Budget Office Navigation Bar Michigan Tech Home Academics Search Michigan Tech Michigan Tech Departments

Policy Number: 2.1006
Title: Acceptable Use of Information Technology Resources
Effective: 11/07/2012
Senate Proposal: No
Responsible University Officer: Chief Technology Officer (CTO)
Responsible Office: Information Technology

Policy Statement  |  Reason  |  Requirements  |  Related Information  |  Exclusions
Contacts  |  Definitions  |  Responsibilities  |  Procedures  |  Forms & Instructions  |  Appendices  |  History

Policy Statement

The University provides information technology resources, such as computing and networking, to the University community. It is the user's responsibility to properly use and protect those information technology resources, as well as comply with all University policies, state and federal laws, regulations, and contractual obligations.


top

Policy Requirements

Use of information technology resources owned or operated by the University imposes certain responsibilities and obligations. The University considers use of information technology resources to be a privilege that is granted on the condition that each member of the University community respects the integrity of information technology resources and the rights of other users.

Use of University information technology resources in a manner that violates the provisions set forth in this policy can lead to revocation of all access privileges as well as other disciplinary action, up to and including dismissal from the University.

top

Reason for Policy

This policy is designed to establish the acceptable and appropriate use of all information technology resources that support University business and its mission of education, research and service. Other uses are secondary.

top

Related Policy Information

Use of Resources

The University's information technology resources may not be used for unlawful or malicious purposes. For example, individuals may not:

Please see the Appendix, Standards for the Acceptable Use of Information Technology Resources for further examples of behaviors and actions that violate this policy.

Expectation of Privacy

The University's Chief Technology Officer (CTO) delegates responsibilities to authorized individuals to monitor users' data, programs, or any other activities to:

Users of Michigan Tech's information technology resources are hereby notified that they should have no expectation of privacy in connection with the use of information technology resources beyond the provisions of this policy.

top

Exclusions

top

Contacts

Office/Unit Name Telephone Number
Information Technology Services 906-487-1111
top

Definitions

Information Technology Resources - All computers and electronic data storage, networking, transmission, and manipulation devices owned and/or controlled by any part of the University, including departmental computers and the University's information technology network facilities accessed by anyone from anywhere.

Users - Individuals, whether a member of the University community or not, who are granted access to the University's information technology resources and to all uses of those resources, whether on campus or from remote locations. Those individuals include, but are not limited to faculty, students, staff, and those working on behalf of the University, guests, and visitors.

top

Responsibilities

Dean/Department Chair/Director or Higher in Supervisory Chain of Command - Ensures protection of University information technology resources that are controlled exclusively within their department.

University Community/Users - Notifies an information technology support organization or supervisor immediately, if they may have unintentionally or inadvertently participated in or caused a violation of this policy, or if they suspect a violation.

Users - Properly uses and protects information technology resources that they have access to as well as comply with all University polices, state and federal laws, regulations, and contractual obligations.

top

Procedures

In support of this policy, the following procedures are included:

Procedure:
Information Security Plan
top

Forms and Instructions

In support of this policy, the following forms/instructions are included:

Forms:
University Confidentiality Agreement
top

Appendices

top

History

Adoption Date: 08/08/2001
Amended: 08/10/2011 Rescinded chapter 10. Information Technology of the MTU Operating Procedures Manual and formatted policy to the University Policy and Procedure format.
11/07/2012 Changed the title of the Chief Information Officer to Chief Technology Officer and changed Information Technology Services and Security to Information Technology Services.
top

Policy Statement  |  Requirements  |  Reason  |  Related Information  |  Exclusions
Contacts  |  Definitions  |  Responsibilities  |  Procedures  |  Forms & Instructions  |  Appendices  |  History