Aamusted University Appropriate Use Policy

Section 1: PURPOSE

This policy establishes guidelines for the responsible and acceptable use of Aamusted University’s Information Technology Systems (ITS) resources. Adherence to these standards ensures a secure and efficient computing environment for the entire university community.

Section 2: ACCEPTABLE USE
2.1 General Usage:

– Aamusted ITS resources should be used for educational, research, and administrative purposes aligned with the university’s mission.
– Users must comply with all applicable laws and regulations in their use of ITS resources.

2.2 User Responsibilities:

– Users are responsible for safeguarding their credentials and reporting any unauthorized use promptly.
– Respect the privacy and intellectual property rights of others when using ITS resources.

2.3 Prohibited Activities:

– Unauthorized access or attempts to access data, systems, or networks.
– Distribution of malicious software, including viruses, worms, and malware.
– Harassment, defamation, or any form of communication that violates university policies.
– Any activity that disrupts the normal operation of ITS resources.

Section 3: ACCESS CONTROL
3.1 Account Usage:

– Users are only permitted to access ITS resources using their assigned accounts.
– Sharing of accounts or credentials is strictly prohibited.

3.2 Guest Access:

– Guest access to ITS resources may be granted under specific circumstances and must comply with this policy.

Section 4: DATA INTEGRITY AND SECURITY
4.1 Data Protection:

– Users are responsible for the integrity and security of data stored or processed using ITS resources.
– Encryption should be used for sensitive data transmitted over the network.

4.2 Security Awareness:

– Users must participate in security awareness training provided by Aamusted University.

Section 5: NETWORK USAGE
5.1 Bandwidth Usage:

– Users are expected to use network resources responsibly, avoiding excessive bandwidth consumption.

5.2 Wireless Access:

– Wireless access must be used in accordance with university policies, and users should not create ad-hoc networks.

Section 6: COMPLIANCE AND ENFORCEMENT
6.1 Policy Compliance:

– Users are required to familiarize themselves with this policy and comply with its provisions.

6.2 Enforcement:

– Violations of this policy may result in the suspension or termination of ITS privileges and disciplinary action.

Section 7: POLICY REVIEW AND AMENDMENT
7.1 Review Cycle:

– This policy will be periodically reviewed by the Office of Information Technology and CIO.

7.2 Amendment Process:

– Amendments to this policy will be proposed by the responsible office and subject to approval based on changing technology and university needs.