Skip to content
  • Print

3.7.7 Acceptable Use Policy

Approved by Academic Council, February 8, 2007; Administration, March 19, 2007

Policy: The University’s Computing and Communications Resources shall be used securely, respectfully, cooperatively in support of the University’s Mission.

Definition:  Computing and Communications Resources include all electronic technology used to store, copy, transmit, or disseminate visual, auditory, and electronic information as well as the information contained therein. This includes, but is not limited to, computers, networks, phones, fax machines, copiers, PDAs, cell phones and the information contained in them.

A. Support of the University’s Mission

The University provides Computing and Communications Resources to faculty, students, staff and others solely for the purposes of supporting teaching, learning, scholarship, service and administration within the context of the University’s mission.
The University is a non-profit, tax-exempt organization and, as such, is subject to a number of pieces of legislation regarding sources of income, political activities, use of property, etc. The University prohibits use of University information and University Computing and Communications Resources for commercial purposes or financial gain not authorized under University Policy, partisan political activities not part of a class assignment, and for any activity prohibited by law.

Incidental personal use of Computing and Communications Resources, within the guidelines of this policy, is considered appropriate. Such permissible incidental personal use does not include hosting, ASP (Application Service Provider), ISP (Internet Service Provider), WSP (Wireless Service Provider) or other services for third parties. Incidental personal use does not include activities for financial gain unless such activities are authorized under University Policy. Incidental personal use does not include the use of institutional data which may be contained in or extracted from institutional computing and communications systems. Personal use is not incidental if it incurs a direct cost to the University.

Use of Pacific’s Computing and Communications Resources by students, living on campus, in support of approved experiential learning and/or in support of their duties as compensated employees is explicitly authorized, so long as such usage does not violate any part of this policy.

B. Secure Use

Users of University Computing and Communications Resources are responsible for taking appropriate steps to safeguard University and personal information, as well as University facilities and services.

  • Passwords and other authentication and authorization codes, cards or tokens assigned to individuals must not be shared with others. Authorized Users must not provide access to unauthorized Users. Passwords should be chosen carefully to lessen the possibility of compromise. Users are responsible for all activity that takes place under their UserID(s).
  • Activity that may compromise the system integrity or security of any on or off-campus system is prohibited. This includes any type of unauthorized access or hacking.
  • Unauthorized monitoring of individual User activity, information and communications is prohibited. See the University’s Computing and Communications Confidentiality Policy.
  • Users must ensure the security of restricted, confidential, proprietary, licensed, copyrighted or sensitive information entrusted to their care or that may come into their possession. Security includes, as appropriate, protection from unauthorized disclosure, modification, copying, destruction or prolonged unavailability. Unless approved by the University Security Officer, Users must not store non-university personal identification numbers including, but not limited to, Social Security Numbers, Credit Card Numbers, or Drivers License Numbers on unsecured devices or media, for any period of time.

C. Respectful Use

University Computing and Communications Resources should be used in a manner that respects the rights of others.

  • Users must abide by all local, state and federal laws. This includes all applicable Copyright laws and license agreements, especially software license agreements. 
  • Users must abide by the University’s Policy Against Sexual and Other Unlawful Harassment. That Policy prohibits verbal and visual conduct of a harassing nature. Threatening, obscene or other offensive messages or graphics that would be deemed inappropriate in other contexts are prohibited.
  • Users must not attempt to represent themselves as someone else, mask their identity, or engage in computing or communication activities using another User’s UserID or other electronic credentials. Use of University resources for illegal conduct is prohibited.
  • Users accessing off-campus systems must additionally abide by the rules, regulations and acceptable use policies of those external systems. Given that User action may reflect on the University or the User themselves, ethical behavior, courtesy, civility and good etiquette is highly recommended.
  • Users are prohibited from using the logos, word marks or other official symbols of The University of the Pacific without authorization from Pacific’s Marketing and University Relations. This specifically includes any such usage in connection with electronic systems, services and communications, both internal and external. This does not include the usage on physical or electronic letterhead when used for official University business.

D. Cooperative Use

Users of University Computing and Communications Resources are expected to cooperate so that all Users may make maximum use of facilities and services in a shared environment.

  • The University provides Computing and Communications Resources to facilitate business and academic activities of the University. Incidental personal use must not interfere with University business and academic activities. This includes personal activities that use bandwidth, occupy storage space, or slow down processing of systems, networks, or other resources needed for University business and academic activities.
  • Users must not knowingly engage in activities that would impede the activities of others including the internal or external distribution of junk email (a.k.a. Spam), chain mail, viruses, worms, remote controllers or other malicious code, or other unofficial and/or unsolicited distributions, especially to persons you do not know.
  • Users should refrain from using sounds or visuals that may be disruptive to others in shared facilities.
  • Users may not connect any device to PacificNet or the phone system that compromises security or impacts performance for others. This includes, but is not limited to, the connection of wireless access points, switches, hubs, routers, or auto dialers, not authorized by the Pacific Technology.
  • All Users share the responsibility of seeing that University Computing and Communications Resources are used securely, respectfully, cooperatively, ethically, and for their intended purposes. If policy questions arise or if suspected policy violations are encountered, Users should take no unilateral action, but must promptly notify and/or cooperate with the appropriate University officials. Contact

E. Sanctions

It is the responsibility of each User to understand his or her privileges and responsibilities regarding Acceptable Use and to act accordingly. Users failing to abide by the University’s Acceptable Use Policy (AUP) may be subject to corrective action up to and including, dismissal, expulsion, and/or legal action by the University. While technical corrective action, including limiting User activity or removing information, may be taken in emergency situations by authorized Information Technology staff, other corrective action, technical and/or non-technical, will be taken in accord with applicable University policies and procedures. In particular, students who violate this policy will be referred to Judicial Affairs for judicial review.