Acceptable Use of Information Technology Resources
This policy covers authorized users who access information technology (IT) resources under the control of the University of Arkansas System (UAS) including but not limited to currently enrolled students; employees; authorized contractors, vendors, and guests; and other authorized users as determined by UAHT institutions.
The purpose of this policy is to outline the expectations regarding the acceptable use of IT resources by authorized users and to establish the parameters for the use of IT resources.
IT resources are essential tools in accomplishing the UAHT’s mission of disseminating and extending knowledge, fostering the free exchange of ideas, and providing effective support for teaching, research, and public service functions. It is the policy of the UAHT Board of Trustees that access to and use of UAHT IT resources is a privilege that extends to authorized users for use in fulfilling the missions of the UAHT and UA institutions, and for appropriate university-related activities.
UAHT IT resources include all electronic equipment, facilities, technologies, and data used for information processing, transfer, storage, display, printing, and communications by the UAHT and/or any UA institution. These include, but are not limited to, computer hardware and software, computer labs, classroom technologies such as computer-based instructional management systems, and computing and electronic communications devices and services, modems, email, networks, telephones, voicemail, facsimile transmissions, video, multi-function printing devices, mobile computer devices, data, multimedia and instructional materials. This definition also includes services that are owned, leased, operated, provided by, or otherwise connected to UAHT resources, such as cloud computing or any other connected/hosted service provided.
Acceptable and Unacceptable Uses of Information Technology Resources
Acceptable use of UAHT IT resources includes any purpose related to the direct and indirect support of the educational, research, service, student and campus life activities; administrative and business purposes; financial systems; and human resources administration. Authorized users are provided access to IT resources in order to support their studies, instruction, research, duties as employees, official business with the UAHT and/or any UAHT institution, and other university-sanctioned activities according to their roles and responsibilities.
Authorized users must not engage in unacceptable use of UAHT IT resources, which includes but is not limited to the following:
- Sharing or transferring authentication details to others, or using another user’s authentication credentials such as network IDs and passwords, or other access codes or circumventing user authentication which could allow unauthorized users to gain access to UAHT IT resources, except as required for administrative or business purposes;
- Violation of federal, state, or local laws; institutional policies, rules or guidelines; or licensing agreements or contracts;
- Harassment of, threats to or defamation of others; creation of a hostile environment; stalking; and/or illegal discrimination;
- Widespread dissemination of unauthorized email messages (e.g., mass mailings, spam, email chain letters); or
- Intentionally damaging, disrupting, or exposing IT resources or data to unauthorized access or harm.
In addition to the examples stated above, unacceptable use of UAHT IT resources for employees, authorized contractors and vendors, also includes the following:
- Storage, display, transmission, or intentional or solicited receipt of material that is or may reasonably be regarded as obscene, sexually explicit, or pornographic, except as such access relates to bonafide, university-related academic or research pursuits or as needed to investigate violations of this policy or laws;
- Outside employment, commercial activities, or other forms of private financial gain;
- Campaigning for public office or soliciting political contributions;
- Political lobbying, except for specific employees designated to lobby on behalf of a the UAHT or one of its institutions;
- Wagering or betting, except as it relates to bonafide, university-related academic or research pursuits;
- More than minimal use for private or personal purposes that interferes with work or job performance or that interferes with the activities of other employees, students, or other authorized users.
Authorized users must not use UAHT IT resources to speak on behalf of the UAHT or use the UAHT trademarks or logos without authorization. Affiliation with the UAHT does not, by itself, imply authorization to speak on behalf of the UAHT. The UAHT is not responsible for the content of documents, exchanges or messages, including links to other information locations on the internet that reflect only the personal ideas, comments, and opinions of individual members of the university community, even when this content is published or otherwise circulated to the public at large by means of UAHT IT resources.
Privacy and Security
The UAHT shall take reasonable measures to protect the privacy of its IT resources and accounts assigned to authorized users. However, the UAHT cannot guarantee absolute security and privacy. Any activity on UAHT IT resources may be monitored, logged and reviewed by UAHT-approved personnel or may be discovered in legal proceedings or in response to public records requests. Generally, the contents of user accounts will be treated as private and not examined or disclosed except:
- as required for system maintenance or business necessity, including security measures;
- when there exists reason to believe an individual is violating the law or UAHT or institutional policy;
- to meet the requirements of the Arkansas Public Records Law or other laws; regulations; or institutional policies, rules, or guidelines; or
- as permitted by applicable law or policy.
The UAHT has the right to employ appropriate security measures, to investigate as needed, and to take necessary actions to protect UAHT IT resources. The UAHT may also have a duty to provide information relevant to ongoing investigations by law enforcement. UA institutions will work with authorized users to protect their privacy interests, as well as those of the UAHT.
Authorized users must not violate the privacy of other users. Technical ability to access unauthorized resources or others’ accounts does not by itself imply authorization to do so, and it is a violation of this policy to access others’ accounts unless authorized to do so for a legitimate business purpose.
Other Limitations on Use of Information Technology Resources
In addition to the general principles set forth in this policy, the use of IT resources may be affected by other laws and policies; included among these are: federal copyright laws and privacy laws related to student records; state statutes related to computer crimes and political activities of state employees; ethical standards of conduct; dismissal for cause; standards and disciplinary processes related to academic and nonacademic misconduct by students; and conduct on university lands.
Failure to Comply with Information Technology Resource Policies
Failure to adhere to the provisions of this policy may result in the suspension or loss of access to UAHT IT resources; appropriate disciplinary action as provided under existing procedures applicable to students, faculty, and staff; civil action; or criminal prosecution. To preserve and protect the integrity of UAHT IT resources, there may be circumstances where a UA institution may immediately suspend or deny access to the resources.
Oversight, Roles, and Responsibilities
This policy constitutes the UAHT’s policy on the acceptable use of IT resources. It applies systemwide and may not be replaced, superseded, or substantially recreated by other systemwide or institutional policies. Institutions may supplement this policy only for specific programs or services after consultation with the UAHT Chief Information Officer. In order to assist members of the university community in fulfilling their responsibilities with respect to use of IT resources, each UAHT institution shall post this policy on its website.
It is the responsibility of authorized users to comply with this policy.
The chancellor is responsible for implementing this policy and operating the institution’s IT resources consistent with the above-stated provisions.