Alpha Index :  Table of Contents :  Official University Policies & Procedures :  Questions :  UC Irvine 

UC IRVINE ADMINISTRATIVE POLICIES & PROCEDURES


BUSINESS AND FINANCIAL AFFAIRS
Computing and Information Systems
Sec. 714-18: Computer and Network Use Policy


Responsible Administrator: Assistant Vice Chancellor - Information Technology
Revised: September 2011    

 

References / Resources

Contact: Office of Information Technology (OIT) at (949) 824-2222 or oit@uci.edu


The University of California, Irvine (UCI) provides computing resources and worldwide network access to members of the UCI electronic community for legitimate academic and administrative pursuits to communicate and to retrieve and disseminate information. All members of the UCI community (faculty, staff, students, and authorized guests) sharing these resources also share the rights and responsibilities for their use.


A. Rights and Responsibilities

Worldwide, open access electronic communication is a privilege and continued access requires that users act responsibly. Users should be able to trust that the products of their intellectual efforts will be safe from violation, destruction, theft, or other abuse. Users sharing computing resources must respect and value the rights and privacy of others, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Users are responsible for refraining from acts, intentional or inadvertent, that obstruct the access of others to these resources, waste limited resources, harm resources or information, or violate the rights of others.

To help protect computer and network resourcesfiles, users are responsible for setting passwords appropriately, and for keeping passwords confidential by not giving them to another person, and for following other appropriate security procedures. Personal equipment accessing the network must conform to Section 800-18: Security Guidelines for Computers and Devices Connected to UCInet. In particular, personal computers must have current security patches applied and the appropriate security software (e.g., anti-virus protection) properly functioning. Guidance on appropriate security measures may be obtained from OIT or an administrative Information Security Coordinator. Users connecting equipment to the network which threaten the security of the network or other systems by failing to follow this guidance may have their ability to connect equipment to the network suspended.

Most UCI owned computers are under the control of system administrators or managers, who are required to respect the privacy of computer system users. However, they may access user files or suspend services on the systems they manage without notice as required to protect the integrity of computer systems or to examine accounts that are suspected of unauthorized use or of having been misused, corrupted or damaged. This includes temporarily locking vulnerable accounts, removing hung jobs, reprioritizing resource-intensive jobs, etc.

In addition to campus and UC policies such as the Electronic Communications Policy, many UCI departments have their own computing and networking resources and policies. When accessing computing resources, users are responsible for obeying both the policies described here and relevant departmental policies. Students are also responsible for obeying the policies described in the UC Policies Applying to Campus Activities, Organizations, and Students. In addition, all users are responsible for obeying policies of off-campus network services accessed using UCI resources.


B. Examples of Misuse

Examples of misuse include, but are not limited to:


C. Consequences of Misuse

Misuse of computing, networking, or information is unacceptable, and users will be held accountable for their conduct. Serious infractions can result in temporary or permanent loss of computing and/or network privileges and/or Federal or State legal prosecution. Appropriate corrective action or discipline may be taken in conformance with applicable personnel policies, student policies, collective bargaining agreements, and procedures established by the Academic Senate. (In extreme cases, corrective action may include dismissal.) California Penal Code, Section 502 makes certain computer abuses a crime, (such as illegal reproduction of software protected by U. S. copyright law) and penalties can include a fine and/or imprisonment. Files may be subject to search under proper authorization.

Minor infractions of this policy, such as poorly chosen passwords, use of resources in a manner which impedes but does not totally block their use by others are typically handled internally to the department in an informal manner. More serious infractions such as abusive behavior, account invasion or destruction, attempting to circumvent system security, etc. are handled formally through the Office of the Dean of Students or by other appropriate officials.


D. Contact Information

For additional information contact Office of Information Technology (OIT) at (949) 824-2222 or oit@uci.edu.

 Alpha Index :  Table of Contents :  Official University Policies & Procedures :  Questions :  UC Irvine