Acceptable Use of Computing Resources

Question:
What is acceptable use of computing resources at University of Phoenix Local Campuses?
Answer:
The University's computing and communication resources are the property of the University. Use of University computing and communication resources is a privilege and is provided as a service to the University's users. Among other purposes, these resources are provided for the delivery of curriculum and related materials; for conducting online classes; for conducting educational research; for communication between and among students, faculty members, and staff members; and for accessing and obtaining the University's services.

The use of these resources without authorization, or in excess of their authorization, will be subject to appropriate review processes and sanctions. In addition, all activity and information, including personal activity and information, on University systems may be monitored and recorded. Any individual accessing University computing and communication resources expressly consents to such monitoring and is advised that if such monitoring reveals unauthorized or criminal activity, Information Security personnel will provide the evidence from monitoring to the appropriate University officials for investigation and possible release to law enforcement authorities.

Violation Examples

This list below contains examples of actions considered to be in violation of this policy. It is not intended to be all-inclusive, nor does it represent all possible violations in a particular circumstance or the applicability of any other law or policy to those facts.
  1. Unlawful communications, including threats of violence, obscenity, pornography, and harassing communications
  2. Unauthorized, anonymous communication (all users are required to cooperate with appropriate University personnel or other authorized personnel when investigating the source of anonymous messages)
  3. Misrepresenting or forging the identity of the sender or the source of electronic communication
  4. Altering the content of a message originating from another person or computer with intent to deceive
  5. Use of University computing and communication resources for private business or commercial activities
  6. Fund-raising or advertising on behalf of non-University organizations
  7. The unauthorized reselling of University computing and communication resources
  8. Unauthorized acquisition attempts to acquire and use the user id or passwords of others
  9. Interference with or disruption of the computer or network accounts, services, or equipment of others
  10. The intentional propagation of computer worms and viruses, the sending of electronic chain mail, denial of service attacks, and inappropriate broadcasting of messages to large numbers of individuals or hosts
  11. Failure to comply with requests from appropriate University officials to discontinue activities that threaten the operation or integrity of computers, systems or networks
  12. Revealing passwords or otherwise permitting the use by others (by intent or negligence) of personal accounts for computer and network access without authorization
  13. Altering or attempting to alter files or systems without authorization
  14. Unauthorized scanning of networks for security vulnerabilities
  15. Attempting to alter any University computing or networking components (including, but not limited to, bridges, routers, and hubs) without approval or beyond one's level of authorization
  16. Negligent or intentional conduct leading to disruption or damage of University data, systems, or networks
Contact your University representative for the full acceptable use policy of this network.
Additional Information:
There is no additional information.
We welcome and appreciate your feedback!
Privacy Policy | Website Terms and Conditions | University of Phoenix Trademark Usage

Copyright © 2018 University of Phoenix





Share
Subscribe
Enter your email address to receive a notification when the article is updated
Email Address
Subscribe
Unsubscribe
Share
To
Subject
Message
Send

Was this article helpful
Thank you for your feedback
How can we improve?