Guidelines for the acceptable use of University IT Resources

Purdue University operates and maintains IT Resources to further its mission of learning, discovery, and engagement.  It is critical that the University protects the integrity, security and functionality of its IT Resources; ensures compliance with University policies; safeguards the property, rights, and data of third parties; and complies with all applicable laws.  Any individual who uses University IT Resources consents to all of the provisions of University policies, regulations, procedures and rules, and with applicable local, state, and federal laws and regulations. 

Common sense and mutual respect for other users underlie all of the rights, privileges, and responsibilities of IT Resource users.  Users of Purdue University IT Resources are expected to abide by the following guidelines:

  • Comply with all applicable local, state, and federal laws and regulations.
  • Comply with all Purdue University policies, regulations, procedures, and rules.
  • Respect the intellectual property rights of others.  Making unauthorized copies of licensed software or copyrighted material is prohibited.
  • Refrain from sharing passwords or accounts with anyone, including trusted friends and family members, and change passwords on a regular basis in accordance with University policy.
  • Practice the same level of etiquette in all communications using University IT Resources as would be expected in non-electronic communication.
  • Only access files or data that belong to you, are required for normal duties, are publicly available, or have been given express permission by the owner.
  • Realize that all records created, received, or maintained on University IT Resources are discoverable by law including email and instant messages, files, and other data.

IT services reserve the right to monitor the usage of all network resources to ensure functionality and efficiency, resolve security problems and maintain reliable services.

Prohibited uses of Purdue IT Resources include the following:

  • Circumvention of any security measure of Purdue University.
  • Intentional use, distribution, or creation of viruses, worms, or other malicious software.
  • Operating a business, usurping business opportunities, organized political activity, or conducting activity for personal gain.
  • Excessive use of University IT Resources, including, without limitation, resources such as bandwidth, lab computers, and paper.
  • Implying the user is representing, giving opinions, or otherwise making statements on behalf of the University without prior authorization.
  • Unauthorized sharing of copyrighted material.
  • Visiting harmful, malicious, or illegal web sites.

 

University Policies:

IT Resources Policies
Data Securit
y

 

World Wide Web

 

Electronic Mail

 

Acceptable Use

 

Social Security Numbers

updated: 5/08/08

Purdue University Biological Sciences, 915 W. State Street, West Lafayette, IN 47907

Main Office: (765) 494-4408   Business Office: (765) 494-4764  Contact Us

© 2015 Purdue University | An equal access/equal opportunity university | Copyright Complaints

Trouble with this page? Disability-related accessibility issue? Please contact the College of Science Webmaster.

Maintained by Science IT