Skip to main content

Responsible Use of University Computing and Electronic Communication Resources – REPLACED BY Standard for Responsible Use

University Policy 307

Policy Owners

This University Policy has been rescinded and replaced by the Standard for Responsible Use.


Authority

Chancellor


Policy Revisions

Rescinded and Replaced November 4, 2015

In 2012, the University adopted ISO/IEC 27002 and subsequently, in June 2014, University Policy 311, Information Security, was revised to cover at a high level anything relating to the protection of University information resources.

Since that time ITS has been developing Standards and Guidelines to align with ISO 27002, providing more details and guidance in support of University Policy 311. Because University Policy 307, Responsible Use of University Computing and Electronic Communication Resources, was concerned mainly with information security, it has been replaced by Information Security Standard for Responsible Use.

Additional background on Information Security Standards is available here: http://itservices.charlotte.edu/home/it-policies-standards.

Revised September 27, 2002

This University Policy is revised to add two new sections: “Authorization” and “Appropriate Uses,” in addition to adding a list of activities that constitute violations of the policy. The new section on Authorization sets forth the function of the user ID and password. The section on Appropriate Uses provides a list of examples of uses of computing and network resources that the University encourages. The Policy provides specific examples of policy violations to assist users in identifying inappropriate uses.

Revised January 31, 2000

The computing and electronic communication resources that UNC Charlotte provides for faculty, staff, and students are essential to carrying out the University's primary missions of instruction, research, and public service. Protecting and preserving University computing and electronic communication resources is a cooperative effort that requires each member of the University community to act responsibly and guard against abuses. This policy sets forth standards of responsible use, which demonstrate respect for unobstructed access, intellectual property rights, truth in communication, ownership of data, system security and integrity, and individuals' rights. Responsible use includes, but is not limited to, respecting the rights of other users, sustaining the integrity of systems and related physical resources, and observing all relevant policies, laws, regulations, and contractual obligations. Any member of the University community who violates this policy may be subject to disciplinary action under appropriate University disciplinary procedures.

Initially Approved May 23, 1983