Skip to content

PART II. COMMUNITY POLICIES
DIVISION I HUMAN RIGHTS, AFFIRMATIVE ACTION, AND EQUAL EMPLOYMENT OPPORTUNITY

(Written to conform to Regents Procedural Guide 3/74; amended 9/93; 10/95; 9/97)

CHAPTER 19: ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES
(Enacted 6/95; amended 4/99; 8/02)

19.1 Preamble
19.2 Scope of Policy
19.3 Security and Privacy
19.4 Individual Responsibilities
19.5 Administration and Enforcement
19.6 Disclaimer
19.7 Other Policies and Rules

19.1 PREAMBLE.
The University of Iowa's information technology resources have been assembled to facilitate the pursuit of excellence in the University's missions of teaching, research, and service. The opportunity to use computing systems and software, as well as internal and external data networks, is important to all members of the University community. To preserve that opportunity for the full community, each individual faculty member, staff member, and student must comply with institutional and external standards for acceptable use of these shared resources. Although modest personal use of University-supplied technology resources may improve the skills of individual users and otherwise contribute indirectly to the University's mission, these resources should be used primarily for University-related educational and administrative purposes. By using University information technology facilities and resources, users agree to abide by all related University policies and procedures, as well as applicable federal, state, and local law. Violations may result in University disciplinary action or referral to appropriate external authorities.

The use of University computing resources -- like the use of any other University-provided resource and like any other University-related activity -- is subject to the normal requirements of legal and ethical behavior within the University community. Thus, legitimate use of a computer, computer system, switching system, or network does not extend to whatever is technically possible. Although some limitations are built into computer operating systems and networks, those limitations are not the sole restrictions on what is permissible. Users must abide by all applicable restrictions, whether or not those restrictions are built into the operating system or network and whether or not they can be circumvented by technical means.
[top]

19.2 SCOPE OF POLICY.
This acceptable use policy applies to all users of University information technology (IT) resources. This includes the resources under the management or control of Information Technology Services (ITS) or other units of The University of Iowa such as UI Health Care Information Systems (HCIS). A "user" is defined as any individual who uses, logs into, or attempts to use or log into, a system; or who connects to, or attempts to connect to or traverse, a network, whether by hardware or software or both, whether on campus or from remote locations. The term "user" thus includes system sponsors and system managers, faculty, staff, students, and other customers. "Information technology resources" are those facilities, technologies, and information resources required to accomplish information processing, storage, and communication, whether individually controlled or shared, stand-alone or networked. Included in this definition are all Information Technology Centers (ITCs), classroom technologies, electronic resources, and computing and electronic communication devices and services, such as, but not limited to, computers, printers, modems, e-mail, fax transmissions, video, ISIS, OASIS, multi-media, instructional materials, and healthcare and administrative systems. Personal equipment physically connected to the University network is also subject to this policy.
[top]

19.3 SECURITY AND PRIVACY.
The same principles of academic freedom and privacy that have long been applicable to written and spoken communications in the University community apply also to electronic information. The University cherishes the diversity of perspectives represented on this campus and, accordingly, does not condone either censorship or the casual inspection of electronic files.

The University employs various measures to protect the security of its computing resources and of its user accounts. Users should be aware, however, that the University cannot guarantee such security. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords, and changing passwords regularly. Users are responsible for maintaining backup and recovery systems in accordance with disaster recovery guidelines, as well as for implementing and maintaining computer security in accordance with best practices and University policies and procedures. The University respects encryption rights on its networks and may itself encrypt information and transactions when secure confidentiality is an obligation.

Users should also be aware that their uses of University computing resources are not completely private. While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the University's computing resources require the backup of data and communication records, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for the rendition of service. The University may also inspect files or monitor usage for a limited time when there is probable cause to believe a user has violated this policy. Inspections or monitoring related to violations of this policy must be authorized in advance by the director of ITS or by the director's designee, or for UIHC, the director of HCIS, in consultation with University counsel. Such inspections or monitoring will be conducted with notice to the user, unless, after consultation with University counsel, it is determined that notice would seriously jeopardize substantial interests of the University or of third parties. In addition, a supervisor or principal investigator may find it necessary to retrieve a file of assigned work by inspection without notice when an employee is unavailable for timely consultation.

In addition, users should be aware that their right to privacy in electronic records may be subject to the University's obligation to respond to subpoenas or other court orders, reasonable discovery requests, and requests for documents pursuant to Iowa Code Chapter 22, the Public (Open) Records Law. University administrative records are subject to public record requests, unless an express exception recognizes the confidentiality of the material, such as the exception for library records. By statute, public records include all "records, documents, tape or other information, stored or preserved in any medium," whether generated by University administrators, faculty, or staff. The statute contains no express exception for documents generated by faculty or staff in the course of their employment. Although it is the University's position that personal electronic files of faculty, staff, and students are not ordinarily to be considered "public records," users should be aware that a court of law, and not University officials, may ultimately decide such issues.
[top]

19.4 INDIVIDUAL RESPONSIBILITIES.


[top]

19.5 ADMINISTRATION AND ENFORCEMENT.
Information Technology Services is charged with communicating this policy to the user community through partnering with major campus IT providers and for providing educational programs to achieve technical proficiency and appropriate use of the resources. Requests for interpretation of the policy as applied to particular situations may be directed to the appropriate University administrator, such as the Office of the Provost, Student Services, Human Resources, Affirmative Action, HCIS, ITS, or to the Office of the General Counsel.

Reports of apparent violations of the policy may be made to Information Technology Services, Health Care Information Systems, to an employee's supervisor or, in the case of a student, to the Office of the Vice President for Student Services. Where violations of law are alleged, University Public Safety or the Office of General Counsel should be contacted. Good faith disclosures of University-related misconduct are protected by the anti-retaliation policy (see II-11). In most instances, concerns of possible violations of this policy will be addressed informally by discussion or admonition. Where sanctions are appropriate, they may include a formal reprimand, loss of user privileges for a definite or indefinite period, termination of employment, or, in the case of a student, probation, suspension, or expulsion from the University.

Serious or repeated violation of this policy by faculty members will be governed by the general Faculty Dispute Procedures (see III-29 et seq.). Violations of this policy by staff members will be addressed by the staff member's supervisor, departmental executive officer, dean, provost, or vice president. Appeals from any formal disciplinary action taken against a professional and scientific staff member are governed by III-28.4 Grievance Procedures for Professional and Scientific Personnel. Organized merit staff have access to a contractual grievance procedure, and non-organized merit staff have a procedure available under the Regents Merit System Rules. Violations of this policy by students will be governed by the Judicial Procedure for Alleged Violations of the Code of Student Life. Both the Code of Student Life and the Judicial Procedure are published and distributed to students annually in Policies and Regulations Affecting Students.
[top]

19.6 DISCLAIMER.
The University makes no warranties of any kind, whether expressed or implied, with respect to the information technology services it provides. The University will not be responsible for damages resulting from the use of communication facilities and services, including, but not limited to, loss of data resulting from delays, non-deliveries, missed deliveries, service interruptions caused by the negligence of a University employee, or by the user's error or omissions. Use of any information obtained via the Internet is at the user's risk. The University specifically denies any responsibility for the accuracy or quality of information obtained through its electronic communication facilities and services, except material represented as an official University record. The University also does not accept responsibility for removing material that some users may consider defamatory or otherwise offensive. Users should be advised, however, that dissemination of such material may subject them to liability in other forums.
[top]

19.7 OTHER POLICIES AND RULES.
Individual units within the University may define by written policies conditions of use for facilities under their control. Policy statements must be consistent in principle with this University policy, but may provide additional detail, guidelines or restrictions. Such unit or departmental policies should be submitted to the Provost (for faculty), Human Resources or Vice Presidents of the University (for staff), or to the Hospital Advisory Committee (for UIHC) to review for consistency with University policy. In addition, users are advised that network traffic exiting the University is subject to the acceptable use policies of our national and international network connectivity providers (e.g., ICN, vBNS, Internet2, or long distance communication providers such as MCI or AT&T).
[top]


Page last updated January 2004 by Office of the Vice President for Finance and Operations