Topics Map > IT Help Desk

Acceptable Use Policy

This policy covers authorized users who access information technology (IT) resources under the control of the Morgridge Institute for Research including but not limited to: employees, student employees, partners, authorized contractors, vendors, and guests; and other authorized users as determined by Morgridge.

Access to Morgridge Institute for Research information technology (IT) resources(i) is essential to the mission of the Morgridge Institute for Research to create, integrate, transfer and apply knowledge. Use of IT resources must be consistent with the Institute’s mission and with its role as a public agency. Access to Morgridge Institute IT resources is a privilege granted to members of the Institutes for Discovery which carries with it the responsibility to use Morgridge IT resources for Institutes for Discovery-related activities, exercising common sense and civility.

  1. Login and Other Authorizations
    Authorization for use of IT resources is provided to everyone for his or her own use. No user may use an authorization which belongs to someone else. In many cases the Morgridge Institute for Research has obtained access to these resources exclusively for the use of members of the Institutes for Discovery.
  2. Securing Credentials
    Users must protect the confidentiality of their personal identification codes and passwords and are expected to exercise reasonable care to ensure that their accounts are not used by others.
  3. Unauthorized Access
    Users may not obtain or use—or attempt to obtain or use:
    • Passwords, IP addresses or other network codes that have not been assigned to them or
    • Unauthorized access to computer accounts, software, files, or any other IT resources.
  4. Intellectual Property
    Illegal downloading, distribution, copying of materials or other activities that violate intellectual property laws, including copyright, are strictly prohibited.
  5. Malicious Activity
    Users may not interfere with another person or entity’s authorized access to IT resources. They may not alter, disrupt or damage Morgridge IT resources in any way or use those resources to alter, disrupt, or damage IT resources of another person or entity. 
  6. Impersonation and Anonymity
    Users of Morgridge IT resources may not forge identities or send anonymous messages unless the recipient has agreed to receive anonymous messages.
  7. Respect and Protect Privacy and Be Civil
    Users of Morgridge IT resources are expected to protect others’ privacy. They may not use Morgridge IT resources to stalk, harass, threaten, or otherwise cause harm to another individual or entity, or to the activities of others.
  8. De Minimis Usage
    In the interest of making the use of IT resources a natural part of day-to-day work, incidental personal use is tolerated. However, one should use non-Morgridge sources of email, Internet access, and other IT services for activities of an extensive nature that are not related to university purposes.
  9. Managing IT Resources
    Users who are Morgridge employees must responsibly manage the IT resources in their care, including hardware, software, and digital information and records.
  10. State and Federal Laws
    Users may not use Morgridge IT resources in a manner that violates state or federal laws.

Enforcement

Violation of Morgridge rules governing responsible use of IT resources may result in loss of access privileges, Morgridge disciplinary action and/or criminal prosecution.



Keywordsacceptable use policy internet network   Doc ID135118
OwnerSpencer K.GroupDiscoverIT
Created2024-01-30 10:50:19Updated2024-01-30 10:51:54
SitesDiscovery Building IT
Feedback  0   0