Information technology (IT) has the ability to distribute and examine a vast array of material with unprecedented speed. One requirement however, remains constant: all information technology use must fully respect the rights of the university and IT community members. This Acceptable Use Policy (AUP) is designed to guide faculty, staff and students in the acceptable use of network and information systems provided by the University of Arkansas at Little Rock. More importantly, it is meant as an application of principles of respect using UA Little Rock computer resources, other computer users, and for the medium itself.
The UA Little Rock community is encouraged to make innovative and creative use of information technologies in support of education and research. Consistent with other university policies, this policy is intended to respect the rights and obligations of academic freedom as well as to protect the resources of the university.
The university campus network is an open network and therefore cannot protect individuals against the existence or receipt of material that may be offensive to them. Those who make use of electronic communications are warned that they may come across or be recipients of material they find offensive. Those who use email and/or make information about themselves available on the Internet should be forewarned that the university cannot protect them from invasions of privacy and other possible dangers that could result from the distribution of personal information. IT and network facilities of the university are finite and limited. These facilities should be used wisely and carefully with consideration for the needs of others. When used appropriately, these tools can enhance dialog and communications. When used inappropriately or unlawfully, these tools can infringe on the rights of others. Current use of IT parallels familiar activities in other media and formats and existing university policies already provide guidance. Using electronic media in the place of standard written correspondence, for example, does not fundamentally alter the nature of the communication, nor will it alter the guiding policies. University policies, which already apply to freedom of expression, privacy and related matters, apply to electronic expression as well. This IT Acceptable Use Policy addresses circumstances, which are new or at least unfamiliar in the IT arena and augments rather than replaces other applicable university policies.
UA Little Rock IT systems include the computers, terminals, printers, networks, modem banks, and related equipment, as well as data files or documents residing on disk, tape, or other media, which are owned, managed or maintained by IT services and/or faculty/staff of UA Little Rock. For example, IT systems include institutional and departmental systems, IT systems managed by UA Little Rock IT services, faculty research systems connected to the campus network, the campus telephone system, and the university’s campus network (which is designed and managed by IT services). Privately owned equipment, such as laptops, PDAs, and home computers are considered an IT system if attached directly or remotely to the campus network and/or is used to access the UA Little Rock campus network.
A user is any person, whether authorized or not, who makes any use of any IT system from any location. For example, this definition includes persons who access IT facilities via an off-campus electronic network, as well as those who use an UA Little Rock dial-in network (e.g., the campus network/Internet) to connect a personal machine to any other networked system or service. An IT user is a user with authorization to access a UA Little Rock IT system(s). IT users include UA Little Rock students, faculty members, staff members, and alumni or alumnae with accounts on IT systems.
A system administrator is an individual with the authority to determine who is permitted access to a UA Little Rock department system or server. For example, UA Little Rock associate director of networks is the UA Little Rock campus network system administrator.
Network security officer (NSO) is an individual charged with maintaining the security of the UA Little Rock campus network and as such, has the authority to investigate security violations to ensure that security policy is complied with.
The purpose of IT is to further the research, education, and administrative functions of UA Little Rock. To achieve this purpose, these policies intend:
- To ensure the integrity, reliability, and performance of UA Little Rock IT systems and network.
- To ensure that the UA Little Rock community of IT users utilize the campus IT facilities in a fair and equable manner with respect for the rights of the community at large.
- To ensure that IT systems and network are used for their intended purposes.
- To establish sanctions and processes for addressing violations.
The IT AUP applies to all UA Little Rock IT systems owned, managed or administered by UA Little Rock faculty, staff and students and any use of those systems. Many particular IT systems (UA Little Rock’s News and World Wide Websites, campus email services, etc.) have service-specific policies, which apply in addition to this AUP. Please refer to postings available with each system to identify all applicable policies.
The policies described herein are those that the university uses in the normal operation of IT facilities and network. This document does not waive any claim that UA Little Rock may have to ownership or control of any hardware, software, or data created on, stored on, or transmitted through UA Little Rock IT systems and network.