Office of Information Technology | < GO BACK
Welcome to the Office of Information Technology's
Eligibility and Acceptable Use Policy
information technology for educational,
research, and administrative
applications by its students, faculty,
and staff. This Eligibility and
Acceptable Use Policy stems from the
University's Statutes and Bylaws and
from its more general policies and
procedures governing faculty, students,
staff, and facilities. With only a
few exceptions, the present policy
simply applies these larger policies and
procedures to the narrower
information-technology context. It
balances the individual's ability to
benefit fully from information
technology and the University's need for
a secure and reasonably allocated
of the Philadelphia University Network
or services of that network constitutes
the knowledge of, and acceptance of this
and all OIT policies.
In general, University faculty, students, and staff may use University information technology (which includes privately-owned computers connected to the University network) in connection with the University's core teaching, research, and service missions. Certain non-core uses that do not consume resources or interfere with other users also are acceptable. Under no circumstances may faculty, students, staff, or others use University information technology in ways that are illegal, that threaten the University's tax-exempt or other status, or that interfere with reasonable use by other members of the University community. Violations of information-technology rules and policies typically result in University disciplinary action, which may have serious consequences.
The information-technology Eligibility and Acceptable Use Policy begins with a few principles, defines several categories into which users and applications of information technology fall, and specifies which users may use University information technology for which applications.
This policy applies to:Any computer, networking device, telephone, copier, printer, fax machine, or other information technology which
In accordance with the above policies, the University works to create an intellectual environment in which students, staff, and faculty may feel free to create and to collaborate with colleagues both at Philadelphia University and at other institutions, without fear that the products of their intellectual efforts will be violated by misrepresentation, tampering, destruction and/or theft.
Access to the information resource infrastructure both within the University and beyond the campus, sharing of information, and security of the intellectual products of the community, all require that each and every user accept responsibility to protect the rights of the community. Any member of the University community who, without authorization, accesses, uses, destroys, alters, dismantles or disfigures the University information technologies, properties or facilities, including those owned by third parties, thereby threatens the atmosphere of increased access and sharing of information, threatens the security within which members of the community may create intellectual products and maintain records, and in light of the University's policy in this area, has engaged in unethical and unacceptable conduct. Access to the networks and to the information technology environment at Philadelphia University is a privilege and must be treated as such by all users of these systems.
To ensure the existence of this information resource environment, members of the University community will take actions, in concert with legally constituted authorities, to identify and to set up technical and procedural mechanisms to make the information technology environment at Philadelphia University and its internal and external networks resistant to disruption.
In the final analysis, the health and well-being of this resource is the responsibility of its users who must all guard against abuses which disrupt and/or threaten the long-term viability of the systems at Philadelphia University and those beyond the University. The University requires that members of its community act in accordance with these responsibilities, this policy, relevant laws and contractual obligations, and the highest standard of ethics.
Though not exhaustive, the following material defines Philadelphia University's position regarding several general issues in this area. The University characterizes as unethical and unacceptable, and just cause for taking disciplinary action up to and including non-reappointment, discharge, dismissal, and/or legal action, any activity through which an individual:
This policy is applicable to any member of the University community, whether at the University or elsewhere, and refers to all information resources whether individually controlled or shared, stand alone or networked. Individual units within the University may define "conditions of use" for facilities under their control. These statements must be consistent with this overall policy but may provide additional detail, guidelines and/or restrictions. Where such "conditions of use" exist, enforcement mechanisms defined therein shall apply. Where no enforcement mechanism exists, the enforcement mechanism defined in the Conditions of Use Policy shall prevail. Disciplinary action, if any, for faculty and staff shall be consistent with the University Standard Practice Guides and the Bylaws of the Board of Trustees of the University. Where use of external networks is involved, policies governing such use also are applicable and must be adhered to.
The Office of Information Technology reserves the right to modify this policy at any time in the future as is necessary to safeguard the Network and other users.
send questions and comments to: HelpDesk@PhilaU.edu