Acceptable Use of Technology &Technology Systems, (eResources)

Our computers email and information systems have been organized to improve communication and reduce the time and effort it takes to complete administrative activities. Your use of University supplied computers, email and information systems must always reflect that these are shared resources that have been established for the good of AUA and university community.

The guidelines below reflect the commitment you are required to make to use University supplied technology resources responsibly.

 

In making acceptable use of resources you must:

  1. Protect your system user name and password from unauthorized use.
  2. Understand that you are responsible for all activities that originate from your system account.
  3. Access only information that is your own, that is publicly available, or to which you have been given authorized access.
  4. Use only legal versions of copyrighted software in compliance with vendor license requirements.
  5. Be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connect time, disk space, printer paper, manuals, or other resources.
  6. Use resources only for authorized purposes.

In making acceptable use of resources you must NOT:

  1. Make unauthorized use of another person’s username and/or password or files.
  2. Use computer programs to decode passwords or access control information.
  3. Attempt to circumvent or subvert system or network security measures.
  4. Engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files or making unauthorized modifications to University data.
  5. Use University systems for commercial or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates.
  6. Make or use illegal copies of copyrighted materials or software, store such copies on University systems, or transmit them over University networks.
  7. Make disparaging comments about competitors or make statements, speak or write on behalf of AUA, in a news group or chat room unless you are duly authorized to do so by the University.
  8. The electronic mail system shall not be used to create, send or receive any offensive or disruptive messages. Among those which are considered offensive include: any messages which contain sexual implications, racial slurs, gender specific comments, or any comments that offensively address someone’s age, sexual orientation, religious or political beliefs, national origin or disability. Email communications should be considered official communications and should be composed in a professional business-like manner.
  9. Use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else’s name or system user name.
  10. Waste computing resources or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings.
  11. Use the University’s systems or networks for personal gain; for example, by selling access to your system user name or to University systems or networks, or by performing work for profit with University resources in a manner not authorized by the University.
  12. Access content that is pornographic in nature.
  13. Intentionally cause physical damage to a technology asset.
  14. Engage in any other activity that does not comply with the general principles presented above.

Policy for Email, Voicemail and Internet Usage

AUA’s belief is that e-mail, voicemail and Internet access, (eResources), are integral and effective tools for AUA and its employees to communicate with customers, clients, vendors, and fellow employees. eResources are provided to all AUA employees in order to facilitate their effectiveness in these manners and all other business functions.  eResources are not intended for personal use and may not be used to solicit for commercial ventures, religious or political causes, outside organizations, or any other non-job related solicitations.

AUA exercises certain methods to restrict access to computers, electronic mail, the Internet, and voice mail, in order to protect these systems against external parties or entities obtaining unauthorized access.

All employees should understand that these systems are intended for business use, and all content, obtained, created, or stored on AUA equipment is considered to be the property of AUA.  This includes, but is not limited to: computer data and information, electronic mail, voice mail, and text messaging.

Therefore, employees using AUA’s business equipment should also have NO expectation that any information stored on any AUA computer (whether contained on a computer hard drive or computer disks), telephone or mobile phone, voice mails, network computers, or in any other manner will be private.

AUA maintains the right to regularly monitor eResource related content for any reason whatsoever or for no reason at all.  As such, AUA maintains the right to inspect the contents of computers, electronic mail, voice mail, or text messaging particularly in the course of an investigation triggered by indications of unacceptable behavior, or as necessary or desired, to locate needed information.

AUA maintains and reserves the right to monitor all Internet access to any sites, and to block those sites that AUA deems to be offensive or undesirable.  In addition, employees found to be visiting sites that aren’t blocked, but are subsequently found to be offensive, are subject to review and possible disciplinary action.  Offensive sites include, but are not limited to, sites focusing on: pornography, violence, hate groups, and similarly objectionable material of no business relevance.

Sexually explicit material must not be accessed via the Internet.  The display of any kind of sexually explicit image or document on any AUA system is a violation of our policy on sexual harassment. In addition, sexually explicit material must not be archived, stored, distributed, edited or recorded using our network or computing resources.

AUA may disclose the contents of computers, voice mail, text messaging and electronic mail for any business purpose.  Notwithstanding AUA’s right to retrieve and read any electronic mail messages, such messages should be treated as confidential by other employees and accessed only by the intended recipient.

AUA maintains the right to obtain access to all electronic mail, text messaging, and voice mail messages, left on or transmitted over AUA owned systems.  As such, employees should not assume that such messages are private or confidential.  Additionally, there should be no assumption that AUA, or its designated representatives will not have a need to access and review this information.

Enforcement

The University considers any violation of acceptable use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information residing on University systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. The University maintains the right to perform occasional, unscheduled audits of all PC’s including portables to insure that the University in in compliance with all software licenses. Violators are subject to potentially disciplinary action up to and including termination of employment.

 Information Disclaimer

Individuals using computer systems owned by the University on or off premises, do so subject to applicable laws and University policies. The University disclaims any responsibility and/or warranties for information and materials residing on non-University systems or available over publicly accessible networks. Such materials do not necessarily reflect the attitudes, opinions, or values of the University, its faculty, staff, or students.

 

Any questions or comments regarding any portion of this Technology Policy should be directed to the Vice President of Administrative Services or the Vice President of Information Technology.