University of the Virgin Islands
The University of the Virgin Islands' intention for publishing an Acceptable Use Policy
is not to restrict or limit access to University electronic resources for faculty,
staff or students but to ensure the University and its stakeholders are protected
from illegal or damaging actions by individuals either knowingly or unknowingly.
The University of the Virgin Islands has invested institutional resources, both monetary
and human, to provide the electronic resources needed for University stakeholders
to perform the business of the University. The very nature and expense of these resources
make them both valuable and limited and a privilege granted to University stakeholders.
With this privilege, the University imposes the necessary obligations and responsibilities
upon its stakeholders. The University is endowing all of these stakeholders with the
overall responsibility to maximize the resources and use them in an ethical and efficient
way consistent with University policies and contracts, and territorial and federal
laws. The University makes resources available to its campuses, its instructional
sites and to stakeholders remotely in the expectation that these resources will be
used for the purpose of performing University business in the process of achieving
the mission and vision of the University. The University accepts the reality that
personal calls or emails may be received and/or sent.
The expectation of acceptable use is consistent with the University's seven management
values, including uncompromised integrity, fiscal responsibility, and high quality
services that reflect academic honesty and shows deliberate acknowledgement of the
impact of consuming scarce and shared resources. This obligation to the University
dictates adherence to intellectual property policies, protection of private and personal
data, respect for data ownership and copyright laws, system security mechanisms, and
individuals' rights to privacy and to freedom from intimidation, harassment or a hostile
work environment. This includes viewing, downloading or storing pornography. Any actions
that disregard these values demonstrate unacceptable use of the University's resources
and could jeopardize access to these resources.
The "Resources" covered by this policy include, but are not limited to:
- All University owned, operated, leased, or contracted computing, networking, telephone,
videoconference technologies and e-learning information resources, whether they are
individually controlled, handheld, shared, stand alone, or networked;
- All information maintained in any form and in any medium within the University's
computer resources, and
- All University voice, video and data networks, email systems, telecommunications
infrastructure, communications systems and services and physical facilities including
all hardware, software, applications, databases and storage media. This includes telephone
use and long distance access codes, all classroom equipment and all media equipment
circulated from the University libraries. Personal devices that are used to access
these networks and systems are also covered under this policy.
- All shared data storage resources both local and cloud-based, including storage on
email servers, portal servers, and shared network drives.
By accepting access to the University's resources, all stakeholders understand and
agree to the following:
- Resources shall not be used for any illegal activity or for any activity prohibited
by this policy including but not limited to the items specifically listed in the following
section, the Student Code of Conduct, the Faculty Policy Manual, UVI Code of Conduct
and the Employee Policy Manual.
- Resources shall not be used to infringe upon or otherwise impair, interfere with
or violate any copyright or other intellectual property rights of another. This pertains
to all copyrighted material, including, but not limited to music, video and software
licenses. Stakeholders may be potentially liable for misuse of the resources, including
acts that are contrary to University policy. It is the user's responsibility to know
the copyright laws, including fair use of digitized works. Users can get additional
information from the University's Libraries or the Centers for Excellence in Teaching
and Learning if they are unclear about the limits of use.
- Stakeholders shall avoid any action that interferes with the efficient operation
of resources or impedes the flow of information necessary for academic or administrative
operations of the University.
- Stakeholders shall protect their computer resources such as passwords from unauthorized
use. They are responsible for reasonably securing their computer, including implementing
such protections as timeouts to prohibit unauthorized use. Users are also responsible
for using strong passwords and making sure they are changed on a regular basis.
- Stakeholders shall access only information that belongs to them, which is publicly
available, or to which their access has been authorized by individuals or their role
in Banner. They shall only access networks, network resources, and information for
the intended use.
- Stakeholders shall manage shared data storage resources by limiting the amount of
storage used for archived email to ten (10) gigabits per user (or the amount outlined
by the President); by archiving course information locally when asked to do so; and
by abiding by storage limits on other shared systems when they are implemented.
Stakeholders are also informed by the University that:
- Electronic data, software, and communication files may be copied to backup tapes
and stored for a certain period of time. Items that were deleted may be preserved
on backup tapes and retrieved if necessary. This does not include all stored items
nor does it absolve stakeholders from creating and maintaining a regular backup of
their data and electronic communications.
- All activity on systems and networks may be monitored, logged, and reviewed by system
administrators or discoverable in legal proceedings. In addition, all documents created,
stored, transmitted, or received on University computers and networks may be subject
to monitoring by system or telephone administrators.
- While every effort is made to ensure the privacy of University email, this may not
always be possible. Communication tools such as email, network, Internet, and telephone
should not be considered private. Confidentiality cannot be guaranteed. The University
reserves the right to monitor all email messages, network, Internet, and telephone
connections.
- The University values academic freedom, free inquiry and freedom of expression. These
privileges will not be restricted or interfered with because of the use of an electronic
medium.
- The University recognizes both the value and expectation of privacy, however, some
circumstances may warrant access to data and resources without the consent of the
stakeholder, including:
- When necessary to identity or diagnose systems or security vulnerabilities and problems,
or otherwise preserve the integrity of the resources;
- When required by territorial or federal law or administrative policies;
- When there are reasonable grounds to believe that a violation of law or a significant
breach of University policy may have taken place and access and inspection or monitoring
may produce evidence related to the misconduct;
- When such access to resources is required to carry out essential business functions
of the University; or
- When required to preserve public health and safety.
Examples of Unacceptable Use:
Behavior which violates this policy includes, but is not limited to:
- Accessing another person's computer, computer account, files, or data without permission.
- Using the campus network to gain unauthorized access to any computer system.
- Using any means to decode or otherwise obtain restricted passwords or access control
information.
- Attempting to circumvent or subvert system or network security measures. Examples
include creating or running programs that are designed to identify security loopholes,
to decrypt intentionally secured data, or to gain unauthorized access to any system
or application.
- Engaging in any activity that might be purposefully harmful to systems or to any stored
information, such as creating or propagating viruses, disrupting services, damaging
files or making unauthorized modifications to or copies of University data.
- Performing any act, intentionally or otherwise, that will interfere with the normal
operation of telephones, computers, peripherals, or networks.
- Making or using illegal copies of copyrighted software, storing such copies on University
systems, or transmitting them over University networks.
- Harassing or intimidating others via email, social networks or text messaging.
- Initiating or propagating any chain letters, items for sale or generating other email
not consistent with the University's mission and vision, unless a resource has been
designated for that specific purpose.
- Initiating or facilitating in any way mass unsolicited and unofficial electronic mailing
(i.e., "spamming", "flooding", ", or "bombing.").
- Forging the identity of an authorized stakeholder or machine in an electronic communication.
- Saturating network or computer resources to the exclusion of another's use, for example,
overloading the network with traffic such as emails or legitimate (file backup or
archive) or malicious (denial of service attack) activities.
- Using the University's systems or networks for personal gain; for example, by selling
access to your ID or to a University system or network, by making personal toll calls
or by performing work for profit with University resources in a manner not authorized
by the University.
- Engaging in any other activity that does not comply with the general values presented
above.
Enforcement
The University's first priority is to protect the resources, as defined above, from
any event that interrupts or deteriorates operation. Any interruption in service is
unacceptable to the University community and must be mitigated as quickly as possible.
Information and Technology Services (ITS) will use its best efforts to contact the
offending party via email, telephone, or in person to explain the problem and discuss
its resolution before taking any action deemed necessary to protect the integrity
of the resources. In the case of major infractions, for example those that impair
others' ability to use networking and computing resources, ITS may immediately restrict
systems or network access as it deems necessary to mitigate such activities. Only
thereafter will ITS make a reasonable effort to contact the involved parties when
these incidents occur.
Reports of alleged unacceptable use of University resources is important and taken
very serious. To this end, the University will diligently investigate and take actions
necessary to review files, copy logs, or review system access related to the alleged
unacceptable use. University stakeholders are governed by University policies that
include manuals and conduct for behavior policies for faculty, staff and students.
Behavior that violates the acceptable use of University resources will be referred
to the appropriate organizational unit for discipline according to these policies.
In every case, the supervisor, manager or component head in conjunction with the relevant
University policies will determine any misconduct.
During this investigation or discipline process, it may be determined that access
to any or all resources will be denied, as the discipline warrants.
Sources Used in the Development of this Document
- This document is a compilation of best and standard practices and language from institutions
of higher education modified to fit the specific needs of the University of the Virgin
Islands. Specifically, this includes, but is not limited to:
- Acceptable Use Policy (AUP) for Computing and Networking Resources at Colorado State
University, with permission by Patrick Burns, Vice President Information Technology
(Colorado State University, 2011) http://www.acns.colostate.edu/Policies/AUP
- Academic Freedom and Electronic Communications, AAUP Policy Tenth Ed.2 (2004)
http://www.aaup.org/AAUP/pubsres/policydocs/contents/electcomm-stmt.htm
- Acceptable Use Policy, Marquette University, with permission by Kathy Lang, Chief
Information Officer (Marquette University, 2007, 2011) http://www.marquette.edu/its/about/aup.shtml