Illinois Institute of Technology (IIT) expects that all persons who make any use of University computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:
IIT information technology resources are provided with the expectation that the whole University community will use them in a spirit of mutual cooperation; these limited resources must be shared. Users shall avoid any activities which cause problems for others who use the same systems.
All hardware, software, and related services supplied by IIT are for the purpose of supplementing and reinforcing the University's goals as set forth in the mission statement and student and faculty handbooks. Violations include, but are not limited to, giving account passwords to individuals who are not the owners of such accounts, and obtaining passwords to use accounts other than one's own.
No individual shall utilize hardware, software, or services without proper authorization. Copying software is a violation of federal copyright law and is prohibited. Users may not extend their use of the facilities described above for any purpose beyond their intended use, nor beyond those activities sanctioned in University policy statements. Violations include, but are not limited to, the following:
- for personal profit or gain
- to harass, threaten, or otherwise invade the privacy of others
- to initiate or forward email chain letters
- to cause breaches of computer, network or telecommunications security systems
- to initiate activities which unduly consume computing or network resources
Individuals who violate the aims of this policy will be subject to disciplinary action or to referral to law enforcement authorities. IIT’s Office of Technology Services is authorized to monitor suspected violations and to examine items stored on any University storage medium by individuals suspected of violating this policy.