- Usage Responsibilities
- Policies and Laws
You have been directed to this Acceptable Use Agreement for Access to Technology and Information Resources as a new or continuing student at or affiliate of Indiana University.
Access to Indiana University data and information, and access to IT accounts, systems, and applications, is based on your need for access and your assent to use that access appropriately. These services are integral to the operation of the university, and security and privacy laws and other institutional policies protect much of the information.
Therefore, before you can be granted access, you must read and agree to follow these acceptable usage standards, and must accept responsibility to preserve the security and confidentiality of information that you access, in any form, including oral, print, or electronic formats.
Read the information below carefully. It sets out user responsibilities. Although these general provisions apply to all IU information and IT accounts, systems, and applications, please be aware that managers of certain services or information types may require you to complete additional agreements and/or training.↑ top
The following points detail your responsibilities as you access, use, or handle information or information technology (IT) at IU.
You agree to:
- Never share your account password(s) or passphrase(s) with anyone, including friends, roommates, family, or IU staff.
- Select strong password(s) and passphrase(s) and change them regularly.
- Be mindful that different computer systems and applications provide different levels of protection for information, and seek advice on supplemental security measures, if necessary. For example, a mobile laptop provides inherently less protection than a desktop computer in a locked room. Therefore, the level of protection provided to information accessed or stored using a laptop is to be supplemented by using additional safeguards such as encryption technology, enhancing physical security, restricting file permissions, etc.
- Respect the university's information and system security procedures (i.e., never attempt to circumvent or "go around" security processes).
- Make appropriate use of the tools provided (e.g., strong passphrase, virus detection, encryption software, encrypted transmission, training, etc.) to uphold the security of the university's IT systems and applications, and the confidentiality of information stored on them.
- Take steps to understand "phishing attacks," computer viruses, and other destructive software, and take steps to protect your accounts from such threats (e.g., never reply to emails asking for account passwords or passphrases, never open unsolicited email attachments, never click unknown links, use virus scanning software, apply system patches in a timely manner, etc.).
- Immediately notify your campus Support Center if you believe your account credentials (e.g., user ID, password, passphrase, etc.) have been compromised.
- Maintain information in a secure manner to prevent access, viewing, or printing by unauthorized individuals.
- Secure unattended computers (e.g., log off, lock, or otherwise make inaccessible), even if you will only be away from the computer for a moment.
- Take appropriate steps to secure information (e.g., password protection, encryption, etc.) on mobile storage devices (e.g., laptops, USB drives, cell phones, etc.).
You agree to:
- Use information and IT for legal purposes only.
- Respect and comply with all copyrights and license agreements.
- Never use your access to information or IT to harass, libel, or defame others.
- Never damage equipment, software, or data belonging to others.
- Never make unauthorized use of computer accounts, access codes, or devices.
- Never monitor or disrupt the communications of others, except in the legitimate scope of your assigned university duties.
- Never use IT to view or distribute child pornography.
- Report unauthorized access to, inadequate protection of, and inappropriate use, disclosure, and/or disposal of information, immediately to your campus Support Center.
WARNING: Unauthorized distribution of copyrighted material using Indiana University's information technology resources -- including sharing copyrighted music, movies, and software through peer-to-peer applications like Limewire, BitTorrent, MP3Rocket, Frostwire, etc. using Internet access provided by IU -- is against the law and university policy. In addition to sanctions the university may impose, unlawful file sharing may subject you to legal penalties. This includes both civil penalties (having to pay money to the copyright holder in a lawsuit) and criminal penalties (fines and jail time). See filesharing.iu.edu for further information.
You agree to:
- Access institutional information only in the conduct of university business and in ways consistent with furthering the university's mission of education, research, and public service.
- Use information and IT in ways that foster the high ethical standards of the university.
- Never use information or IT to engage in academic, personal, or research misconduct.
- Never access or use institutional information (including public directory information) for your own personal gain or profit, or the personal gain or profit of others, without appropriate authorization.
- Respect the confidentiality and privacy of individuals whose records you may access.
You agree to:
- Never cause community or shared resources to be inaccessible or unusable.
- Use shared information technology resources efficiently.
- Regularly delete unneeded files and information from your accounts (if not required to retain them as outlined in university policy or records management schedules).
- Avoid overuse of network bandwidth, information storage space, printing facilities, paper, processing capacity, or other shared information technology resources.
- Never send mass email (i.e. unsolicited bulk email or spam) without appropriate approval.
- Never send or respond to chain email.
Policies and Laws
You should be aware that institutional policies, federal and state laws, and contractual obligations exist that provide further protections to certain types of information, or that may influence how you handle information. Examples include:
- IT-01: Appropriate Use of IT Resources Establishes appropriate usage requirements.
- IT-07: Privacy of Electronic Information and IT Resources Establishes the procedures and circumstances under which an individual's electronic accounts and files may be accessed by others.
- State invasion of privacy laws Generally prohibit the disclosure of personal information about an individual when doing so would be highly offensive to a reasonable person.
- State libel/defamation laws Generally prohibit false statements that harm another's reputation.
Failure to comply with these standards will be dealt with seriously, and may result in sanctions relating to your use of information or IT resources (such as suspension or termination of access, or removal of online material) or to your studies within the university (such as student discipline in accordance with applicable university policy). Illegal acts involving IU information or IT may also be subject to prosecution by state or federal authorities and may result in civil or criminal liability.↑ top
To be entrusted with access to Indiana University data and information, and access to IT accounts, systems, and applications, new or continuing students and affiliates must accept these responsibilities and standards of acceptable use. By accepting these terms, you agree to follow these rules in all of your interactions.
If you choose not to accept these standards of behavior, you may be denied access to information and/or information technology.
I have read, understand, and agree to abide by the practices outlined in this agreement.