Guidelines for the acceptable use of University IT Resources
Purdue University operates and maintains IT Resources to further its mission of learning, discovery, and engagement. It is critical that the University protects the integrity, security and functionality of its IT Resources; ensures compliance with University policies; safeguards the property, rights, and data of third parties; and complies with all applicable laws. Any individual who uses University IT Resources consents to all of the provisions of University policies, regulations, procedures and rules, and with applicable local, state, and federal laws and regulations.
Common sense and mutual respect for other users underlie all of the rights, privileges, and responsibilities of IT Resource users. Users of Purdue University IT Resources are expected to abide by the following guidelines:
- Comply with all applicable local, state, and federal laws and regulations.
- Comply with all Purdue University policies, regulations, procedures, and rules.
- Respect the intellectual property rights of others. Making unauthorized copies of licensed software or copyrighted material is prohibited.
- Refrain from sharing passwords or accounts with anyone, including trusted friends and family members, and change passwords on a regular basis in accordance with University policy.
- Practice the same level of etiquette in all communications using University IT Resources as would be expected in non-electronic communication.
- Only access files or data that belong to you, are required for normal duties, are publicly available, or have been given express permission by the owner.
- Realize that all records created, received, or maintained on University IT Resources are discoverable by law including email and instant messages, files, and other data.
IT services reserve the right to monitor the usage of all network resources to ensure functionality and efficiency, resolve security problems and maintain reliable services.
Prohibited uses of Purdue IT Resources include the following:
- Circumvention of any security measure of Purdue University.
- Intentional use, distribution, or creation of viruses, worms, or other malicious software.
- Operating a business, usurping business opportunities, organized political activity, or conducting activity for personal gain.
- Excessive use of University IT Resources, including, without limitation, resources such as bandwidth, lab computers, and paper.
- Implying the user is representing, giving opinions, or otherwise making statements on behalf of the University without prior authorization.
- Unauthorized sharing of copyrighted material.
- Visiting harmful, malicious, or illegal web sites.
University Policies
IT Resources Policies
Data Security
- Authentication and Authorization (V.II.B.1)
- Data Security and Access Policy (C-34)
- This policy is superseded by the policy on Information Security and Privacy (VII.B.8).
- Delegation of Administrative Authority and Responsibility For Information Assurance, Security and Awareness (V.1.1)
- This policy is superseded by the policy on Information Security and Privacy (VII.B.8).
- HIPAA Covered System and Application Logging (V.1.7) Interim
- Significant revisions have been made to update this policy from its original interim version. It is now called IT Resource Logging (VII.B.5)
- Incident Response (VII.B.3)
- Privacy for Electronic Information (VII.B.2)
- Consolidated and superseded by Acceptable Use of IT Resources and Information Assets (VII.A.4)
- Proper Disposal of Electronic Media (V.1.5) Interim - Policy has been withdrawn
- Remote Access to IT Resources (VII.B.4)
World Wide Web
Electronic Mail
- Electronic Mail (S-7)
- Policy on Sending Campus-wide Electronic Mail (V.3.2) - Policy has been withdrawn
Acceptable Use
- IT Resource Acceptable Use Policy (VII.A.2)
- Consolidated and superseded by Acceptable Use of IT Resources and Information Assets (VII.A.4)
- Electronic Devices and Services Policy (VII.A.3)
Social Security Numbers
updated: 11/01/17