Acceptable Use Policy
This policy communicates to users how the IT resources may be used. It covers areas such as personal use of email and the Internet, blogging, excessive use, peer-to-peer file sharing, personal storage media, user software installation, instant messaging, monitoring, copyright infringement, prohibited activities, and much more.
I. Network & Computing Devices
Access to the university's network and related resources is a privilege granted to faculty, staff, students, and other members of the UA&P community to support the university's core missions of teaching, research, and extension, as well as other assigned functions.
As a user of these resources, you have access to valuable equipment, sensitive data, and services. Responsible, ethical, and legal use is expected of everyone.
You are responsible for familiarizing yourself with the regulations and policies governing the use of the university's network and related resources. Exercise good judgment in your use, avoiding any action that could be considered irresponsible, unethical, or illegal.
Specifically, the following activities are prohibited:
Using university resources for political purposes.
Using university resources for personal economic gain.
Engaging in any other activity deemed by the university as irresponsible, unethical, or illegal.
Activities that violate the university's corporate culture or infringe upon recognized laws, such as those related to intellectual property (see the policy on Copyright and Fair Use).
Access is granted only to authorized equipment, network accounts, data, and files. Do not access or copy another user's email, data, applications, or other files without their prior consent. Access to sensitive files and data requires written approval from the owner's OpCom or Unit head.
While the university does not routinely monitor network content, it reserves the right to access and review information when necessary to investigate potential policy violations or to protect the university from claims of institutional misconduct.
II. Use of Web Resources
The internet offers a wealth of resources to enhance your work and productivity. However, it also contains inappropriate, illegal, and potentially harmful content.
To ensure network security, maintain productivity, conserve bandwidth, and mitigate legal risks, the University employs content and application controls. These controls focus on the following:
Security: Websites that pose a security threat, such as those known to distribute malware, spyware, or viruses, are blocked to protect confidential information and prevent computer hijacking.
Legal Compliance: Websites offering pirated content, pornography (especially child pornography), or resources for illegal activities (e.g., crime, drugs, gambling, illegal file sharing) are strictly prohibited due to serious legal implications.
Productivity: University computing resources are intended for work-related activities, including internet access for research, communication, and collaboration. Websites that promote excessive non-productive web surfing, such as gaming sites, are blocked.
Bandwidth Management: To preserve network bandwidth and application performance, downloading large, non-work-related video files and images is restricted.
The following file types and services are permitted but subject to bandwidth limitations:
Multimedia files: .flv, .mp3, .mp4, .mkv, .3gp, .avi, .mpeg, .mpe, .mpg, .mov, .wmv, .ogg, .rm, .ova
Media streaming sites: YouTube, Vimeo, DailyMotion, etc.
Large files: .exe, .iso, .zip, .rar
BitTorrent and peer-to-peer file sharing are blocked.
III. Communication and Collaboration Resources
The University provides a range of communication and collaboration services, including email, text/audio/video chat, calendar/document/site authoring and sharing tools, and access to social media platforms.
These services are designed to support the academic community in its daily teaching and administrative tasks, advance academic and research endeavors, and foster a productive learning environment.
Users of UA&P's online services agree not to:
Distribute Inappropriate Content: Upload, post, email, transmit, or otherwise make available any content or material that is unlawful, harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar, obscene, libelous, offensive, invasive of another's privacy or religious beliefs, hateful, or racially, ethnically, or otherwise objectionable.
Misrepresent Identity or Affiliation: Impersonate any person or entity, or falsely state or otherwise misrepresent an affiliation with a person or entity.
Misrepresent University Views: Use University communication facilities to present personal views or opinions as the institutional views, holdings, or positions of UA&P.
Unsolicited Mass Communication: Broadcast, forward, or transmit unsolicited wide-scale communications that have not been reviewed by the Corporate Communications Office or ICT.
Unauthorized Data Collection: Collect or store personal data about other internal users (e.g., email addresses) in connection with the aforementioned prohibited conduct and activities.
IV. Penalties for Violation of Policies
Violations of ICT policies may result in penalties up to and including account termination, depending on the severity of the violation and its impact on the university, its network, and other users (see the UA&P Code of Discipline).