In this section

ACCEPTABLE USE OF INFORMATION TECHNOLOGY

About This Policy

Responsible Officer
Vice President of Human Resources & Operations

Policy Owner
Executive Director of Technology & Innovation

Policy Contact
Executive Director of Technology & Innovation

Issued
2020-06-11

Amended
2025-08-11

The university provides information technology resources to its faculty, students, staff, and some affiliates and guests to advance its mission. In addition, authorized users may also use IT resources for appropriate incidental personal use so long as those activities are legal and do not violate: university policies; contractual obligations; the safety, security, privacy, reputational, and intellectual property rights of the university or others; or restrictions on political or commercial activities that are applicable to not-for-profit organizations like the university.

Every user bears the responsibility for knowing and complying with applicable laws, policies, and rules; for appropriately securing their computers and other electronic devices from misuse or theft by others; and for avoiding any use that interferes with others’ legitimate access to and use of IT resources.

Acceptable Use
Acceptable use is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. Acceptable use demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and to freedom from libel, slander, intimidation, discrimination, and harassment.

All users are individually responsible for appropriate use of all IT resources assigned to them, including their account, computer and/or devices, the network address or port, software, and hardware. Therefore, all users are accountable to the university for all use of such resources. As an authorized user of IT resources, users may not enable unauthorized users to access the network by using a university computer or a personal computer that is connected to the university network without appropriate permission from the Executive Director of Information Technology or their designee.

Departments and users that grant guest access to IT resources must make their guests aware of their acceptable use responsibilities. The university accepts no responsibility or liability for any personal or unauthorized use of its resources by users.

Accounts
The university assigns accounts to individuals and prohibits accounting sharing unless specifically authorized by IT. All users are solely responsible for all functions performed from accounts assigned to them.

Users are responsible for protecting passwords, any other security mechanisms the university provides, and following safe computing practices. Users will be held responsible for any activity that occurs using accounts assigned to them, so it is vital to not share access or passwords.

Copyright and Licenses
Users must abide by all applicable copyright laws and licenses. The university has entered into legal agreements or contracts for many of our software and network resources which require everyone using them to comply with those agreements.

User must observe the law as it applies to copyrighted works in both personal use and in production of electronic information.

Shared Resources
The university recognizes that technology is essential to the work conducted at the university. The university also recognizes incidental personal use university IT resources, as long as this use does not interfere with the performance of duties or other university responsibilities, does not consume a significant amount of those resources, and does not violate any other university policies. Supervisors may impose further limits on computer use for non-work purposes, in accordance with normal supervisory procedures.

The university may choose to set limits on an individual’s use of a resource through quotas, time limits, and other mechanisms to ensure that these resources can be used by anyone who needs them.

Unacceptable Use
The following actions are expressly prohibited:

  • Using another person’s system, account, password, files, or data without appropriate permission.
  • Using computer programs to decode passwords or access control information or attempting to capture or guess other users’ passwords.
  • Attempting to circumvent or subvert system or network security measures.
  • Possession of tools that bypass security or probe security, or of files that may be used as input or output for such tools.
  • Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files or making unauthorized modifications to university data.
  • Attempting to intercept, monitor, forge, alter or destroy other users’ communications.
  • Modifying, without proper authorization, any of the university’s information resources and technology, including the work products of others.
  • Using university systems for commercial or partisan political purposes.
  • Making or using illegal copies of copyrighted materials or software, store such copies on university systems, or transmit them over university networks.
  • Wasting IT resources by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings.
  • Attempt to disguise their identity, the identity of their account, the machine that they are using, or attempting to impersonate another person or organization.
  • Using the university’s assigned Internet number space for their own domain without the prior express permission of IT.
  • State or imply that they speak on behalf of the university or use university trademarks and logos without authorization to do so.
  • Possessing, distributing, or sending unlawful communications of any kind, including but not limited to threats of violence, obscenity, child pornography and/or harassing communications (as defined by law), or participate or facilitate communications in furtherance of other illegal activities.
  • Violating any applicable laws and regulations or university policies, standards, and procedures.

Monitoring and Privacy
The university employs numerous measures to protect the security of its IT resources and users accounts but cannot guarantee complete security and confidentiality. The use of university IT resources is not private. While the university does not routinely monitor individual usage of IT resources, the normal operation and maintenance of the university’s IT resources require the backup and caching of data and communications, the logging of activity, monitoring of general usage patterns and other activities necessary or convenient for the provision of service.

In addition, since employees are granted use of electronic information systems and network services to conduct university business, there may be instances when the university, based on approval from authorized officers, reserves and retains the right to access and inspect stored information without the consent of the user.

The university normally will attempt to provide advance notice to the affected individual of access to or the preservation or sharing of data with third parties unless such notification would put the university at risk or is prohibited by law.

The university also maintains the authority to limit access to its networks or to remove material stored or posted on its computers when applicable policies, contractual obligations, or applicable laws are or likely have been violated.

Use of Personal Information Technology Resources
It is essential for all employees to understand that any data, communications, and work product created as part of their duties are classified as university information. This information is the property of the university, regardless of the device used for its creation. This principle of ownership is the reason why all such data is subject to university policies, audit, and legal discovery, and why the following rules must be observed.

All normal university business must be conducted on university-owned and managed IT Resources. This is the primary rule for protecting the university’s information assets.

Prohibited Use of Personal Devices
The use of personal devices and accounts to create, process, or store university information is strictly prohibited. This is a critical security measure to protect university assets. Prohibited actions include, but are not limited to:

  • Storing university documents or data on a personal computer, tablet, or personal cloud service (e.g., personal Google Drive, Dropbox, iCloud).
  • Using a personal email account (e.g., Gmail) to conduct university business.
  • Using non-university messaging applications (e.g., WhatsApp, Signal) for work-related communications.

Handling Incidental Use and Employee Responsibility
The university recognizes that minor, incidental contact with university information on a personal device may be unavoidable. However, this does not constitute approval to work on that device.

Any university information on a personal device, even temporarily, may be subject to audit and legal discovery processes such as subpoenas. Therefore, if university information is stored on a personal device, the employee must take immediate action to transfer that information to an approved university system. Following a successful transfer, all copies must be securely and permanently deleted from the personal device.

Authorized Exceptions for Personal Smartphones
In situations where a university-provided device is not available, the following limited exceptions are authorized for personal smartphones only:

  • University Email and Calendar: Employees are permitted to access university email and calendars exclusively through the official Microsoft Outlook application.
  • Collaboration and Messaging: Employees are permitted to use the official Microsoft Teams application for university-related communication and collaboration.
  • Work-Related Photos and Videos: An employee may use a personal smartphone’s camera for legitimate university business, but the files must be handled according to the following requirements: (1) promptly transfer the files to an approved university storage location (e.g., OneDrive); (2) permanently delete the files from the personal device after confirming the transfer; and (3) ensure the capture and use of images comply with all university privacy policies.

Protecting Information in Public
All employees have a duty to protect university information in any environment where unauthorized individuals could view it.

  • In Public or Shared Spaces, employees are required to be aware of their surroundings, position screens to prevent observation, use a privacy screen filter when possible, lock their device when away, and avoid discussing sensitive information where they can be overheard.
  • On Public or Non-University Computers, use is highly discouraged. If emergency use is unavoidable, the employee must use private/incognito mode, never download files, actively sign out of all applications, and clear the browser’s cache, cookies, and history.

Violations and Sanctions
Users who violate this policy may be denied access to university IT resources. The university may suspend, block, or restrict access to an account when it appears necessary to do so:

  • to protect the integrity, security, or functionality of university or other IT resources;
  • to comply with legal or contractual requirements;
  • to investigate alleged or potential violations of law or policy including, without limitation, state, federal, or local law;
  • to investigate any asserted, threatened, or potential complaint or grievance filed or credibly alleged pursuant to law or university or rules, regulations, policies, or subject of law enforcement review or investigation;
  • or to protect the university from liability or disruption. The university may also refer suspected violations of law to appropriate law enforcement agencies for further investigation or action.

Users who violate the policy may be subject to other penalties and disciplinary action, including expulsion or dismissal, under applicable university rules, regulations, or policies.

Reason For Policy


The computing resources at the university support the educational, instructional, research, and administrative activities of the university and the use of these resources is a privilege that is extended to members of the university community. As a user of these services and facilities, you have access to valuable university resources, to sensitive data, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical, and legal manner.

This policy establishes specific requirements for the use of all computing and network resources at North Central University.

Policy Scope


This policy applies to all users of IT resources owned or managed by North Central University. Individuals covered by the policy include, but are not limited to, university faculty and visiting faculty, staff, students, alumni, guests or agents of the administration, external individuals and organizations accessing network services via the university computing resources.

This policy applies to technology administered by the university, the resources administered by central administrative departments, personally owned computers and devices connected by wire or wireless to the campus network, and to off-campus computers that connect remotely to the university’s network services.

Procedures


  • There are no procedures associated with this policy.

Forms


  • There are no forms associated with this policy.

Frequently Asked Questions


Q: Can I use my university computer for personal things?

A: Yes, incidental personal use is allowed as long as it is legal, does not violate university policies, and does not interfere with your job or consume significant resources. Your supervisor can set further limits on personal use.

Q: Am I responsible for everything that happens on my university account?

A: Yes. You are responsible for all functions performed from accounts assigned to you. You must never share your password and are accountable for any activity that occurs using your account.

Q: What happens if I use my personal phone for work email?

A: The university prohibits the use of personal devices for normal university business. The only exceptions are for accessing university email through the official Microsoft Outlook app and using the Microsoft Teams app on a personal smartphone.

Q: If I send a work-related text from my personal phone, who owns that message?

A: That text message is considered university information. Any information you create for university business is university information, no matter what device you use. This information must be managed according to university policies and may be subject to subpoena or other audit request.

Q: Is my use of university computers and networks private?

A: No. The use of university IT resources is not private. While the university does not routinely monitor individual use, it does log activity for normal operations and maintenance. The university also reserves the right to access stored information without user consent when authorized.

Q: What are some examples of things I am not allowed to do?

A: Prohibited actions include sharing your password, trying to bypass security measures, using university systems for commercial or political purposes, illegally copying copyrighted material, sending harassing communications, or intentionally disrupting services.

Q: What happens if I violate this policy?

A: Violations can lead to being denied access to university IT resources. It may also result in disciplinary action, including expulsion or dismissal, and could be referred to law enforcement.

Appendices


  • There are no appendices associated with this policy.

Additional Contacts


SubjectContactPhoneEmail
Primary ContactNCU Policy Office612.636.4170policy@northcentral.edu

Definitions


Acceptable Use
Use of IT resources that is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. Acceptable use demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and to freedom from libel, slander, intimidation, discrimination, and harassment.

Authorized Use
Use that the university determines, in its sole and exclusive discretion, is consistent with the education, research, and mission of the university, consistent with effective departmental or divisional operations, and consistent with this policy.

Authorized
User Individuals or entities permitted to make use of university information technology resources, including students, staff, faculty, alumni, guests, sponsored affiliates, and other individuals who have an association with the university.

Incidental Personal Use
Limited personal use of university IT resources that does not interfere with an employee’s duties, consume significant resources, or violate any university policies or laws.

Information Technology Resources
Refers to the university’s computing, communications, and other information technology systems and includes all hardware, software (including data and documentation), local area networks, internet systems, access controls, and applications and data stored on such information technology systems and any other electronic device or service that can store, transmit, or receive information. IT resources include, but are not limited to, accounts, passwords, access controls, servers, computers, personal computers, workstations, laptops, mainframes, minicomputers, mobile equipment, land line telephones, wireless devices, media players, storage media, computer networks, connections to network services such as the Internet and web pages, subscriptions to external computer services, networking devices, and any associated peripherals and software, regardless of whether used for educational, research, service, administrative or other purposes. This definition is not all inclusive but rather reflects examples of equipment, supplies and services. This also includes services that are university owned, leased, operated or provided by the University or otherwise connected to university resources, such as cloud and Software-as-a-Service (SaaS) or Infrastructure-as-a-service (IaaS), or any other connected/hosted service.

Normal University Business
Any activity performed by an employee as part of their assigned university duties and responsibilities. This applies to all work related to university operations, research, administration, and instruction. Normal university business includes, but is not limited to:

  • Creating, editing, or sharing course materials, research data, or administrative documents.
  • Communicating with students, colleagues, or external partners about official university matters.
  • Accessing or managing any university data classified as private or institutional.
  • Conducting university-sponsored research.
  • Performing administrative tasks such as budgeting, scheduling, or departmental planning.

Personal Information Technology Resources
Any information technology resource, including hardware, software, and services, that was not purchased with university funds and is not centrally managed by the university. This definition is broad and includes, but is not limited to:

  • Hardware: Personal computers (laptops, desktops), smartphones, tablets, smartwatches, and removable storage devices (e.g., USB flash drives, external hard drives).
  • Software & Applications: Any software or application installed on a personal device that was not provided or licensed by the university.
  • Services & Accounts: Personally-contracted cloud storage services (e.g., Google Drive, Dropbox, iCloud), personal email accounts (e.g., Gmail, Yahoo), non-university messaging applications (e.g., WhatsApp, Signal), and social media accounts.

Security Measures
Actions, tools, and protocols, such as passwords, firewalls, and data encryption, used to protect IT resources and data from unauthorized access, damage, or disruption.

University Information
Any information created or received by a university employee related to university business. This includes text messages, voicemail messages, emails, photos, documents, and other electronic communications.

User
Any individual authorized to access university IT resources, including students, faculty, staff, affiliates, and guests.

Responsibilities


Users

  • Review, understand, and comply with policies, laws and contractual obligations related to access, acceptable use, and security of information technology resources.
  • Consult with university Information Security on acceptable use issues not specifically addressed in this policy.
  • Protect personal information and personal assets used to access personal information or university data.
  • Report possible violations of this policy to university Information Security (incident@northcentral.edu).

Data Custodian, Data Owner, Data Stewards

  • Protect the privacy of users, unless designated as university-approved personnel to monitor, examine, or disclose this information.
  • Respond to questions from users related to appropriate use of information technology resources.
  • Work with university Information Security to investigate alleged violations of this policy.
  • Report possible violations of this policy to university Information Security (incident@northcentral.edu).

Departments Heads and Supervisors

  • Work with university Information Security to investigate alleged violations of this policy.
  • Report possible violations of this policy to university Information Security (incident@northcentral.edu).

Information Technology

  • Investigate possible violations of this policy.
  • Refer alleged violations to appropriate university offices and law enforcement agencies for resolution or disciplinary action.
  • Ensure that appropriate and timely action is taken on alleged violations.
  • Coordinate with Internet Service Providers and law enforcement agencies on violations of this policy.

IT Leadership

  • Designate individuals who have the responsibility and authority for information technology resources.
  • Designate individuals who have the responsibility and authority for establishing policies for access to and acceptable use of information technology resources.
  • Designate individuals who have the responsibility and authority for monitoring and managing system resource usage.
  • Designate individuals who have the responsibility and authority for investigating alleged violations of this policy.
  • Delegate authority and responsibility for investigating violations of this policy.
  • Designate individuals who have the responsibility and authority to refer violations to appropriate university offices or law enforcement agencies for resolution or disciplinary action.
  • Designate individuals who have the responsibility and authority to employ security measures and ensure that appropriate and timely action is taken on acceptable use violations.

RELATED INFORMATION


Related University Policies

Related Legislation

Other Related Information

History


Amended
2025-08-11 – Added Clarifying language around the use of personal technology resources and the ownership of university data/work made for hire. 

Issued
2020-06-11

Skip to content <!-- -->