Skip to main content

Computing Usage Policy

Purpose

To ensure appropriate usage of UA Zuckerman College of Public Health networking and computing resources. Networking and computing resources are defined as, but not limited to, desktop computers, laptop/portable computers, handheld devices, servers, printers, plotters, other peripheral equipment, networking equipment, and software, purchased through University funds by the College.

Policy

The University of Arizona, through the UA Zuckerman College of Public Health provides computing resources and network access to qualified members of the UA Zuckerman College of Public Health community for legitimate academic and administrative purposes. All members of the university community utilizing UA Zuckerman College of Public Health computing and network resources are expected to be aware of specific policies governing their use, and should act responsibly while using the College computing and network resources. Specific usage policies and guidelines follow. All policies are subject to change as the computing and network environment evolves.

Each person using UA Zuckerman College of Public Health computing and network resources should:

1.       Comply with the University’s Approved Use of University Computing and Communications Equipment (http://policy.arizona.edu/information-technology/approved-use-university-computing-and-communication-equipment).

2.       Take no actions which violate:

·The Student Code of Conduct(http://azregents.asu.edu/rrc/Policy%20Manual/5-308-Student%20Code%20of%20Conduct.pdf );

·The Classified Staff Policy Manual ( http://policy.arizona.edu/classified-staff-human-resources-policy-manual ); or

·The University Handbook for Appointed Personnel (http://policy.arizona.edu/university-handbook-appointed-personnel) as applicable to each person.

3.       Abide by security measures implemented to protect information, data, and systems including the University's Security Policy & Guidelines. Examples of adhering to this policy include periodic establishment of new passwords for your computer accounts, and limiting use to only the authorized account owner. Use extreme caution when communicating confidential or sensitive matters. Do not assume that e-mail is private and confidential. Ensure the confidentiality of sensitive data and files by applying stringent security measures as needed, such as password protection and encryption. Examples of misuse include using a computer account and/or obtaining a password that you are not authorized to use, using the campus network to gain unauthorized access to any computer system, and using a listening device ("sniffer") or other methods in an attempt to "crack" passwords.

4.       Clearly and accurately identify yourself in electronic communications. Concealing or masking the identity of electronic communications such as altering the source of an email message by making it appear as if the message was sent by someone else, or the sending of anonymous email is in violation of this policy.

5.       Use computer and network resources efficiently. Playing games is prohibited. Use of high network utilization applications such as streaming video and Internet radio is discouraged, though not prohibited, in remote locations that share lower speed network technologies such as DSL or broadband. Use printers located in college locations for academic or administrative purposes only. Using printers as a "copy machine" to print multiple copies of a document is prohibited. Other examples of inappropriate use include deliberately wasting computer resources by sending unsolicited mail either individually or via listservs and/or newsgroups (SPAM's), and sending "chain letters" or engaging in "pyramid" schemes.

6.       Ensure that others are free from harassment or intimidation. Do not use computer systems to intentionally send viruses. Do not use computer systems to send, post, or display offensive, abusive, slanderous, vulgar, or defamatory messages, text, graphics, or images. This includes harassment and intimidation of individuals on the basis of race, sex, religion, ethnicity, sexual orientation, disability, etc.

7.       Ensure that the use of computer resources and networks is academically oriented. Use of your computer account and computer or the network for profit or commercial gain is prohibited. Examples include using your computer account or computer for engaging in commercial profit-based endeavors, such as, consulting services, software development, and/or advertising products/services.

8.       Respect copyright and intellectual-property rights. Users must adhere to the University of Arizona Copyright Policy, and the terms and conditions of any and all software licensing agreements and/or copyright laws as specified by the vendor or licensor. (see http://www.library.arizona.edu/help/tutorials/copyright/index.html).

9.       Respect University property. The computing and network resources purchased through University funds are the property of the University. This includes all peripheral devices, files, programs, and email messages. Misuse of University property includes, but is not limited to, theft or damage of equipment or software, knowingly running or installing computer viruses or password cracking programs, attempting to circumvent installed data protection methods that are designed and constructed to provide secure data and information, or in any way attempting to interfere with the physical computer network/hardware, or attempting to degrade the performance or integrity of any campus network or computer system.

10.   Respect and adhere to other departmental/college/Internet Service Provider's acceptable use policies. When using a COPH computer system and/or network to connect to a non-COPH system or network, adhere to the prevailing policies governing that system or network. However, this does not in any way release your obligation to abide by the established policies governing COPH computing systems and network.

Consequences of Misuse and/or Non-Compliance

Misuse of computing and network resources or non-compliance with written usage policies may result in one or more of the following consequences:

  • Temporary deactivation of computer/network access
  • Permanent deactivation of computer/network access
  • Disciplinary actions taken by the College or Dean of Students Office
  • Expulsion from school or termination of employment
  • Subpoena of data files
  • Legal prosecution under applicable Federal and State laws
  • Possible penalties under the law, including fines and imprisonment

Questions about College Computing policies and reports of possible violations should be addressed to cophoit@email.arizona.edu .

The University of Arizona red triangle graphic