Computer Resources - Access and Use

University-owned computing equipment, networks, services, and resources are intended for use by the following individuals engaged in the University activities described below:

  • Students, faculty, and staff conducting instructional, research or administrative activities.
     
  • Organizations whose use of such services is for a University-sponsored and recognized public service. For purposes of administering this policy, the organization must be designated as tax exempt under the Federal Internal Revenue Code. The use of such services must also be approved by the Director of Computing Services and Systems Development (CSSD).
     
  • Faculty or staff under professional consulting arrangements, provided: (1) an application for services is approved by the Director of CSSD, (2) an external account Computer Account is established, and (3) a contractual arrangement is entered into with CSSD.

Use of computer equipment, networks, services, or resources for any partisan political purpose, unlawful activity or use that infringes on the rights of others, including privacy, ownership, and equitable access to computing equipment, networks, services, or resources is prohibited. Software or other intellectual property protected by copyright law may not be copied from, into, or by, University computing equipment, networks, services, or resources, except as permitted by law or by written permission of the copyright owner. Departments or units that purchase copyrighted software are responsible for the enforcement of that copyright throughout their department or unit.

Electronic communications resources such as e-mail, chat-rooms, distribution lists, or Web services may only be used for University-related activities. Transmittal or storage of fraudulent, harassing, or obscene messages may result in disciplinary action. Willfully or unlawfully copying, damaging, destroying, disclosing, modifying or taking possession of a computing equipment, networks, services, or resources may result in disciplinary action. Unauthorized access to any data, documentation, property, or software contained in any computer, computer system, or network may result in disciplinary action.

For additional information, refer to Computer Access and Use AO 10 (formerly 10-02-05), or visit the Pitt IT website.