Major Revision of Existing Policy
Minor/Technical Revision of Existing Policy
Reaffirmation of Existing Policy
I. OBJECTIVE & PURPOSE In keeping with the spirit of free intellectual inquiry that is fundamental to our mission, the principles of academic freedom and individual privacy will be respected by the University as outlined in this policy. In turn, all users of the University’s computing and information technology resources are expected to demonstrate the highest respect for the rights of others in their use of these resources and failure to abide by these principles may subject violators to individual civil liability and/or criminal prosecution. Access to and use of these resources and services are privileges. These privileges may be limited or revoked by the President or his designee if an individual violates University policies or state or federal laws. The purpose of this policy is to outline the acceptable uses of computing and information technology resources for the University of North Florida community. Accordingly students, faculty, staff, vendors, contractors, visitors or others who interact at the University will observe and comply with this policy. This policy outlines the standards for acceptable use of University computing and information technology resources that include, but are not limited to, equipment, software, networks, data and telecommunications equipment whether owned, leased or otherwise provided by UNF. This policy reflects the University’s commitment to information technology as a strategic resource. All users are expected to familiarize themselves with the contents of this policy. Due to the rapid nature of change in both information technologies and their applications, the University may amend this policy whenever deemed necessary or appropriate. Users are encouraged to periodically review this policy in order to understand their rights and responsibilities under this policy. II. STATEMENT OF POLICY Computing, networking, telecommunications, and all other information technology resources of the University of North Florida are available and intended to advance the education, research, administration and public service mission of the University. Accordingly, the University encourages and promotes the use of these resources by the University community, within institutional priorities and financial capabilities. Access to and use of these resources and services are privileges which must be accepted in strict compliance with all applicable laws and regulations and with the highest standards of ethical behavior. This policy applies to all persons accessing and using computing, networking, telecommunications, and other information technology resources through any facility of the University. Such resources include computer and network systems, hardware, software, databases, support personnel and services, physical facilities and data communications systems and services. Access to the University’s information technology and computing resources is a privilege granted to students, faculty and staff of the University. The University extends access privileges to individual users of the University’s information technology and computing resources. The extension of these privileges is predicated on the user’s acceptance of and adherence to the corresponding user responsibilities detailed in this policy and the referenced guidelines. The University reserves the rights to limit, restrict, or extend access to information technology resources. III. STATEMENT OF PROCEDURES User access to computing and information technology granted by the University to an individual is solely for the grantee’s own use. User access privileges must not be transferred or shared, except as expressly authorized by an appropriate University official.
All users of computing, networking, telecommunications, and other information technology resources of the University are required to: comply with Florida's public records law and state records retention schedules for public records, including electronic mail. comply with legally required disclosures (e.g., pursuant to a lawfully issued subpoena or search warrant, discovery request) and cooperate in University investigations, as well as collaborative investigations with outside entities, and in access necessary for repairs, maintenance, and monitoring of University facilities. comply with all applicable federal, state, and local laws and regulations, including, but not limited to copyright, trademark and licensing laws, the Florida Computer Crimes Act (Chapter 815, F.S.), state obscenity laws (Chapter 847, F.S.), and all Florida Board of Governors and University rules, policies, and procedures. Existing University policies applicable to standards of behavior (such as code of conduct, ethics, sexual harassment, disruptive behavior, academic integrity, use of facilities, etc.) are incorporated in this policy by reference. protect the confidentiality, accuracy and integrity of institutional data (such as, but not limited to, student education records) which are subject to federal and state confidentiality laws. protect the integrity of passwords. Computer accounts, passwords, access codes, and other authorizations are assigned to individual users. It is a violation of this policy to use another's account, password, access code, or other such authorization, to permit access by unauthorized users, or to otherwise misrepresent one's identity in accessing or using any information technology resource of the University. The University utilizes passwords for the proper administration of its facilities only, and the requirement and use of a password should not give the user an expectation of privacy as to any information on a University system or facility. Failure to comply with the appropriate use of computing and information technology resources threatens the atmosphere for the sharing of information, the free exchange of ideas and the secure environment for creating and maintaining information property and subjects users to disciplinary action. Any member of the University community found using computing and information technology resources in violation of this policy is subject to disciplinary procedures including, without limitation, suspension of system privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. ASSOCIATED POLICIES a. OspreyNet Acceptable Use Policyb. Decentralized Business and Networking Systems (DBNS)
c. Student E-mail d. General Purpose Computer Lab Access and Use
Copyright © 2012 University of North Florida1 UNF Drive | Jacksonville, FL 32224 | Phone: (904) 620-1000
Contact | Emergency | Privacy | RegulationsDisability Accommodations