5.01 Acceptable Use of Information Technology Resources

I. Scope

This policy covers authorized users who access information technology (IT) resources under the control of Bradley University. “Authorized users” include, but are not limited to, currently enrolled students, employees, authorized contractors, vendors, and guests, and other such users authorized by Bradley University. It is the responsibility of authorized users to comply with this policy. Unauthorized users may not access or use IT resources under the control of Bradley University.

II. Purpose

The purpose of this policy is to outline the expectations of Bradley University regarding the acceptable use of IT resources by authorized users and to establish the parameters for the use of IT resources.

III. Policy Statement

IT resources are essential tools in accomplishing Bradley University’s mission. Access to and use of Bradley University IT resources is a privilege that extends to authorized users for use in fulfilling the mission of the university, and for appropriate university-related activities. Bradley University IT resources include all electronic equipment, facilities, technologies, and data used for information processing, transfer, storage, display, printing, and communications by Bradley University. These include, but are not limited to, computer hardware and software, computer labs, classroom technologies such as computer-based instructional management systems, and computing and electronic communications devices and services, email, networks, telephones, voicemail, facsimile transmissions, video, multi-function printing devices, mobile computer devices, multimedia and instructional materials. This definition also includes services that are owned, leased, operated, provided by, or otherwise connected to Bradley University resources, such as cloud computing or any other connected/hosted service provided.

Acceptable and Unacceptable Uses of Information Technology:

Acceptable use of Bradley University IT resources includes any purpose related to the direct and indirect support of the university’s educational, research, service, student and campus life activities; administrative and business purposes; financial systems; and human resources administration. Authorized users are provided access to IT resources in order to support their studies, instruction, research, duties, official business, and other university-sanctioned activities according to their roles and responsibilities.

Authorized users must not engage in unacceptable use of Bradley University IT resources, which includes but is not limited to the following:

  1. Sharing or transferring authentication details to others, or using another user’s authentication credentials such as network IDs and passwords, or other access codes or circumventing user authentication which could allow unauthorized users to gain access to Bradley University IT resources, except as required for administrative or business purposes;
  2. Any violation of federal, state, or local laws, institutional policies, rules or guidelines, or licensing agreements or contracts;
  3. Harassment of, threats to or defamation of others, creation of a hostile environment, stalking, and/or illegal discrimination;
  4. Widespread dissemination of unauthorized email messages (e.g., mass mailings, phishing, spam); or
  5. Intentionally damaging, disrupting, or exposing IT resources or data to unauthorized access or harm.

In addition to the examples stated above, unacceptable use of Bradley University IT resources for employees, authorized contractors and vendors, also includes the following:

  1. Storage, display, transmission, or intentional or solicited receipt of material that is or may reasonably be regarded as obscene, sexually explicit, or pornographic, except as such access relates to university-related academic or research pursuits or as needed to investigate violations of this policy or laws;
  2. Outside employment, commercial activities, or other forms of private financial gain;
  3. Campaigning for public office or soliciting political contributions;
  4. Political lobbying, except for specific employees designated to lobby on behalf of Bradley University;
  5. Wagering or betting;
  6. More than minimal use for private or personal purposes that interferes with work or job performance or that interferes with the activities of other employees, students, or other authorized users.

Unless specifically authorized by Bradley University, authorized users must not use Bradley University IT resources to speak on behalf of Bradley University, nor may Bradley University trademarks or logos be used without authorization. Affiliation with Bradley University does not, by itself, imply authorization to speak on behalf of Bradley University. Bradley University is not responsible for the content of documents, exchanges or messages, including links to other information locations on the internet that reflect only the personal ideas, comments, and opinions of individual members of the university community, even when this content is published or otherwise circulated to the public at large by means of Bradley University IT resources.

Privacy and Security:

Bradley University shall take reasonable measures to protect the privacy of its IT resources and accounts assigned to authorized users; however, Bradley University cannot guarantee absolute security and privacy. Any activity on Bradley University IT resources may be monitored, logged and reviewed by automated means, Bradley-approved personnel or may be discovered in legal proceedings. Generally, the contents of user accounts will be treated as private and not examined or disclosed except:

  • as required for system maintenance or business necessity, including security measures;
  • when there exists reason to believe an individual is violating the law or institutional policy;
  • to meet the requirements of any laws, regulations or institutional policies, rules, or guidelines;

or

  • as permitted by applicable law or policy.

Bradley University has the right to employ appropriate security measures, to investigate as needed, and to take necessary actions to protect the university’s IT resources. Bradley University may also have a duty to provide information relevant to ongoing investigations by law enforcement. Where appropriate, Bradley University will work with authorized users to protect their privacy interests, as well as those of the university.

Authorized users must not violate the privacy of other users. Technical ability to access unauthorized resources or others’ accounts does not by itself imply authorization to do so, and it is a violation of this policy to access others’ accounts unless authorized to do so for a legitimate business purpose.

Other Limitations on Use of Information Technology Resources:

In addition to the general principles set forth in this policy, the use of IT resources may be affected by other laws and policies, including, but not limited to, federal copyright laws, privacy laws related to student records, statutes related to computer crimes and political activities; ethical standards of conduct; standards and disciplinary processes related to students, faculty and staff.

Enforcement:

Failure to adhere to the provisions of this policy may result in the suspension or loss of access to Bradley University IT resources, disciplinary action, civil action and/or criminal prosecution. To preserve and protect the integrity of Bradley University IT resources, there may be circumstances where the university may immediately suspend or deny access to IT resources. Information Technology is responsible for implementing this policy.

Date Approved      
September 6, 2023      
Dates Revised      
January 22, 2023      
Dates Reviewed