The University owns most of the computers and all of the internal computer networks used on campus. The University also has various rights to the software and information contained on, developed on, or licensed for these computers and networks. The University has the responsibility to administer, protect, and monitor this aggregation of computers, software, and networks.

Specifically, the purposes of the University's information technology management are to:

  • Establish and support reasonable standards of security for electronic information that community members produce, use, or distribute, and protect the privacy and accuracy of administrative information that the University maintains.
  • Protect University computers, networks and information from destruction, tampering, and unauthorized inspection and use.
  • Ensure that information technology resources are used to support activities connected with instruction, research, and administration.
  • Delineate the limits of privacy that can be expected in the use of networked computer resources and preserve freedom of expression over this medium without tolerating abusive or unlawful activities.
  • Ensure that University computer systems do not lose important information because of hardware, software, or administrative failures or breakdowns. To achieve this objective, authorized systems or technical managers may occasionally need to examine the contents of particular files to diagnose or solve problems.
  • Communicate University policies and individuals' responsibilities systematically and regularly in a variety of formats to all parts of the University community.
  • Monitor policies and propose changes in policy as events or technology warrant.
  • Manage computing resources so that members of the University community benefit equitably from their use. To achieve this, authorized staff may occasionally need to restrict inequitable computer use, including shared systems or the network. For example, the University reserves the right to restrict users from using any program that is unduly resource-intensive.
  • Enforce policies by restricting access in case of serious violations. For example, in appropriate circumstances, authorized systems administrators may find it necessary to lock a user's account. In such circumstances, if there is not a resolution within 24 hours, the systems administrator or the user should refer the matter to the appropriate official for follow-up and resolution. (See section on Sanctions for more details.)
  • Conduct routine audits of software on University owned computers to check for licensing compliance.