges and responsibilities. These resources are provided with a primary purpose of supporting the education, instruction, research, and administration activities of the University. Users of these resources may have access to valuable resources and sensitive information. Therefore, it is imperative that Users act in a responsible, ethical, and legal manner.
This policy applies to and governs:
The IT Resources in use at Drake University are designed to support the University’s mission and operations, and the use of these resources is a privilege extended to faculty, staff, students, guests, vendors, and other members of the University community. Users are expected to demonstrate sound judgment and professionalism when using or interacting with University IT Resources and to recognize and act in accordance with the understanding that University IT Resources are provided in order to support Drake’s mission and conduct its business. Users are also expected to treat the protection and confidentiality of University information and data as essential responsibilities when using University IT Resources.
Users of these resources may have access to, and interact with, extensive services and sensitive information. This information, including email messages, electronic communications, and electronic files and documents, which are created, accessed, transmitted, or stored using University IT Resources are considered to be University Information, and are subject to review by authorized University representatives, disclosure to law enforcement or other third parties through subpoena or other proceedings.
Information stored on or transmitted through University IT Resources may be preserved for an extended period, including after a User’s affiliation with the University ends. The University has the legal right to log, access, and review all information stored on, or transmitted through IT Resources.
While the University employs measures to protect IT Resources, Users should be aware that the University cannot guarantee absolute security. Users must take steps to safeguard accounts and information in accordance with University policy and best practices.
The University may suspend, disable, or terminate access privileges for any User or device found or suspected to be violating this or other University policies, threatening or harassing others, threatening or harming IT resources or University information, degrading performance of IT resources, or violating contractual obligations or applicable law.
All Users of University IT Resources must abide by the following responsibilities.
The following activities are provided as examples of prohibited behavior as outlined by this policy. Examples are illustrative and do not represent an exhaustive list of scenarios governed by this policy.
By using or attempting to use University information technology resources, Users agree to abide by this policy and all related University policies and procedures, as well as applicable local, state, and federal laws.
Violations of this policy can range in seriousness from accidental to illegal. Where acceptable use comes into question, the University reserves the right to determine what is appropriate and acceptable and what is not. The University may also take action unilaterally and without consultation. When requested, Users must cease any activity deemed in violation of this policy. Failure to comply may result in revocation of User account credentials or other action, up to and including dismissal from employment or the university, depending on the nature and severity of the offense. Some violations may also be subject to civil or criminal action.
User – An individual who connects, accesses, logs into, or traverses a University system or network; or attempts to connect, access, log into, or traverse a University system or network. Therefore, a User includes faculty, staff, students, visitors, vendors, and other authorized and unauthorized entities.
Information Technology (IT) Resources – Facilities, technologies, and information resources used for University information processing, transfer, storage, and communications. This includes computer labs, classroom technologies, computing and electronic communications devices and services, email, networks, mobile devices, voicemail, fax transmissions, video, multimedia, and instructional materials. This also includes services that are University-owned, leased, operated or provided by the University or otherwise connected to University resources, such as cloud and Software-as-a-Service (SaaS), or any other connected/hosted services provided.
University information – Information created, accessed, transmitted, or stored in the course of conducting University business and academic activities. This includes information produced by the extended University community when executing work on behalf of the University, including course information, student work, grades, academic outcomes, research, and information about University strategy, operations, and intellectual property. University information does not include, for the purposes of this policy, information that a member of the University community owns or has rights to, or information housed in the public domain.
Cloud Service – A product offered by a third-party company consisting of on-demand, shared internet-based platforms, infrastructure, applications, or storage services. Third-party cloud services are not approved IT resources by default. The University may enter into contract with a third party offering a cloud service, at that point the Cloud Service would be considered an approved IT resource.
Excessive Personal Use – University IT Resources may be used for personal purposes, but should not be associated with political activity, result in the disclosure of Confidential information, impact productivity, or promote illegal or unethical behavior. Remember that University IT Resources are not private and may be subject to subpoena and their use disclosed by court order. See Human Resources Policy Use of Communications Tools for more information.
Unauthorized Network Devices – Devices or tools that subvert or bypass the security of the University network, or cause interference with normal network and security operations. Examples include a router or access point, which may allow unauthorized devices to connect to the University network and interfere with existing wireless infrastructure.
Appropriately-secured Personal Devices – Computers and mobile devices with security equivalent to the sensitivity of University information stored on them. For mobile devices on which Confidential information may be accessed or stored, this includes device encryption, a PIN or password, deleting information when no longer needed, and limiting features which allow insecure connections. See Information & Technology Policy Information Security for more information.
Information Technology Services policies:
Security of IT Devices;
Authentication to IT Resources;