Appropriate Use Policy for IT Resources

John Patrick University of Health and Applied Sciences provides an information technology (IT) environment that includes access to an online campus with secure username/password access for faculty, staff, and students, computing services, wireless internet, treatment planning software, remote access to treatment planning software on campus, online databases, and other course resources.  These resources (“IT resources” or “resources”) are intended to support the operations of the University.

APPLICABILITY
This policy applies to all individuals using IT resources regardless of whether they are accessed from the campus or from remote locations.

APPROPRIATE USE
IT resources are provided for University-related purposes including support for instruction, research, administrative functions, and student use for the purpose of facilitating the successful completion of coursework.  Use of the resources should be limited to these purposes, including incidental personal use.

Incidental personal use must not interfere with the intended use of the IT resources or include any illegal activity.  Incidental personal use by staff members must not interfere with the fulfillment of job responsibilities or disrupt the work environment.

USER RESPONSIBILITIES
Users are responsible for being aware of any University policies or regulations that govern the use of IT resources.  Users must comply with all federal and state laws and University policies.

Users may not engage in unauthorized use of resources, regardless of whether the resource is protected against unauthorized use.

Users may not use resources to engage in partisan political activities that suggest University endorsement or support.

Users are expected to respect the privacy of other users, even if the devices and systems by which other users access IT resources are not securely protected.

Unauthorized use by a User of another User’s personal identity or login credentials is prohibited.

Users may not use any IT resource in a manner which interferes unreasonably with the activities of the University or other Users. 

IT resources may not be used to fund raise, advertise, solicit, or operate a business for commercial purposes without approval from the University in advance.

Pornography and sexually explicit content is prohibited unless such use is for a scholarly or medical purpose.  Users may not use IT resources to store, display, or disseminate pornographic or sexually explicit content.  

Users are expected to engage in safe computing practices such as setting appropriate restrictions on accounts, setting strong passwords, and keeping passwords secure.

ENFORCEMENT
Use of IT resources is a privilege and not a right.  User’s access to IT resources may be suspended or terminated if the user violates this policy.

Users who violate this policy, other University policies, or external laws may be subject to disciplinary action.  The University may report certain uses of IT resources to law enforcement agencies, if applicable.

Users who have been suspended or removed from access to IT resources may appeal the decision by following the Grievance Policy process outlined in the Academic Catalog.

SECURITY
The University may, without further notice to Users, take any action it deems necessary to protect the interests of the University and to maintain the stability, security, and operational effectiveness of IT resources.  This may include, but is not limited to, scanning stored data, network traffic, usage patterns, and other uses of IT resources.

PRIVACY
Responsible parties of the IT environment will perform management tasks in a manner that is respectful to individual Users.  This includes, but is not limited to, monitoring and routine system maintenance including the backup of data, monitoring of general use patterns, and other usage activities.

The University may use security tools and network and systems monitoring hardware and software without notice.

The University may be compelled to disclose the electronic records of Users in response to various legal requirements such as subpoenas, court orders, discovery requests for the purpose of litigation, and search warrants.  Request for public records may be granted providing they fall within rights established by the Freedom of Information Act.

The University may disclose the results of any general or individual monitoring or inspection of any User’s records to the appropriate University authority or law enforcement agency.  The University may use such records during disciplinary proceedings.

Upon receiving written approval from the President of the University, the University may access or permit access to the contents of communications or electronically stored information:

  • When required by law.
  • If the University determines that access to the information in a specific User’s account is essential to the operational needs of the University and the employee is unavailable or unwilling to provide access to the information.
  • If the University receives a written request for access to information from an immediate family member or the lawful representative of a deceased or incapacitated User.
  • If personally identifiable information about Users must be disclosed without their consent to protect the health and well-being of students, employees, or other persons in emergency situations, to prevent imminent loss or damage, or to prosecute or defend its legal actions and rights.