Aamusted University Appropriate Use Policy
Section 1: PURPOSE
This policy establishes guidelines for the responsible and acceptable use of Aamusted University’s Information Technology Systems (ITS) resources. Adherence to these standards ensures a secure and efficient computing environment for the entire university community.
Section 2: ACCEPTABLE USE
2.1 General Usage:
– Aamusted ITS resources should be used for educational, research, and administrative purposes aligned with the university’s mission.
– Users must comply with all applicable laws and regulations in their use of ITS resources.
2.2 User Responsibilities:
– Users are responsible for safeguarding their credentials and reporting any unauthorized use promptly.
– Respect the privacy and intellectual property rights of others when using ITS resources.
2.3 Prohibited Activities:
– Unauthorized access or attempts to access data, systems, or networks.
– Distribution of malicious software, including viruses, worms, and malware.
– Harassment, defamation, or any form of communication that violates university policies.
– Any activity that disrupts the normal operation of ITS resources.
Section 3: ACCESS CONTROL
3.1 Account Usage:
– Users are only permitted to access ITS resources using their assigned accounts.
– Sharing of accounts or credentials is strictly prohibited.
3.2 Guest Access:
– Guest access to ITS resources may be granted under specific circumstances and must comply with this policy.
Section 4: DATA INTEGRITY AND SECURITY
4.1 Data Protection:
– Users are responsible for the integrity and security of data stored or processed using ITS resources.
– Encryption should be used for sensitive data transmitted over the network.
4.2 Security Awareness:
– Users must participate in security awareness training provided by Aamusted University.
Section 5: NETWORK USAGE
5.1 Bandwidth Usage:
– Users are expected to use network resources responsibly, avoiding excessive bandwidth consumption.
5.2 Wireless Access:
– Wireless access must be used in accordance with university policies, and users should not create ad-hoc networks.
Section 6: COMPLIANCE AND ENFORCEMENT
6.1 Policy Compliance:
– Users are required to familiarize themselves with this policy and comply with its provisions.
6.2 Enforcement:
– Violations of this policy may result in the suspension or termination of ITS privileges and disciplinary action.
Section 7: POLICY REVIEW AND AMENDMENT
7.1 Review Cycle:
– This policy will be periodically reviewed by the Office of Information Technology and CIO.
7.2 Amendment Process:
– Amendments to this policy will be proposed by the responsible office and subject to approval based on changing technology and university needs.