{"id":1974,"date":"2023-12-19T12:48:55","date_gmt":"2023-12-19T12:48:55","guid":{"rendered":"http:\/\/10.50.124.17\/?page_id=1974"},"modified":"2024-01-01T14:19:40","modified_gmt":"2024-01-01T14:19:40","slug":"appropriate-use-policy","status":"publish","type":"page","link":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/appropriate-use-policy\/","title":{"rendered":"Appropriate use policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1974\" class=\"elementor elementor-1974\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23acaac e-flex e-con-boxed e-con e-parent\" data-id=\"23acaac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4dfb04 e-con-full e-flex e-con e-child\" data-id=\"e4dfb04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e57651 elementor-widget elementor-widget-text-editor\" data-id=\"4e57651\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Aamusted University Appropriate Use Policy<\/h3><h5>Section 1: PURPOSE<\/h5><p>This policy establishes guidelines for the responsible and acceptable use of Aamusted University&#8217;s Information Technology Systems (ITS) resources. Adherence to these standards ensures a secure and efficient computing environment for the entire university community.<\/p><h5>Section 2: ACCEPTABLE USE<\/h5><h5>2.1 General Usage:<\/h5><p>&#8211; Aamusted ITS resources should be used for educational, research, and administrative purposes aligned with the university&#8217;s mission.<br \/>&#8211; Users must comply with all applicable laws and regulations in their use of ITS resources.<\/p><h5>2.2 User Responsibilities:<\/h5><p>&#8211; Users are responsible for safeguarding their credentials and reporting any unauthorized use promptly.<br \/>&#8211; Respect the privacy and intellectual property rights of others when using ITS resources.<\/p><h5>2.3 Prohibited Activities:<\/h5><p>&#8211; Unauthorized access or attempts to access data, systems, or networks.<br \/>&#8211; Distribution of malicious software, including viruses, worms, and malware.<br \/>&#8211; Harassment, defamation, or any form of communication that violates university policies.<br \/>&#8211; Any activity that disrupts the normal operation of ITS resources.<\/p><h5>Section 3: ACCESS CONTROL<\/h5><h5>3.1 Account Usage:<\/h5><p>&#8211; Users are only permitted to access ITS resources using their assigned accounts.<br \/>&#8211; Sharing of accounts or credentials is strictly prohibited.<\/p><h5>3.2 Guest Access:<\/h5><p>&#8211; Guest access to ITS resources may be granted under specific circumstances and must comply with this policy.<\/p><h5>Section 4: DATA INTEGRITY AND SECURITY<\/h5><h5>4.1 Data Protection:<\/h5><p>&#8211; Users are responsible for the integrity and security of data stored or processed using ITS resources.<br \/>&#8211; Encryption should be used for sensitive data transmitted over the network.<\/p><h5>4.2 Security Awareness:<\/h5><p>&#8211; Users must participate in security awareness training provided by Aamusted University.<\/p><h5>Section 5: NETWORK USAGE<\/h5><h5>5.1 Bandwidth Usage:<\/h5><p>&#8211; Users are expected to use network resources responsibly, avoiding excessive bandwidth consumption.<\/p><h5>5.2 Wireless Access:<\/h5><p>&#8211; Wireless access must be used in accordance with university policies, and users should not create ad-hoc networks.<\/p><h5>Section 6: COMPLIANCE AND ENFORCEMENT<\/h5><h5>6.1 Policy Compliance:<\/h5><p>&#8211; Users are required to familiarize themselves with this policy and comply with its provisions.<\/p><h5>6.2 Enforcement:<\/h5><p>&#8211; Violations of this policy may result in the suspension or termination of ITS privileges and disciplinary action.<\/p><h5>Section 7: POLICY REVIEW AND AMENDMENT<\/h5><h5>7.1 Review Cycle:<\/h5><p>&#8211; This policy will be periodically reviewed by the Office of Information Technology and CIO.<\/p><h5>7.2 Amendment Process:<\/h5><p>&#8211; Amendments to this policy will be proposed by the responsible office and subject to approval based on changing technology and university needs.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fbba4ca e-con-full e-flex e-con e-child\" data-id=\"fbba4ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9089744 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"9089744\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=1934\">Other Policies<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e802bd0 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e802bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=937\">Explore our services<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Aamusted University Appropriate Use Policy Section 1: PURPOSE This policy establishes guidelines for the responsible and acceptable use of Aamusted University&#8217;s Information Technology Systems (ITS) resources. Adherence to these standards ensures a secure and efficient computing environment for the entire university community. Section 2: ACCEPTABLE USE 2.1 General Usage: &#8211; Aamusted ITS resources should be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1974","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1974"}],"collection":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/comments?post=1974"}],"version-history":[{"count":10,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1974\/revisions"}],"predecessor-version":[{"id":2175,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1974\/revisions\/2175"}],"wp:attachment":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/media?parent=1974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}