Volume VII: Information TechnologyChapter A: Acceptable UseResponsible Executive: Vice President for Information Technology and Chief Information OfficerResponsible Office: Office of the Vice President for Information TechnologyDate Issued: October 16, 2017Date Last Revised: December 12, 2024
ContactsStatement of PolicyReason for This PolicyIndividuals and Entities AffectedExclusionsResponsibilitiesDefinitions (defined terms are capitalized throughout the document)Related Documents, Forms and ToolsWebsite Address for This PolicyHistory and UpdatesAppendix
Purdue Systems Security (PSS)765-494-4000 | itpolicyanswers@purdue.edu
Data StewardsList of data stewards
Security OfficersList of security officers
Information Assets and a trusted and effective information technology (IT) environment are vital to the University’s ongoing mission of discovery, learning and engagement. In furtherance of this mission, the University makes Information Assets and IT Resources available (1) to support scholarship, research and instructional activities of University faculty, (2) to facilitate the operations of the University, (3) to provide access to University services and (4) to support student and campus life activities.
Any use of Information Assets and IT Resources must be limited to the University-related purposes described above. Incidental and non-recurring personal use of IT Resources is tolerated as part of the daily learning and work of all members of the University community, provided that such use does not violate any other applicable law, University policy, procedure or regulation. The University accepts no responsibility to maintain or secure information related to personal use that a community member chooses to store on the University’s IT Resources. The user accepts all risks associated with personal use, as outlined below under No Warranties or Assurances.
As a condition to being granted use of or access to Information Assets and IT Resources, each user (1) consents to the provisions of this policy and (2) agrees to comply with all of the terms and conditions detailed within this policy.
The following uses of IT Resources are prohibited:
Use of IT Resources is a privilege and not a right. All users who have been assigned an IT Resource account by the University are responsible for the actions performed on their accounts. Violations of this policy or any other University policy or regulation may result in revoked or limited IT Resource privileges, as well as other disciplinary action up to and including expulsion, termination or referral to appropriate external authorities.
Purdue University seeks to maintain its IT environment and manage its Information Assets and IT Resources in a manner that respects individual privacy and promotes user trust. However, the use of the University’s IT Resources is not completely private, and users should have no expectation of privacy in connection with the use of IT Resources.
The normal operation and maintenance of the University’s IT Resources require back up and caching of Data and communications, the logging of activity, monitoring of general usage patterns and other such activities. The University may, with or without further notice to users, take any other action it deems necessary to preserve, protect and promote the Interests of the University. Such actions include, but are not limited to, those listed below and may occur at the institutional or local unit level pursuant to procedures promulgated from time to time under the Information Security and Privacy Program.
University personnel do not routinely monitor the content of communications or transmissions using IT Resources. A dean, vice president or chancellor; their designee(s); or University legal counsel may authorize, through written request to the Office of the Vice President of Information Technology, University technicians or administrators to take any of the actions described above. Deans, vice presidents and chancellors who delegate authority to a designee must do so in writing and, upon request, provide a copy to the Office of the Vice President for Information Technology. The decision to direct action to be taken must be based on one or more of the following:
Without limiting its right to take action, the University may, in its sole discretion, disclose the results of any general or individual monitoring or access permitted by this policy, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies or use those results in appropriate University disciplinary proceedings. Where applicable and warranted, the account or equipment user will be notified of the access or monitoring and the corrective actions taken. In addition and without violating federal, state or local laws, the University may use Business Administrative Data or Institutional Academic Data in the collection, analysis and reporting of metrics designed to fulfill the University’s mission of discovery, learning and engagement; to advance its strategic objectives; and to preserve, protect and promote its Interests.
As a general matter, the following types of Data are created or transmitted by, maintained on or accessed via IT Resources, and this policy applies to all such Data at all University campuses:
The University makes no warranties of any kind, whether expressed or implied, with respect to the IT Resources it provides. The University will not be responsible for damages resulting from the use of IT Resources, including but not limited to loss of Data resulting from delays, non-deliveries, missed deliveries, service interruptions caused by the negligence of a University employee, or by any user’s error or omission. The University specifically denies any responsibility for the accuracy or quality of information obtained through IT Resources, except material that is presented as an official University record.
The University’s Information Assets and IT Resources are provided for University-related purposes. Access to and usage of them entails certain expectations and responsibilities for both users and managers of the University’s IT environment. This policy sets forth those expectations and responsibilities.
The University recognizes that the right to privacy is a deeply held conviction, especially within intellectual and academic communities. Privacy is critical to the intellectual freedom that forms the foundation of higher education. However, a user’s right to individual privacy in the context of the availability and use of IT Resources must be balanced with the University’s legal obligations, the larger needs of the community and the University’s own Interests.
This policy applies to students, faculty and staff of the University and to all other persons accessing Purdue Information Technology (IT) Resources or Information Assets stored on or accessible via those resources, regardless of whether such resources or assets are accessed from on-campus or off-campus locations or via Devices (generally referred to in this policy as “users”).
While the University reserves the right to (1) maintain and implement controls on a user’s ability to access Information Assets and IT Resources via a personal Device and (2) regulate the transmission of these types of Data between a personal Device and University IT Resources, this policy does not grant the University access to an individual’s personal Device.
This policy does not apply to cyber-security research activities that, by their very nature, explore limits on the ability to protect the privacy of Data, when the research:
Faculty, staff and students conducting cyber-security research must consult with their campus or departmental IT staff to ensure that appropriate safeguards are in place for that research.
Nothing in this policy changes or supersedes individuals’ or the University’s rights or obligations to comply with applicable federal and state laws or regulations governing the use and privacy of information, including:
University Faculty, Staff and Students, and Other Parties with Access to University Information Assets and IT Resources
Chief Information Security Officer (CISO)
University-Authorized Technicians or Administrators
All defined terms are capitalized throughout the document. Additional defined terms may be found in the central Policy Glossary.
Business Administrative Data Information Assets that are created, collected, maintained, used or transmitted by the University in connection with conducting its business operations, including but not limited to human resources, finance, accounting, facilities and general administrative activities.
Cloud Computing Services or Hosting Services Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) or other similar services by which providers deliver software applications or platforms for development to business clients via the Web or host and/or manage hardware that commonly supports data center operations.
DataDiscrete, objective facts, statistics or other information collected or captured for reference, analysis, calculation, measurement or some other use.
Device(s) Any mechanism used to store, retrieve, manipulate or transfer Data, including but not limited to a desktop or laptop computer, CD, USB flash drive, external USB hard drive, tablet, smart phone or cellular phone.
Information Asset A body of contextualized or definable Data, regardless of format, that has a recognizable and manageable value, risk, content and lifecycle and that is generally defined, classified and managed by the University so that it can be understood, shared, protected and used effectively. In the ordinary course of its activities, the University regularly creates, collects, maintains, uses and transmits Information Assets.
Information Owner The unit administrative head who is the decision-maker with respect to Information Assets owned by that unit in conducting University business. Except in cases where unit-level control would impede the general usage of information in the University’s mission of discovery, learning and engagement, an Information Owner has decision-making authority over the Information Assets used, managed or regularly accessed in the unit’s administrative functions, as well as over any forms, files, information and records, regardless of format, that relate to such Information Assets.
Institutional Academic Data Information Assets that are created, collected, maintained, used or transmitted by the University in connection with its mission of discovery and learning, including but not limited to general Data regarding student diversity, enrollment, academic performance, retention, majors and instructional activity; faculty and staff headcount and funding Data; research Data; and peer benchmarking Data.
Interests As used in this policy, the Interests of the University include, without limitation, those in:
Interests also include those identified within the definition of “legitimate educational interests” of the University as set forth in its FERPA Annual Notification of Student Rights.
IT Resources (or Information Technology Resources) All tangible and intangible computing and network assets provided by the University or by authorized third-parties, regardless of whether those resources or assets are accessed from on-campus or off-campus locations or via Devices. Examples of such assets include, but are not limited to, hardware, software, wired and wireless network and voice telecommunications assets and related bandwidth (including electronic mail), mobile Devices, electronic and hardcopy information resources, and printers.
Restricted Data Information to which access is restricted under applicable legal, regulatory or policy requirements or for which the Information Owner has exercised a right to restrict access by others.
Sensitive Data Information whose access must be guarded due to proprietary, ethical or privacy considerations, even if such considerations are not mandated by an applicable legal, regulatory or policy requirement.
Related training:
Family Educational Rights and Privacy Act (FERPA) Training
Health Insurance Portability and Accountability Act (HIPAA) Training
Gramm-Leach-Bliley Act (GLBA) Training
Related policies, standards and procedures:
Laws that influence and affect this standard include but are not limited to:
FERPA Annual Notification of Student Rights
www.purdue.edu/vpec/policies/information-technology/viia4
December 12, 2024: Document reviewed; minor administrative updates made to titles, offices and links.
March 1, 2019: Updated Appropriate Use section to reference No Warranties or Assurances section.
October 16, 2017: Consolidates and supersedes policies for Privacy for Electronic Information (VII.B.2) and IT Resource Acceptable Use (VII.A.2). Added clarification regarding University’s use of data to support mission and goals; updated to reflect current technologies and capabilities; updated links in Related Documents, Forms and Tools section.
November 18, 2011: Policy number changed to VII.B.2 (formerly V.1.3). Links to policies in Related Documents section updated as well.
There are no appendices to this policy.