Acceptable Use, Information Technology

Title: Acceptable Use, Information Technology
Policy Owner: Information Security Office
Applies to: Students, Employees, Users
Campus Applicability: All university departments at all campuses except UConn Health
Effective Date: May 16, 2012
For More Information, Contact Chief Information Security Officer
Contact Information: (860) 486-8255
Official Website:

This policy is available in the Information Security Policy Manual.

The Acceptable Use policy is intended to supplement the State of Connecticut Acceptable Use policy and applies to all users of the University’s computer and network resources.

Information technology (IT) resources must be utilized respectfully and as authorized and designed.

While utilizing University-owned IT resources, no user or administrator is authorized to engage in any activity that violates University policy or any illegal activity under local, state, federal or international law.

Users and administrators may not engage in any activity that interrupts personal productivity or the service of any University resources. Users and administrators will not intentionally disrupt, damage, or alter data, software, or other IT resources belonging to the University or to any other entity. This includes spreading viruses, sending spam messages, performing denial of service attacks, compromising another individual’s ability to use IT resources, and performing system/network reconnaissance.

Users of University systems shall not tamper with, disable, or circumvent any security mechanism, including software applications, login account controls, network security rules, hardware devices, etc.

Users shall not introduce any prohibited information technology resources that could disrupt operations or compromise security of the University’s IT resources.

Manual Created: May 16, 2012