Policy on Use of Princeton University Information Technology 2013-2014 Edition

Policy on Use of Princeton University Information Technology 2013-2014 Edition

Policy on Use of Princeton University Information Technology 2013-2014 Edition TABLE OF CONTENTS Policy Statement………………………………………………………………………………………………………………………..1 Introduction to Policy on Use of Princeton University IT ............................................................... 1 Reasons for this Policy ........................................................................................................... 1 Examples ................................................................................................................................ 2 Who must comply? What penalties pertain? ................................................................................ 2 Compliance ............................................................................................................................ 2 Penalties ................................................................................................................................. 3 Appropriate use of Princeton University IT resources .................................................................... 3 Business use ........................................................................................................................... 3 Personal use ........................................................................................................................... 4 University access; your right to privacy .......................................................................................... 4 The University’s right to access files ...................................................................................... 4 Degrees of privacy ................................................................................................................. 5 Others’ files ............................................................................................................................ 5 Disclosure ............................................................................................................................... 6 Managing electronic information (including e-mail) ...................................................................... 6 Retention and disposal .......................................................................................................... 6 Official e-mail ......................................................................................................................... 7 Outside e-mail ........................................................................................................................ 7 Protecting data....................................................................................................................... 8 Protecting the University’s good name ........................................................................................ 10 Good judgment .................................................................................................................... 10 Use of the University’s name ............................................................................................... 10 Directory use ........................................................................................................................ 11 Enabling others .................................................................................................................... 11 Civility and respect for others ....................................................................................................... 11 Civil behavior ........................................................................................................................ 11 Harassment and defamation ............................................................................................... 12 Use of technology for commerce or solicitation .......................................................................... 12 Commerce ............................................................................................................................ 12 Solicitation ........................................................................................................................... 13 Commercial links .................................................................................................................. 13 Use of technology for political activity ......................................................................................... 13 Political campaigns............................................................................................................... 13 Other political activity .......................................................................................................... 14 Your responsibility for network and information security ........................................................... 14 Protecting accounts ............................................................................................................. 14 Allowing access to others .................................................................................................... 15 i Securing Web-based applications ........................................................................................ 15 Discovering gaps in security ................................................................................................. 15 Your responsibility regarding shared IT resources ....................................................................... 16 Appropriate use of shared resources .................................................................................. 16 Library resources .................................................................................................................. 17 Collaborative projects .......................................................................................................... 17 Temporary visitor access to IT resources ............................................................................ 17 Mass mailings ....................................................................................................................... 18 Use of limited resources ...................................................................................................... 18 Paper and printing resources ............................................................................................... 19 Ensuring network performance .................................................................................................... 19 Honesty, integrity, and the law ..................................................................................................... 21 The law ................................................................................................................................. 21 Dishonest actions ................................................................................................................. 21 Gambling .............................................................................................................................. 23 Copyright and intellectual property ............................................................................................. 23 Intellectual property ............................................................................................................ 23 Copyright .............................................................................................................................. 23 Permissions for use .............................................................................................................. 24 Restrictions .......................................................................................................................... 24 Attribution ............................................................................................................................ 25 Educational materials .......................................................................................................... 25 Rights-holder concerns ........................................................................................................ 25 Violations and penalties ................................................................................................................ 26 University penalties ............................................................................................................. 26 Other penalties .................................................................................................................... 26 Protection for you……………………………………………………………………………………………………………………26 Phishing ................................................................................................................................ 26 Social Engineering ................................................................................................................ 27 Self-exposure ....................................................................................................................... 27 Where to turn ...................................................................................................................... 27 Examples…………………………………………………………………………………………………………………………………28 Access ................................................................................................................................... 28 Copyright, IP ......................................................................................................................... 29 Harassment/Disruptive Behavior ........................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    36 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us