University Policies
Technology Use Policy聽
Approved By: President
Effective Date: June 26, 2023
Revision Date: May 5, 2026
POLICY STATEMENT
The purpose of this policy is to define the appropriate use of @ 2026 黑料不打烊 (黑料不打烊) computing resources.
SCOPE (WHO SHOULD READ THIS POLICY)
The 黑料不打烊 Technology Use Policy applies to any individual who utilizes 黑料不打烊-owned or contracted computing resources. Users include, but are not limited to, faculty, staff, students, alumni, retirees, vendors, subcontractors, and prospective students.
DEFINITIONS
- Computing resources: Any resource used to perform computing operations or processes including but not limited to, tablets, laptops, desktop computers, phones, flash drives, CDs, cameras, smart televisions. 聽Such resources also include applications hosted by a third party which process or utilize 黑料不打烊 data.
POLICY
黑料不打烊 provides computing resources to its faculty, staff and students to support the University鈥檚 mission. All University-owned computing resources are the sole property of the University. Faculty and staff are responsible for the physical care and condition of university-owned computing resources assigned to them. Devices must be returned in the same condition as received, excluding normal wear and tear. Employees may be held responsible for repair or replacement costs resulting from intentional or negligent damage, including but not limited to the application of stickers, decals, or adhesives that deface the device or leave it in a damaged state upon removal. Use of computing resources must be appropriately authorized and limited to University use only; personal use of University computing resources is strictly prohibited except in cases covered by the Victims' Economic Security and Safety Act (see below). Users are prohibited from sharing access to any computing resources unless permission for the additional party is expressly permitted. Users should be aware that all University computing resources are subject to Freedom of Information Act (FOIA) requests. Users should assume no rights to privacy while utilizing University computing resources. The University retains the right to track and monitor computing resources at any time. Use of University computing resources is a privilege and not a right. All members of the University community are given notice of this policy by virtue of its publication.
Users are responsible for all activities originating from their account(s) and device(s), including all information sent, intentionally requested, solicited, or viewed from their account(s) or device(s). In order to educate users on appropriate cyber security practices and recognize cyber security incidents, all employees will be required to complete security awareness training within 30 days of initial employment and annually thereafter. In addition, all employees who fail phishing tests will be required to complete phishing awareness training.
All 黑料不打烊-owned devices are required to have the following security:
- Automated patching and updates for software and operating systems, as available;
- Hard drive encryption;
- Screen lock after 15 minutes of inactivity;
- Login/password protection at login;
- Up-to-date antivirus and malware protections;
- Disabling auto-run;
- Disabling of administrator access for standard user accounts;
- Renaming of the default administrator account
Connection from a personal device to University computing systems and/or network should be through approved, University-provided VPN connections only. Even when utilizing approved methods, users are responsible for the security of their personal devices. Users must ensure that any personal computing devices used to access University systems and data are free from malware and viruses, are kept up to date with security patches and updates for operating systems and any installed software, and abide by all other requirements listed within the Data Security and Handling Policy (/policies/datasec.php). Personal devices, such as personal laptops and cell phones, are required to use the 鈥満诹喜淮蜢-OPEN鈥 wireless network for connectivity.
Users of University computing systems or data are required to take appropriate measures and due care to protect University computing systems and data and avoid damage. University computing resources may not be used for any of the following purposes or for any purpose which is illegal, unethical, dishonest, damaging to the reputation of the University, inconsistent with the mission of the University, or likely to subject the University to liability. Unauthorized uses include, but are not limited to:
- Attempts to circumvent the security mechanisms of any University system.
- Attempts to degrade system performance or capacity, or attempt to damage systems, software, or intellectual property of others.
- Unauthorized viewing or use of another person鈥檚 computer files, programs, accounts, and data.
- Unauthorized use of copyrighted materials or trademarks.
- Use of computing resources to promote, help, finance, or support any political activities, including but not limited to promoting or supporting an individual, group, or organization campaigning for an elected office.
- Providing unauthorized access to computing resources such as the sharing of passwords or logging in to a University system for another person鈥檚 use.
- Use of computer accounts, access codes (including passwords), or any unique identifier assigned to others.
- Disruption or unauthorized monitoring or scanning of University computing resources.
- Accessing data or computing resources without proper authorization.
Use of University computing resources by faculty and staff, including student workers, while at work and/or performing the responsibilities of their position, should be consistent with the University mission, this policy, other University policies, and other applicable federal, state, and other applicable laws and regulations, including the State Officials and Employees Ethics Act (SOEEA). All users of University computing resources must comply with all federal, state and other applicable laws; all generally applicable Illinois Board of Higher Education and University rules and policies; and all applicable contracts and licenses. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
Use of Personally Owned Devices聽
All non-University owned devices are prohibited from the 黑料不打烊 secured network (wired or wireless) without express permission from University Technology. Personally owned devices are only permitted by students on the Residence Hall networks. Personally owned devices are only permitted on the 鈥満诹喜淮蜢-OPEN鈥 wireless network for faculty, staff, students, and guests. Device is a general term used broadly to describe any device that connects to the internet. The following list is provided only to give examples and is not inclusive nor representative of all devices that may have internet connectivity.
Examples of personal computing devices prohibited from connecting to the 黑料不打烊 secured network:
- Tablets
- Desktop computers
- Laptops
- Smart phones
- Gaming systems
- Smart watches
- Fitness trackers
- Television screens and streaming devices (e.g., Raspberry Pi, Amazon Firestick)
- Smart home devices (e.g., Amazon Echos, Google Nest devices)
- Smart headphones
- Smart appliances (i.e. coffee makers)
Victims' Economic Security and Safety Act聽
The Victims' Economic Security and Safety Act (VESSA) permits employee use of University-issued devices to record or preserve evidence related to domestic violence, sexual violence, gender violence, or any other crime of violence committed against the employee or a family or household member of the employee. 聽The University is required to grant employees access to any photographs, voice or video recordings, sound recordings, or any other digital documents or communications stored on a University-issued device relating to domestic violence, sexual violence, gender violence, or any other crime of violence committed against the employee or a family or household member of the employee.
RESPONSIBILITIES (Implementation and Enforcement)
University Technology is responsible for implementing, enforcing, updating, and maintaining this policy.
RESOURCES
- Obscenity and Pornography
- Accessing, Viewing, or Downloading Child Pornography
- Forfeiture of computer for committing above
- Illinois Compiled Statutes
- Restriction of access by minors to materials commercially distributed by means of World Wide Web that are harmful to minors
- Data Management and Protection
- Identity Protection Act
- Children鈥檚 Online Privacy Protection Act ()
- FTC Identity Theft Red Flag
- Payment Card Industry Data Security Standards ()
- Gramm-Leach-Bliley Act () Title V
- Family Educational Rights and Privacy Act ()
- Health Insurance Portability and Accountability Act ()
- Fair Credit Reporting Act ()
- @ 2026 黑料不打烊 Data Security and Handling Policy
- Transporting of Obscene Materials for Sale or Distribution
- Intercepting Electronic Communications
- Computer Fraud
- Illinois Compiled Statutes Computer Fraud
- Illinois Compiled Statutes Computer Tampering (hacking, maliciously spreading viruses, etc.)
- Illinois Compiled Statutes Illicit or Unauthorized Use of a Password
- Slander and Libel
- Illinois Compiled Statutes Slander and Libel
- Copyright
- Rights of Copyright Holders
- Infringement of Copyright
- Circumvention of Copyright Protection Systems

Connect with us: