Restrictions on use of IU computing accounts
According to Appropriate Use of Information Technology Resources (IT-01):
Use of Indiana University information technology resources is restricted to purposes related to the university's mission of research and creative activity, teaching and learning, and civic engagement.
The policy continues:
Computing resources and network capacity may not be used for illegal purposes. Examples of illegal purposes include:
- Intentional harassment of other users
- Intentional destruction of or damage to equipment, software, or data belonging to IU or other users
- Intentional disruption or unauthorized monitoring of electronic communications
- Unauthorized copying and/or distribution of copyrighted material
Use of IU computing resources and networks must adhere to all IU policies. For a list of current information technology policies, see Information and IT policies.
Related documents
About use of IU computing resources for political campaigns
Avoid getting in trouble with email
About IU's policy on using information technology resources for commercial advertisement
Avoid allowing someone to use your IU computing account
About chain mail
UITS computing account termination
Your responsibilities as a computer user at IU
About IU's policy on surveys via email
About IU's policy on mass email
This is document advo in the Knowledge Base.
Last modified on 2021-05-24 15:18:11.