| Title: | Acceptable Use, Information Technology |
|---|---|
| Policy Owner: | Information Technology Services/Chief Information Security Officer |
| Applies to: | All University Information Technology Users |
| Campus Applicability: | All Campuses, except UConn Health |
| Approval Date: | March 4, 2026 |
| Effective Date: | March 9, 2026 |
| For More Information, Contact: | UConn Information Security Office |
| Contact Information: | techsupport@uconn.edu or security@uconn.edu |
| Official Website: | https://security.uconn.edu/ |
BACKGROUND
The University’s Information Technology (IT) Resources support the academic, research and administrative needs of the University’s constituents, including students, faculty, staff, and guests. These resources must be used in a responsible manner consistent with Federal and State laws and University policies.
PURPOSE
To define expectations of appropriate use and inform all users of IT Resources at UConn of their obligation to comply with all existing laws and institutional policies in their use of these resources.
APPLIES TO
This policy applies to all constituents (students, faculty, staff, affiliates and guests) who use UConn’s IT Resources, including but not limited to wired and wireless networks, computer-based systems and services, printers/copiers, and cloud-based services.
DEFINITIONS
Access Point (AP): A networking hardware device that allows other Wireless (Wi-Fi) devices to connect to the University network.
Information Technology (IT) Resources: Include but are not limited to:
- Systems and equipment such as computers, hard drives, printers, scanners, video and audio recorders, cameras, photocopiers and other related devices.
- Software such as computer software, including open-source and purchased software, and all cloud-based software including infrastructure-based cloud computing and software as a service.
- Networks such as all voice, video, and data systems, including both wired and wireless network access across the institution.
Internet of Things (IoT): Devices that communicate across a network without direct human interaction. These include but are not limited to smart assistants, lightbulbs, appliances, and televisions.
Software: Includes but is not limited to any electronic program, data file, subscription to an electronic service, or operating system necessary to conduct business on an electronic device.
POLICY STATEMENT
The appropriate use of IT Resources focuses on three primary areas including: (1) the fair and equitable use of limited resources by all constituents; (2) individual responsibilities in the use of UConn IT Resources; and (3) the appropriate use of IT Resources in compliance with all applicable federal and state laws, university rules, regulations and policies.
All activities involving the use of IT Resources are not personal or private; therefore, users should have no expectation of privacy in the use of these resources. Information stored, created, sent or received via UConn systems, including cloud-based systems, may be accessible when required by law, including requests made under the Freedom of Information Act (FOIA), the Family Educational Rights and Privacy Act (FERPA), subpoena, or other legal process, statute, or regulation.
ACCEPTABLE USE
- UConn provides IT Resources to enable faculty, students, and staff to accomplish their university-related work and support the University’s mission. University equipment is to be used primarily in support of the University’s mission and may not be used to conduct commercial activities or any activity prohibited by state and federal law or University policy.
- IT Resources, including third-party cloud services, may not be used for the illegal download, copying, or distribution of copyright materials without the copyright owner’s permission or where not permitted by fair use standards under the TEACH Act.
- Actions that negatively impact the ability of the University to operate or cause undue stress on IT Resources are prohibited. These actions include but are not limited to interfering with the legitimate use of IT Resources by others, introducing additional software or devices to any IT Resource without appropriate authorization, or the mass mailing of unapproved email or other electronic communication.
- Do not intentionally seek or provide information or access to IT Resources to which one is not authorized, nor assist others in doing so. Do not attempt to subvert or circumvent University systems’ security measures nor use University IT Resources to subvert or circumvent other systems’ security measures for any purpose.
- Do not publish, post, transmit or otherwise make available content that is in violation of law or policy. The University cannot protect individuals against the existence or receipt of material that may be offensive to them. As such, those who make use of electronic communications are warned they may come across or be recipients of material they find offensive or objectionable.
- Do not violate the privacy of other individuals. This includes viewing, monitoring, copying, altering, or destroying any file, data, transmission or communication unless you have been given explicit permission by the owner.
- Do not forge, maliciously disguise or misrepresent your personal identity. This policy does not prohibit users from engaging in anonymous communications, providing that such communications do not otherwise violate the Acceptable Use Policy.
- University technology resources may not be used by employees of the University for partisan political purposes or presenting the impression the University has a particular political position except for those individuals authorized by the University as part of their formal responsibilities.
SOFTWARE
- Use of software on university owned assets must comply with all applicable laws, regulations, and license requirements.
- The University shall procure software licenses for all programs necessary to meet its needs in accordance with copyright law. The use of University licensed software is restricted to conducting University business including uses necessary to support the academic mission.
- Only authorized software shall be installed or used on university owned assets. The use of unlicensed software copies (software used in violation of the software license), personally licensed software, and unauthorized open source or shareware software is prohibited.
- Use of university IT Resources to make software copies in violation of a licensing agreement is prohibited.
- Users of university license agreements shall cooperate and comply with the University Software Librarian, the Information Security Office, the Office of Compliance, and the Controller’s Office regarding the inventory or audit of software assets and any licensing disputes.
- Use of software that may cause harm to the University or its systems is prohibited. By way of example, prohibited software includes but is not limited to: malware, viruses, worms, trojans, pirated software, cracked software, packed software, potentially unwanted programs (PUP), software obtained from secondary or non-legitimate sources, software intended or used for offensive hacking (without appropriate approval and containment controls), or any other software which by its use or design may cause harm to University services and systems.
INDIVIDUAL RESPONSIBILITIES
- Protect your data and the institution’s data
- Do not share your password, multi-factor authentication, or any other form of security credential with ANYONE or allow anyone else to use your account(s).
- Do not use anyone else’s account.
- Be vigilant in identifying and reporting various types of phishing attacks to gain access to your information. Store confidential and/or sensitive University data on appropriate University approved services only.
- All university owned and personal devices connecting to the University network (including tablets, cell phones and IoT devices) must be kept up-to-date with current operating system and software patches, and employ automatically updating security measures including but not limited to anti-virus and anti-malware.
- Do not utilize UConn computing resources, including personally owned computers connected to UConn’s network for non-University related commercial activity.
- Users who permit others to connect to a computer acting as a server have the additional responsibility to respond to any use of their server that is in violation of the Acceptable Use Policy. Administrators of IT Resources and those who permit the use of computers by others are responsible for the security of their systems and the actions of others on their systems.
ENFORCEMENT
Violations of this policy and any related procedures may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the University of Connecticut Student Code.
Individual or system access may be revoked at any time based on the decision of the Chief Information Security Officer or the Chief Information Officer to protect the confidentiality, integrity, and/or availability of UConn IT Resources.
PROCEDURES/FORMS
Questions about this policy or suspected violations may be reported to any of the following:
Office of University Compliance – https://compliance.uconn.edu (860-486-2530)
Information Technology Services Tech Support – https://techsupport.uconn.edu (860-486-4357)
Information Security Office – https://security.uconn.edu
POLICY HISTORY
Policy created: May 16, 2012
Revisions:
August 24, 2015
August 30, 2021 (Approved by President’s Senior Team)
March 4, 2026 (Approved by the Senior Policy Council and President)