POLICY SOURCE: Information Technology - Policies POLICY NO.: 8421
TITLE: IT-1001 Acceptable Use Policy for Campus Information Technology Services SUBMITTED BY: Jennifer Charron
DATE: January 01, 2018 APPROVED BY: Jennifer Charron

1.0 Overview

In support of Florida Institute of Technology's mission, the Information Technology department provides access to information resources including computer networks and networked equipment to the campus community. Computers and the campus network provide powerful communication tools and access to resources on campus and around the world. When used appropriately, these tools facilitate the open exchange of information and advance the mission of the University. Inappropriate use of these tools, however, can infringe on the rights of others and the security of the campus network. Appropriate use should always be legal and ethical, reflect academic honesty, uphold community standards and show restraint in the consumption of shared resources. Appropriate use should also demonstrate respect for intellectual property, ownership of data, system security mechanisms, and an individual's right to privacy and freedom from intimidation, harassment, and unwarranted annoyance.

Information Technology supports freedom of expression and an open environment to pursue scholarly inquiry. The open sharing of information is encouraged, supported and protected except when restricted by law. The Information Technology department does not limit access to information due to its content when such information meets the standard of legality and security.

2.0 Purpose

This policy is designed to outline the various responsibilities that users have with regards to their use of Network Resources in order to protect the University, its faculty, staff and students from electronic and legal harm resulting from improper use of information technology.

3.0 Scope

This policy applies to employees, faculty, students, guests and any other user that utilizes the network or computing resources provided by Florida Institute of Technology. In some cases, these restrictions may be lifted by other official policies pertaining to certain staff, systems, or processes.

4.0 Policies

Users who connect to Florida Institute of Technology’s network must abide by the acceptable use policy described here, as well as any relevant campus computing policy, campus Electronic Mail Policy, and all relevant State and Federal laws, regulations, and contractual obligations. The use of Florida Institute of Technology’s technology resources is a privilege, which may be revoked if users fail to comply with these policies.

As a member of the Florida Institute of Technology network community you must abide by the general guidelines listed above, as well as the specific responsibilities listed below.

4.1 User Responsibilities

As a user of Information Technology resources you have the following responsibilities:

4.2 Unacceptable Uses of Information Technology

5.0 Enforcement

Employees and other persons employed by the university found to have violated this policy will be subject to disciplinary action based on the nature of the offense up to and including termination of employment.

Students and guests that are found to have violated this policy will be subject to disciplinary action based on the nature of the offence including but not limited to loss of network and computing access, and any other action the university administration deems appropriate.

6.0 Definitions




A general term relating to websites and services setup for the purpose of selling products, services, or generating money.


Large volumes of email sent to unknown third parties with the intent to defraud or sell or promote products.


System, network device, or network resource integrity compromised by an unauthorized third party

Lock workstation

Putting your workstation in a state that it requires a password to access your computer using the keyboard and mouse attached to the computer

Malicious Activity

Any activity with the intention of harming another individual, network, device, or knowingly attempting to gain unauthorized access to network or computer resources.


Without the permission of the administrator or the owner of the device, system, or resource

Unknown third party

Any individual that you are not personally associated with

Up-to-date Virus Protection

Virus protection with definitions that are no more than 10 days old

7.0 Updates and Changes

Changes to this policy must be reviewed by the Information Technology managers. Once the Information Technology managers approve the wording and contents of the policy, this document must be reviewed and approved by the Information Technology Executive Committee before going into effect.

Once approved, faculty, students and staff will be notified that the acceptable use policy is changing through postings to Fitforum and Facforum, campus mail to university departments, and postings in residence halls. This posting does not need to contain the entire text of the Acceptable Use Policy, but the notice must indicate where copies of the policy may be reviewed.

New versions of this policy will take effect no sooner than 21 days after the approval of the policy by the Information Technology Executive Committee.