Resources
Guidelines for the acceptable use of University IT Resources.
Purdue University operates and maintains IT Resources to further its mission of learning, discovery, and engagement. It is critical that the University protects the integrity, security and functionality of its IT Resources; ensures compliance with University policies; safeguards the property, rights, and data of third parties; and complies with all applicable laws. Any individual who uses University IT Resources consents to all of the provisions of University policies, regulations, procedures and rules, and with applicable local, state, and federal laws and regulations.
Common sense and mutual respect for other users underlie all of the rights, privileges, and responsibilities of IT Resource users. Users of Purdue University IT Resources are expected to abide by the following guidelines:
- Comply with all applicable local, state, and federal laws and regulations.
- Comply with all Purdue University policies, regulations, procedures, and rules.
- Respect the intellectual property rights of others. Making unauthorized copies of licensed software or copyrighted material is prohibited.
- Refrain from sharing passwords or accounts with anyone, including trusted friends and family members, and change passwords on a regular basis in accordance with University policy.
- Practice the same level of etiquette in all communications using University IT Resources as would be expected in non-electronic communication.
- Only access files or data that belong to you, are required for normal duties, are publicly available, or have been given express permission by the owner.
- Realize that all records created, received, or maintained on University IT Resources are discoverable by law including email and instant messages, files, and other data.
IT services reserve the right to monitor the usage of all network resources to ensure functionality and efficiency, resolve security problems and maintain reliable services.
Prohibited uses of Purdue IT Resources include the following:
- Circumvention of any security measure of Purdue University.
- Intentional use, distribution, or creation of viruses, worms, or other malicious software.
- Operating a business, usurping business opportunities, organized political activity, or conducting activity for personal gain.
- Excessive use of University IT Resources, including, without limitation, resources such as bandwidth, lab computers, and paper.
- Implying the user is representing, giving opinions, or otherwise making statements on behalf of the University without prior authorization.
- Unauthorized sharing of copyrighted material.
- Visiting harmful, malicious, or illegal web sites.
IT Resources Policies
Data Security
- Authentication and Authorization (V.1.2)
- Data Security and Access Policy (C-34)
- Delegation of Administrative Authority and Responsibility For Information Assurance, Security and Awareness (V.1.1)
- HIPAA Covered System and Application Logging (V.1.7) Interim
- Incident Response (V.1.4)
- Privacy for Electronic Information (V.1.3)
- Proper Disposal of Electronic Media (V.1.5) Interim
- Remote Access to IT Resources (V.1.6) Interim
World Wide Web
Electronic Mail
Acceptable Use
Social Security Numbers
Download pdfupdated: 5/08/08