
Policy on Use of Princeton University Information Technology 2013-2014 Edition TABLE OF CONTENTS Policy Statement………………………………………………………………………………………………………………………..1 Introduction to Policy on Use of Princeton University IT ............................................................... 1 Reasons for this Policy ........................................................................................................... 1 Examples ................................................................................................................................ 2 Who must comply? What penalties pertain? ................................................................................ 2 Compliance ............................................................................................................................ 2 Penalties ................................................................................................................................. 3 Appropriate use of Princeton University IT resources .................................................................... 3 Business use ........................................................................................................................... 3 Personal use ........................................................................................................................... 4 University access; your right to privacy .......................................................................................... 4 The University’s right to access files ...................................................................................... 4 Degrees of privacy ................................................................................................................. 5 Others’ files ............................................................................................................................ 5 Disclosure ............................................................................................................................... 6 Managing electronic information (including e-mail) ...................................................................... 6 Retention and disposal .......................................................................................................... 6 Official e-mail ......................................................................................................................... 7 Outside e-mail ........................................................................................................................ 7 Protecting data....................................................................................................................... 8 Protecting the University’s good name ........................................................................................ 10 Good judgment .................................................................................................................... 10 Use of the University’s name ............................................................................................... 10 Directory use ........................................................................................................................ 11 Enabling others .................................................................................................................... 11 Civility and respect for others ....................................................................................................... 11 Civil behavior ........................................................................................................................ 11 Harassment and defamation ............................................................................................... 12 Use of technology for commerce or solicitation .......................................................................... 12 Commerce ............................................................................................................................ 12 Solicitation ........................................................................................................................... 13 Commercial links .................................................................................................................. 13 Use of technology for political activity ......................................................................................... 13 Political campaigns............................................................................................................... 13 Other political activity .......................................................................................................... 14 Your responsibility for network and information security ........................................................... 14 Protecting accounts ............................................................................................................. 14 Allowing access to others .................................................................................................... 15 i Securing Web-based applications ........................................................................................ 15 Discovering gaps in security ................................................................................................. 15 Your responsibility regarding shared IT resources ....................................................................... 16 Appropriate use of shared resources .................................................................................. 16 Library resources .................................................................................................................. 17 Collaborative projects .......................................................................................................... 17 Temporary visitor access to IT resources ............................................................................ 17 Mass mailings ....................................................................................................................... 18 Use of limited resources ...................................................................................................... 18 Paper and printing resources ............................................................................................... 19 Ensuring network performance .................................................................................................... 19 Honesty, integrity, and the law ..................................................................................................... 21 The law ................................................................................................................................. 21 Dishonest actions ................................................................................................................. 21 Gambling .............................................................................................................................. 23 Copyright and intellectual property ............................................................................................. 23 Intellectual property ............................................................................................................ 23 Copyright .............................................................................................................................. 23 Permissions for use .............................................................................................................. 24 Restrictions .......................................................................................................................... 24 Attribution ............................................................................................................................ 25 Educational materials .......................................................................................................... 25 Rights-holder concerns ........................................................................................................ 25 Violations and penalties ................................................................................................................ 26 University penalties ............................................................................................................. 26 Other penalties .................................................................................................................... 26 Protection for you……………………………………………………………………………………………………………………26 Phishing ................................................................................................................................ 26 Social Engineering ................................................................................................................ 27 Self-exposure ....................................................................................................................... 27 Where to turn ...................................................................................................................... 27 Examples…………………………………………………………………………………………………………………………………28 Access ................................................................................................................................... 28 Copyright, IP ......................................................................................................................... 29 Harassment/Disruptive Behavior ........................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages36 Page
-
File Size-