Policy: Fair, Responsible and Acceptable Computer Use
Dept. Responsible: Information Technology
Effective Date: March 1, 2010
Revised Date: December 20, 2009
Information technology is a powerful tool in advancing the mission of the University. Common sense and mutual respect underlie all rights, privileges and responsibilities of those who utilize these technologies. It is the intent of the University that the community shares these resources in creative and exciting ways in advancing our goals. Inappropriate use can result in the loss of the privilege of accessing Butler Systems or data. It can also lead to disciplinary action, potential termination or legal action. The purpose of this policy is to outline what constitutes fair and acceptable use of computer technologies at Butler University.
This policy applies to all users of Butler University’s computer and voice systems (hereafter referred to as “Butler Systems”): This includes all computer systems, Butler provided devices, data storage, related communication technologies, and information transmitted or maintained on these technologies.
- Fair & appropriate use:
- Supporting the mission of the University, teaching/learning, creative activities, or engaging the community
- Supporting studies, instruction, duties as employees, official University business, and University sanctioned activities
- Faculty & Staff: incidental personal use
- All users must:
- Comply with all state, federal, and local laws;
- Comply with all University policies;
- Comply with IT standards regarding usage of network and technological resources
- Respect intellectual property rights of others;
- Protect files and system access from use by others;
- Practice etiquette in communication;
- Utilize systems via only your Butler assigned computer account and I.D.; and
- Access only files or systems that are yours, public, or that the account holder has given you permission to access
- Inappropriate use:
- Operating a personal business (except as part of a class sponsored activity).
- Serving as primary computer system for outside organization, except:
- where Butler has official affiliate relationship; or
- where approval has been granted from college/division leadership and Information Technology and applicable accounts obtained in advance.
- Using resources excessively, e.g., utilizing resources notably beyond the norm for the person’s role on campus.
- Circumventing security measures at Butler or on other networks.
- Impersonating others.
The oversight of this policy is the responsibility of the CIO, and should be reviewed annually.
- Computer Use Master Policy
- Privacy of Personally Created Content
- Employee Code of Responsibility for Security & Confidentiality of Information
- Identity Theft Information – Storage, Disposal, Breach & Red Flags
- Federal HIPAA (Health Insurance Portability and Accountability Act)
- Federal FERPA (Family Educational Rights and Privacy Act); see Student Handbook
Approved by the Board of Trustees: February 26, 2010
Approved by Sr. Administrative Group: January 19, 2010
Approved by the Information Management Council: December 20, 2009
Created 12/20/2009 as complete rewrite from Computer Use Policy, June 2002