Close Menu

Use of Computer Resources Policy

I. USER RESPONSIBILITY

  1. The proper use of all IIT computer accounts and technological resources, including computers, email, Internet, printers, software, servers, voice and data networks and other computer peripherals (collectively, "Computer Resources"), is the personal responsibility of each individual. Use of Computer Resources, whether by faculty, students or staff (collectively, "Users"), must be consistent with institutional policies governing conduct, including those regarding plagiarism, discrimination, cheating, harassment and theft. Users must never represent or imply that the opinions they express on or through Computer Resources are the views of IIT.
  2. Computer Resources are made available to support the academic mission, programs and activities of IIT. Use of Computer Resources is a privilege that is not to be abused, and it can be taken away without prior notice and consent or when required by law or when a substantiated reason exists to believe that violations of law or policy have occurred. In time-sensitive cases, access may be restricted to meet critical operational needs. Any inappropriate, illegal, unethical or immoral use constitutes a violation of this policy regardless whether it is specifically identified herein.
  3. Each User is responsible for the storage of personal files created on IIT Computer Resources. Hard disks are routinely cleared of files. IIT will not be liable, under any circumstances, for files stored on or deleted from its hard disks.
  4. Each User is responsible for taking reasonable care for the security of his or her campus account and password. For example, one should change his or her password frequently; one should not under any circumstances give his or her password to another person. Each User must also recognize that IIT has limited means of preventing unsolicited communications from within and outside of the IIT network. Users who receive threatening or inappropriate communications should bring them to the attention of the appropriate network administrator, General Counsel Office, Office of Human Resources or the Office of Student Affairs.

II. APPROPRIATE USES OF COMPUTER RESOURCES

Examples of appropriate uses of computer resources include, but are not limited to:

  1. Faculty and student research
  2. Class assignments
  3. Instructional uses

III. INAPPROPRIATE USES OF COMPUTER RESOURCES

Examples of inappropriate uses of computer resources include, but are not limited to:

  1. Using Computer Resources for commercial or business purposes
  2. Sending unsolicited, annoying or obscene messages or email to another computer or computer user
  3. Utilizing a false identity in obtaining or utilizing an email account or to gain access to a Computer Resource
  4. Displaying adult web sites (especially those self-identified as such) or other obscene materials in public computer laboratories
  5. Examining or attempting to examine another user's files, accounts or email, without explicit permission by the owner of those files or email
  6. Interrupting, hindering, damaging or otherwise interfering with the normal operation of the computer laboratories, systems, data and/or voice networks, including, but not limited to, port scanning, IP spoofing, network analysis, network monitoring, illegal logins, running traffic-generating applications, installing any software or program code that is intended to or likely to result in the eventual damage to or degradation of the performance of Computer Resources; or using Computer Resources to perform acts that are deliberately wasteful of computing resources
  7. Posting copyrighted text or images on a web page without the owner's permission or in any other way violating copyright laws, including, but not limited to, the use of peer-to-peer file sharing applications to illegal transmit music, software, movies or other protected materials
  8. Using Computer Resources to engage in or further any fraudulent or criminal act or to violate IIT policies, including, but not limited to, monitoring, in any way, another User's data communications; gaining or attempting to gain access to remote computers, infringing on the rights of other Users to use Computer Recourses; or violating the terms of software licensing agreements

IV. PRIVACY ISSUES AND ACCESS TO FILES

  1. Users have only a limited right to privacy in their electronic and voice mail. IIT does not monitor, review or perpetually archive material prior to or after transmission on Computer Resources. Authorized IIT staff will treat all electronically stored information as confidential, but they may examine or disclose information when (i) the owner of the information authorizes disclosure, (ii) a User is suspected of violating IIT policies or local, state or federal law including, but not limited to, laws regarding harassment, copyright, libel and defamation of character, or (iii) an employee is terminated and his or her files are need in the course of operations at IIT.
  2. The email system at IIT exists to provide a convenient (not confidential) way of communicating between students and faculty, between colleagues and friends. It is expected that Users will use common courtesy in the use of email. Examples of inappropriate use include, but are not limited to: (1) Re-posting (forwarding) personal communication, intended to be confidential, without the author's prior consent; (2) "Chain letters," "broadcasting" messages to lists or individuals, and other types of use which would cause congestion of the networks or otherwise interfere with the work of others are not allowed; and (3) Anonymous and/or fraudulent posting of email messages.
  3. Email is a form of public communication and cannot be guaranteed to be private. Messages can be intercepted while in transit through the system. Users are advised to be discreet. Issues of personal privacy and data confidentiality are important to IIT. Personal data will only be accessed in accordance with part IV, section A. Systems and network administrators do have access to files stored on IIT servers. In the course of routine system maintenance, trouble-shooting and mail delivery problem resolution, staff may see the content of email messages; however, these individuals are prohibited from accessing personal files except as otherwise stated in part IV, section A.

V. INTELLECTUAL PROPERTY

All communications and information accessible via the Internet should be assumed to be copyrighted and should be accessed and re-distributed using regular copyright rules. When sources found on the Internet are cited, the name, date and location of the information must be included.

VI. WEB PAGE RESPONSIBILITIES

The Office of Technology Services (OTS) and the Center for Law and Computers (CLC) have devised specific rules and procedures applicable to IIT-related web pages. All web pages contained within the iit.edu and kentlaw.edu domains or served on IP addresses owned by IIT are subject to the following content guidelines as well as all other applicable IIT policies.

  1. OTS and CLC are responsible for the web servers only, including maintenance, infrastructure and reasonable security. OTS and CLC are not responsible for any web page content or hyperlinks. Links from www.iit.edu and www.kentlaw.edu main pages to the organization and department pages are maintained by the Office of Marketing and Communications at the Main Campus and the Office of Public Affairs at the Downtown Campus.
  2. The content of the first-level pages on the IIT web site, www.iit.edu, is designed and specified by the Office of Marketing and Communications, and the content of the first-level pages on the Chicago-Kent web site, http://www.kentlaw.edu, is designed and specified by the Office of Public Affairs.
  3. All other web pages contained within, except individual faculty, staff and student pages, should follow the design standards set forth by the Office of Marketing and Communications and Public Affairs.
  4. All pages must clearly display at the bottom of the page the name and email address of the person responsible for the page.
  5. Pages cannot contain or transmit any information that is illegal, pornographic, defamatory, obscene or harassing.
  6. Users are prohibited from serving pages that conduct electronic commerce or contain paid advertising. Pages must not cause interference with the ability of other users to access network resources.
  7. Pages that do not meet acceptable use or content standards are subject to immediate removal and suspension of web privileges as well as further disciplinary procedures as specified by the IIT procedures manual.
  8. Student organizations and private, individual pages should link to a disclaimer stating that the content does not express the views of IIT.

VII. COMPLIANCE PROCEDURE

Inappropriate uses of Computer Resources should be reported to the Office of Technology Services via abuse@iit.edu . Security related questions and issues should be directed to security@iit.edu. Anyone discovered to be hindering normal operations or making inappropriate use of Computer Resources will be contacted and appropriate action taken. Upon report of a violation, the User may be denied access to IIT Computer Resources. All pertinent information on the alleged violation will be given to the appropriate IIT official who may then take action in accordance with applicable policies.