Scope: Employees, Students Visitors and Vendors are covered by this policy.
University Computing Resources include, but are not limited to, end-user computing devices, servers, networks, email, software, printers, scanners, video distribution systems, telephone systems, and other computing hardware and software, whether owned by the University or contracted from a third party. All such University Computing Resources are intended for University-related use, including direct and indirect support of the University’s instruction, research, and service missions; of University administrative functions; of student and campus life activities; and of the free exchange of ideas.
The rights of free expression and academic freedom apply to the use of University Computing Resources; so, too, however, do the responsibilities and limits associated with those rights. All who use the University Computing Resources must act responsibly, in accordance with the highest standards of ethical and legal behavior. Thus, legitimate use of University Computing Resources does not extend to whatever is technically possible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network and/or whether or not they can be circumvented by technical means.
This policy applies to all users of University Computing Resources, whether or not affiliated with the University, and to all uses of those resources, whether on campus or from remote locations. Additional policies may apply to specific computers, computer systems, and/or networks provided and operated by specific units of the University, and/or to uses within specific units. Some of these policies are listed in the “Additional Policies and Procedures” policy and the section of this policy titled “Other ÍÃ×ÓÏÈÉú University Computing Policies”.
All University Computing Resources users must:
Whenever it becomes necessary to enforce University rules or policies, an authorized administrator may: disallow network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are possible; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases.
Users who violate this policy may be denied access to University Computing Resources and may be subject to other penalties and disciplinary action, both within and outside of the University. Violations will normally be handled through the University disciplinary procedures applicable to the relevant user. Alleged violations by students will normally be investigated, and the Office of Ethics and Student Conflict Resolution will normally impose any penalties or other discipline.
However, the University, through its information managers, may suspend or block access to an account prior to the initiation or completion of such procedures; when it reasonably appears necessary to do so, and in order to protect the integrity, security, or functionality of University Computing Resources or other computing resources; or to protect the University from liability.
The University may also refer suspected violations of applicable law to appropriate law enforcement agencies.
The University employs various measures to protect the security of University Computing Resources and users accounts. However, users should be aware that the University does not and cannot guarantee such security.
Users should also be aware that their uses of University Computing Resources are not private. While the University does not routinely monitor individual usage of University Computing Resources, the normal operation and maintenance of University Computing Resources require the backup and caching of data and communications, the logging of activity, the monitoring of usage patterns, and other such activities that are necessary for the rendition of service. Systems or technical managers, as part of their technical responsibilities, may occasionally need to diagnose or solve problems by examining the contents of particular files. Data from University Computing Resources may be used to evaluate the efficiency of University operations and personnel.
The University may also monitor the activity and accounts of individual users of University Computing Resources, including individual sessions and communications, without notice when:
Any such individual monitoring, other than that specified in (1), or required by law, or necessary to respond to perceived emergency situations, must be authorized in advance by the Vice President for Information Technology or a designee of same.
The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings. Communications made by means of University Computing Resources are also generally subject to Ohio’s Public Records Statute to the same extent as they would be if made on paper.
The University owns various computers and the entire internal computer networks used on campus. The University also has various rights to the software and information residing on, developed on, or licensed for, these computers and networks. The University has the responsibility to administer, protect, and monitor this aggregation of computers, software, and networks. Specifically, purposes of the University’s information technology management are to:
“Responsible Use of Computing Resources at ÍÃ×ÓÏÈÉú University” was adapted from The Ohio State University’s Policy on Responsible Use of University Computing Resources. ÍÃ×ÓÏÈÉú University is grateful to The Ohio State University for allowing us to use its policy as a model.
Additional policies, including the “ÍÃ×ÓÏÈÉú University Computing Security Policy”, elaborate the above policies and outline procedures for implementation.
Additional policies that are not in this document may apply to specific computers, computer systems, or networks provided or operated by specific units of the University. Consult the operators or managers of these systems for further information.
Not applicable.
Not applicable.
Not applicable.
7/1/2027
Vice President for Information Technology & Chief Information Officer
Yes
Vice President for Information Technology & Chief Information Officer
501 E. High Street
Oxford, OH 45056
1601 University Blvd.
Hamilton, OH 45011
4200 N. University Blvd.
Middletown, OH 45042
7847 VOA Park Dr.
(Corner of VOA Park Dr. and Cox Rd.)
West Chester, OH 45069
Chateau de Differdange
1, Impasse du Chateau, L-4524 Differdange
Grand Duchy of Luxembourg
217-222 MacMillan Hall
501 E. Spring St.
Oxford, OH 45056, USA