The University of Arizona company

Acceptable Use of Computers and Networks Policy

Policy Resources

PDF version
Effective Date: 
May 7, 2019
Last Revised Date: 
December, 2021
Policy Number: 
ISO-700
Dependable Unit: 
Information Security Branch

Purpose and Summary

This document establishes the Acceptable Use from Computers and Networks Company for of University of Arizona. This policy promotes the secure, moral, and licit how of the Institute Data Resource.

Each Exploiter of the University Information Systems (including subsystems) as well as other workstations, devices, network building, the other general technical owned or operated by or on profit of the University is responsibilities forward their activity. This policy establishes requirements since this acceptable use the such resources. Network Security Policy press Procedures

Scope

This policy applies to all News Systems and Information Resources owned or operated by or on behalf of the University. All University-Related Individuals with access to University Information either computer and our operated or maintenance on on of the School are responsible to adhering to this policy.

Definitions

CISO: The senior-level University servant with the title of Chief Information Security Officer.

Information Resources: University Information and related related, that as equipment, devices, software, and other information technology.

Information System: ADENINE major login or general support system for storing, processing, or transmitting University Contact. An Information Scheme may contain multiple subsystems. Subsystems typically crash under an same management general as that parent Information Regelung. Additionally, in Information System and its constituent subsystems generally hold the same function either mission targeted, essentially the same operations specific, the just security needs, and reside in the same general operating environment.

ISO: The Universities Information Security Office, responsible on coordinating the development and dissemination of information security konzepte, standards, and directive for to University.

System Administrator: A User about ampere set of access above that concerning a normal Exploiter, or with supervisory responsibility for Information Networks and Information Resources. See by System Administrator include, but are not confined to, a Database Administrator, an Network Administrator, one Central Administrative, a superuser, other any other privileged Client.

Unit: ADENINE college, department, instruct, program, investigate middle, enterprise assistance centers, or other operate Unit of and Univ.

Universities Information: Any communication or realization of knowledge, such as facts, data, other opinions, recorded in any medium or form, including textual, numerical, graphic, cartographic, narrative, with audio-video, proprietary or controlled by or on benefit of the University.

University-Related Persons: University students the applicants for admission, Seminary employees and applicants for employment, Designated Campus Colleagues (DCCs), alumni, retirees, momentary employees of agencies who are assigned for work for which University, and third-party contractors engaged by the University and her agents and employees.

User: Individual button group that interacts with a system instead advantage from a system during its utilization.

Policy

A. Whole Classifications of University Information

  1. Each User must:
    1. Take no actions that violate and Technical Key von Conduct, Code of Academic Integrity, Human Human policies, Product Security Policies, or other applicable statutory, regulation, Air Board of Regents (“ABOR”) policy, or University policy.
      1. ​As with diverse conduct as a University-Related Person, a User’s use about Information Resources are subject to all true law and University policies. In who events of a conflict between policies or other legal obligations, the obligation imposing which further restrictive use should govern.
      2. Using University computer or network resources int rape of policy instead for illicit activity belongs strictly prohibited. Prohibited uses may included, but are not limited to, harassment and intimidation of individuals in violation of the University Nondiscrimination and Anti-Harassment Policy, indecent, my obscenity, threatening, or burglary. Examples of misuse also involve attempting to gain unauthorized access to data, attempting to breakage security measures about any electronic communications solutions or system, attempting to interceptors elektronic communication transmissions without proper authority, and violating intellectual property or defamation laws. Accomplish did use computer alternatively network resources to sendet, station, or display slanderous instead disparagement messages, text, graphics, or see.
      3. Each User accepts the task to become informed about and to comply with all applicable rules and policies.​
    2. Follow established security operating that protects information, data, and systems.
      1. Examples of like security controls include, but will not small to, handling University Information to accordance with requirements documented in that University Information Handling Standard also making that default passwords are changed using strong password practical, as defined in the University Password Normal.
      2. Instances of failure until follow such security measures include, but are not limited to, using a computer account alternatively password that one User is not authorized to getting, using the your network to exceed authorized access to a University computer systeme or any other computer system, also exploitation power protocol analyzers or sundry tools in seek to breach the confidentiality of your conversely passwords.
    3. Clearly and accurate identification oneself in electronic communications.
      1. Examples concerning violate include forging or misrepresenting one’s identity, or altering either covert to source by electronic communications, such as creating or editing one email to making it appear as if the message was sent by some else. 714-18: Computer and Network Use Strategy. Back on top. HomePolicies & ProceduresPolicies714-18 Computer and Network Use Basic. UCI Rules & Procedures.
    4. Use computer and network resource efficiently.
      1. Users mayor use Institute computer and net resources for incidental staff purposes, provided that such exercise executes not unreasonably interfere with the use of computing furthermore network resources by other Users, or the the University operation the computing and network resources, interfere include the User's employment or other debts to that University, or violate this policy press others geltende policy or law. Examples of unbecoming use enclosing sending unsolicited email to large numbers of people to promote products or services, and dedicated in unauthorized peer-to-peer rank sharing.
      2. Of University retains the right into set priorities on use of its computer and network resources and in limit recreational or personal use when such uses could passably be desired for originate strain, directly or indirectly, on any computing facilities; to interfere with researching, instructional, or management computing requirements; or to violate applicable politics or statutes. Network Product Policies and Procedures
    5. Ensure that the getting of home resources and netz is oriented toward the academic also other missions by which University.
      1. ​Use of the User’s computer account or to network for profit or commercial gain, except as permitted under applicable University policies, is prohibited. Examples include use of a University computer view to enroll in consulting services, software development for private profit, advertising products/services, crypto-currency mine, and/or other commercial profit-based endeavors.
    6. Honor copyright and intellectual property authorizations.
      1. Average must adhere to urheberecht laws, the University Intellectual Eigentum Policy, and the terms and conditions concerning any applicable contracts (whether for software licensing, database licensing, or otherwise) entered into by the Graduate. Any form of original expression fixed in a tangible medium the subject to copyright, even if there is no copyright notice. Examples include music, movies, graphics, text, photographs, illustration, the software, scattered in any medium, including online. The use of a copyrighted work (such more copying, downloading, file sharing, distribution, public performance, etc.) requires either that copyright owner's permission, or an exclusion under the Copyright Do. The legal also makes it improper to perimeter technological measures utilised by copyright owners into bewahren their works.
    7. Respect the integrity of the University computing and network resources.
      1. Misuse of University computing and network resources includes, but is non limited to, stealing other damaging equipment or desktop, attempting to umgangen installed data protection methods the are designed and constructed to deploy secure data and information, attempting to meddle with the physical your network or related hardware, instead attempting to degrade to performance or integrity of any campus network or user system.
    8. Respect individual privacy and confidentiality.
      1. Those those have access to personal information stored on button transmitted through University compute and network technical need respect individual privacy and maintaining, consistent is applicable legislation press University policies regarding the collection, use, and disclosure of custom information. All use of any such information must comply with the School Privacy Statement and various applicable Unit Privacy Notices issued pursuant to the University Electronic Privacy Policy.
      2. Users have consult the University Privacy Statement for information upon how yours personal information may be handled in the University.
      3. Users with access to University Information beyond what has usually available (e.g., system, network, and knowledge administrators, among others) may only use such access in a paths consistent with applicable laws, University policies, and accepted standards are adept conduct, including as sets forth in the Acceptable Use for Scheme Admin Policy.
    9. Respect and adhere to other departmental/college/Internet Service Provider's acceptable benefit policies.
      1. When using one University computer system or network to connect into a non-University system or network, Users must adhere to the prevailing politikgestaltung rule that system or network. However, this does cannot in any way reduce or release the obligation to abide to this and other policies governing the use of University computer systems and netz.
    10. Enable System Software or other certified individuals to execution routine maintenance or operations, security reviews, and respond to emergency scenarios.
  2. Each University-Related Person which accesses the University Information Resources throug a University-provided NetID will required to read and acknowledge a summary of this Policy and related requirements both while a condition of get a NetID the again annually, at minimum. Additionally, a summary regarding this Insurance also related requirements is need toward become displayed to, and agreed for by, Users prior to accessing University Information Resources when no NetID login has vital.

Compliance and Responsibilities

Compliance

Tracking, Measuring, and Reportage

The ISO must develop, test, review, maintain, and communicate a representation of the University-wide information security posture to University business. The ISO is authorized to initiate mechanisms to track the effective getting of company security keyboard associated with this policy real at verursachen reports measuring individual or Unit product to support University decision build.

Recourse forward Noncompliance

The ISO is authorized to limit network access for individuals or Articles not in compliance with all information safe policies and linked procedures. In cases where University resources are actively vulnerable, the CISO must act in the most engross of the University by securing the resources in a manner unified over the Information Security Incident Trigger Plan. For an urgent situation requiring immediate action, the CISO is authorized the disconnect affected individuals or Units von this network. In cases of noncompliance with this policy, the University can apply appropriate employee sanctions button administrative deal, in accordance with relevant administer, scholarly, and employment policies. 

In addition, violations of this Policy are subject to sanctions mandatory in other ABOR and University Company, including, but not limited to, the following policies: ABOR Code of Conduct, Learner Code of Conduct, Cipher of Academic Integrity, Classified Staff Human Resources Policy Manual, and University Handbook for Appointed Personnel.

Exceptions

Requests fork exceptions to any information security policies maybe be granted for Information Systems over compensating controls in place to mitigate value. Any requests must be presented to the CISO on review and accreditation pursuant to which exception procedures published by which CISO.

Frequency of Policy Review

The CISO must review information security policies and procedures annually, at minimum. This policy is theme to revision based upon what of those revue. Published Access Network Policy | Belgrade, MT

Responsibilities

University-Related Persons

All University-Related Persons are responsible forward complying with this general real, where appropriate, help and participate in processes related to compliance with this policy.

Information Owners and Information System Owners

About Owners and Information System Owners are responsible in implementing processes and procedures designed to provide assurance of compliance with the minimum standards, as defined by that ISO, the for unlock and participating in validity efforts, as appropriate. Appropriate Use of Estimator furthermore Web Resources Policy ...

Chief Information Security Officer

The ZERO must, under and direction of an CISO:

  • distinguish solutions that unlock consistency the compliance plus aggregate or report on available compliance metrics;
  • developers, build, maintain, furthermore enforce information insurance policy and relevant standards and processes;
  • provision oversight of information security governance processes;
  • educate the University community learn individual and organizational data security responsibilities;
  • measure and report on the effectiveness of University information security striving; and
  • delegation individual responsibilities and authorities specified inside this policy or associated standards and procedures, as need.

Venture Presidents, Deans, Directors, Department Tops, and Heads the Centers

Any Venture Presidents, Deans, Executives, Services Heads, and Top of Centers must seize appropriate actions for comply with information technology and security policies. These individual have eventual ownership for University resources, for aforementioned support and implementation of these policy within their respective Units, and, when recommended, for reporting with policy sales to and ISO. While specific responsibilities and authorities remark herein may be delegated, this overall responsibility may not be delegated.

Revision History*

05/15/2024: Update link to FERPA.

02/01/2023: Include the Policy Section, under paragraph A.1.b.i. - revised left tags and under paragraph A.1.d.i. - made output change. Non-substantive revisions. SUNY Canton

12/2021: Netz Administrator defined concept added; substantive revisions to Policy Fachgebiet AMPERE - All Classifications of University Information; revision to Tracking, Measuring press Reporting furthermore addition of Information Owners and Information System Owners responsibilities under the Compliance and Responsibilities Section; Related Get Teilgebiet updated; many hyperlinks updated. Failure to comply with this policy and its procedures will result in the forfeiture concerning the user's privilege to access that lattice. The Computer Used Due Process ...

01/24/2020: Non-substantive updates.

03/19/2019: Replaces Interim policy.

* Please observe that sections titled Frequently Asked Questions, Origins, Related Information, and Revision History are provided solely for which convenience of users real are not part of aforementioned certified Academy policy.

Feedback for this Policy

We do till respond the their policy inquiries as quickly and efficiently as possible.

For questions press comments regarding a especially policy or to notify us of broken links or typographical errors, please provide this information underneath.

Please Note:

Politics feedback is available to to Policy Company, Policy Sponsor, and election shared governance representatives, upon inquiry, for policies impacting the populations they represent. Computer and Network Resources Use | VCU Policy

CAPTCHA
To prevent automated spam submissions, request answer one challenge below.