аЯрЁБс>ўџ */ўџџџ+џџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџьЅС` №ПУbjbjц‡ц‡ .,„э„э5џџџџџџЄ$Ь Ь Ь 8  $И2H H H H H H H H 7999999$ъ hR#”]—H H ——]H H r333—vH H 73—733Žh—H < Pыц™LХЬ vч$ˆ0Иї ц#ƒRц# —ц#—|H 0x "3š Ж сH H H ]]е^H H H И————$$$Dh d$$$h $$$џџџџ Information Resources Acceptable Use Guidelines Introduction Users of Information Resources are expected to conduct their activities within the policies of бЧЩЋгАПт, the State System of Higher Education, the laws of the Commonwealth of Pennsylvania and federal statutes. Use of these resources is a privilege granted by the University. The University reserves the right to limit or restrict access to these Information Resources. Misuse and/or abuse of university Information Resources is forbidden. Acceptable Use of university Information resources is professional, responsible, ethical, considerate, reflects academic honesty, and shows restraint in the consumption of shared resources. Acceptable Use demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individual rights to privacy, and supports an environment that is free of intimidation and harassment. These guidelines provide examples unacceptable and acceptable uses as prescribed by the бЧЩЋгАПт Acceptable Use of Information Resources policy. These guidelines do not provide an exhaustive list of activities but are intended to outline activities which are acceptable and unacceptable. Questions regarding whether an activity is acceptable should be directed to the Vice Provost for Administration and Technology. Guidelines Unacceptable Uses: Using or attempting to use computing accounts or other information resources for which you are not authorized. Providing false or misleading information to obtain a computing account or access to other information resources. Attempting to obtain information resource access codes (usernames, passwords, PIN’s, etc.) for another user's computing accounts. Sharing information resource access codes (usernames, passwords, pins, etc.) with other individuals. Attempting to disguise the identity of a computing account or other information resource. Using or attempting to use university network resources to gain or attempt to gain unauthorized access to remote computers including but not limited to port scanning. Performing acts that impede the normal operation of information resources. Any act which may adversely impact the operation of computers, terminals, peripherals, or networks is prohibited. Such acts include, but are not limited to tampering with components of a data or voice network, monopolizing information resources, or interfering with the operational readiness of an information resource. Running or installing on any university computer system, or giving to another, a program which could result in the eventual damage to a file, computer system, or information network, and/or the reproduction of itself. This is directed towards, but not limited to, the classes of programs known as computer viruses, Trojan horses, and worms. Attempting to circumvent data protection schemes or uncover security loopholes. Violating the terms of intellectual property rights, in particular, software license agreements and copyright laws. Stealing, damaging, destroying, or attempting to steal, damage, or destroy computing facilities, programs, data or any information resources. Using information resources for any activity that is unlawful, contrary to university policy, or not in the best interest of the university. Using or attempting to use information resources in the harassment of others by sending annoying, threatening, libelous, sexually, racially, or religiously offensive messages. This includes all materials deemed offensive by existing University policies and procedures. Using information resources to monitor another user's data communications, or to read, copy, change, or delete another user's files or software, without permission of the owner. Acceptable Uses: Using information resources for only authorized purposes. Protecting your computing account information from unauthorized use. Using strong passwords and changing your password on a regular basis. Exercising careful judgment with the information resources that you access (e-mail attachments, programs, web sites, etc.) Maintaining the security of hardware and software (security patches, virus updates, backups, etc.) Adhering to software licensing agreements and copyright laws. Following university policies and procedures (Sexual Harrassment, Student Conduct Code, etc….) Incidental Personal Use: Consistent with the Office of the Chancellor Policy for the Personal Use of Information Technology Services, July 1997, the following applies to incidental personal use of information resources: Consideration regarding the use of information technology for personal reasons is akin to the use of other office equipment and supplies in a public environment, which is primarily based on the cost to the public. The personal use of information resources by employees is predicated on the understanding that there is no right to privacy nor can privacy be assured. Allowances for the personal use of information resources are subject to the following limitations: It does not result in any direct cost to the university. It is consistent with university policies It is not expected to interfere in any way with job performance as interpreted by the supervisor. It cannot be used for illegal activities, including the violation of copyright or licensing agreements. It cannot be used for personal financial gain. It cannot be used for political considerations. It cannot impact network storage capacity or performance.     Draft for TUC Review 9 September 2004 01>?— ›   Ќ ­ м ы ю я Ј Ќ Ж Ч Ш о ѕ   H I J K L W X k й к л LM[bŸЈЛа5YgsŽЊЋЌ ‡•ŸѓіѓячярмрявЮяЪямяЪяЪяЦТЦТЦТяЦОЖмЎмЇмЃœмЇЮЃЮЇм˜ЇмЇмЇмЇмЇмЇмЇ”ha?oh<“ hЭh }h } hЭhп Dh0Жhп D>*h0Жhža§5hža§hчWнhTh=/пh0Жh0ЖB*^Jphhп D hЕ$#hЕ$#h0ЖhЕ$#5hЕ$#h=/пhЕ$#5CJ aJ :01>?  Ќ ­ J K L W X k л Mа57Фlрnїїђђђђэђђђђђђшййййййййййй & FЄdЄd[$\$gdƒNеgdп Dgd0ЖgdЕ$#$a$gdЕ$#Тўўі?TVzЌФХкст~Ÿ&lпр+Okln’ћќ5JK№ %ЈЛЬо Kn‘  %>pqyЕИ*+эюУaФќ§ў(‹ŒљѕљѕљёѕёљёљёљёљёљэёэёэщёщхщсёсљёљёљёйебебебебеЭебебебЩХНЙЕЙЕБщБ­Б­щБh§)khф;,hŠ,h^qh0Жh^q>*hThža§h=/пh }hИUЊh }h }>*hZmh0ЖhƒNеhєЃhп Dha?o hЭhп DDnќ ЛЬK‘ qЏ*+юяФХў(№№№ыуууууууыооооооеЬФФ & FgdƒNе„а^„аgdф;,„h^„hgdф;,gdЕ$# & Fgd }gd } & FЄdЄd[$\$gdƒNе(Šђ!Q‹Œ’“•–˜™ЎПРСТУїїїїїђэыыыыыыыыуусыыэ$a$gd=/пgdƒNеgdф;, & FgdƒNеŒŽ‘“”–—™ЎОПРСТУќє№є№є№є№шфнфй№ќh§rw hТNIh=/пh=/пh=/пCJ aJ hЈT№jhЈT№Uhi2п,1hАа/ Ар=!А"А# $ %ААаАа а†œ@@ёџ@ NormalCJ_HaJmH sH tH DAђџЁD Default Paragraph FontRiѓџГR  Table Normalі4ж l4жaі (kєџС(No List4@ђ4 =/пHeader  ЦрР!4 @4 =/пFooter  ЦрР!У,џџџџ01>?Ќ­JKLWXkлMа57Ф  l р n ќ ЛЬK‘ qЏ*+юяФХў(Šђ!Q‹Œ’“•–˜™ЎПРФ˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜0€€˜0€€yЩ00„y‰00™yЩ00„y‰00™yЩ00€y‰00™yЩ00€y‰00™˜@0€€˜@0€€˜@0€€y‰00д™ЛФ @00š@0€€+w\Mš0€€ 444447іŒУn(УТџџTB$€TBФуЉTB|фЉјјФФ9*€urn:schemas-microsoft-com:office:smarttags€place€=*€urn:schemas-microsoft-com:office:smarttags €PlaceName€=*€urn:schemas-microsoft-com:office:smarttags €PlaceType€ DLц› фяŒ’“•–˜™СФlw5@Œ’“•–˜™СФ33мыЈЌЖЧ>>ppФŒ’“•–˜™СФXQ t2Џџџџџџџџџџš3m:Р%њэџџџџџџџџџFJ?ОќЭџџџџџџџџџ_хMZ?Ж“џџџџџџџџџйzOYњz№cџџџџџџџџџ „а„˜ўЦа^„а`„˜ў‡hˆH. „ „˜ўЦ ^„ `„˜ў‡hˆH.‚ „p„LџЦp^„p`„Lџ‡hˆH.€ „@ „˜ўЦ@ ^„@ `„˜ў‡hˆH.€ „„˜ўЦ^„`„˜ў‡hˆH.‚ „р„LџЦр^„р`„Lџ‡hˆH.€ „А„˜ўЦА^„А`„˜ў‡hˆH.€ „€„˜ўЦ€^„€`„˜ў‡hˆH.‚ „P„LџЦP^„P`„Lџ‡hˆH.h„а„˜ўЦа^„а`„˜ўOJQJo(‡hˆHЗ№h„ „˜ўЦ ^„ `„˜ўOJQJ^Jo(‡hˆHoh„p„˜ўЦp^„p`„˜ўOJQJo(‡hˆHЇ№h„@ „˜ўЦ@ ^„@ `„˜ўOJQJo(‡hˆHЗ№h„„˜ўЦ^„`„˜ўOJQJ^Jo(‡hˆHoh„р„˜ўЦр^„р`„˜ўOJQJo(‡hˆHЇ№h„А„˜ўЦА^„А`„˜ўOJQJo(‡hˆHЗ№h„€„˜ўЦ€^„€`„˜ўOJQJ^Jo(‡hˆHoh„P„˜ўЦP^„P`„˜ўOJQJo(‡hˆHЇ№h„а„˜ўЦа^„а`„˜ўOJQJo(‡hˆHЗ№h„ „˜ўЦ ^„ `„˜ўOJQJ^Jo(‡hˆHoh„p„˜ўЦp^„p`„˜ўOJQJo(‡hˆHЇ№h„@ „˜ўЦ@ ^„@ `„˜ўOJQJo(‡hˆHЗ№h„„˜ўЦ^„`„˜ўOJQJ^Jo(‡hˆHoh„р„˜ўЦр^„р`„˜ўOJQJo(‡hˆHЇ№h„А„˜ўЦА^„А`„˜ўOJQJo(‡hˆHЗ№h„€„˜ўЦ€^„€`„˜ўOJQJ^Jo(‡hˆHoh„P„˜ўЦP^„P`„˜ўOJQJo(‡hˆHЇ№„а„˜ўЦа^„а`„˜ў.„ „˜ўЦ ^„ `„˜ўCJOJQJo(o€„p„˜ўЦp^„p`„˜ў.€„@ „˜ўЦ@ ^„@ `„˜ў.€„„˜ўЦ^„`„˜ў.€„р„˜ўЦр^„р`„˜ў.€„А„˜ўЦА^„А`„˜ў.€„€„˜ўЦ€^„€`„˜ў.€„P„˜ўЦP^„P`„˜ў.h„8„˜ўЦ8^„8`„˜ўOJQJo(‡hˆHЗ№h„„˜ўЦ^„`„˜ўOJQJ^Jo(‡hˆHoh„и „˜ўЦи ^„и `„˜ўOJQJo(‡hˆHЇ№h„Ј „˜ўЦЈ ^„Ј `„˜ўOJQJo(‡hˆHЗ№h„x„˜ўЦx^„x`„˜ўOJQJ^Jo(‡hˆHoh„H„˜ўЦH^„H`„˜ўOJQJo(‡hˆHЇ№h„„˜ўЦ^„`„˜ўOJQJo(‡hˆHЗ№h„ш„˜ўЦш^„ш`„˜ўOJQJ^Jo(‡hˆHoh„И„˜ўЦИ^„И`„˜ўOJQJo(‡hˆHЇ№_хMXQ š3m:FJ?йzOYџџџџџџџџџџџџџџџџџџџџџџџџ                                    хŠ, }TЕ$#ф;,п DХh`§)kZma?o^q№Hu§rwŒ<“єЃИUЊ0ЖƒNечWн=/пi2п|OюЈT№ža§?qФџ@€ зУ`@џџUnknownџџџџџџџџџџџџG‡z €џTimes New Roman5€Symbol3& ‡z €џArial?5 ‡z €џCourier New;€Wingdings"1ˆ№аhƒу”†ƒу”†7V '7V '!№ ДД4d‚‚ 2ƒQ№HX №џ?фџџџџџџџџџџџџџџџџџџџџџЕ$#2џџ/Information Resources Acceptable Use GuidelinesATSATS      Root Entryџџџџџџџџ РF0чБh:Ы>€ 1Tableџџџџџџџџ$WordDocumentџџџџџџџџ.,SummaryInformation(џџџџŒ ўџџџ !"#$%&'()ўџџџ0§џџџ5џџџџџџџџўџџџўџџџџџџџџџџџџџџџџџџџ67ўџџџџџџџџџџџџџџџџџџџџџџџџџџџ,џџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџ cbennett$Mr. Christopher G. Bennett cbennettArchived ACPAC FileArchived ACPAC FilўџеЭеœ.“—+,љЎDеЭеœ.“—+,љЎŒH€ˆ”œЄЌ ДМФЬ д 0<ф' ‚и 0Information Resources AcceptRoot Entryџџџџџџџџ РF`d`чфtЪ>€1Tableџџџџџџџџ$WordDocumentџџџџџџџџ.,SummaryInformation(џџџџ8 ўџџџ !"#$%&'()ўџџџџџџџџџџџџџџџ0§џџџўџџџўџџџ234ўџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџ1џџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџўџџџ "  !#$%ўџџџўџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџDocumentSummaryInformation8џџџџџџџџџџџџ CompObjџџџџџџџџџџџџqџџџџџџџџџџџџџџџџџџџџџџџџguidelines$cbennett Mr. Christopher G. Bennett$cbennett Mr. Christopher G. BennettўџеЭеœ.“—+,љЎDеЭеœ.“—+,љЎŒH€ˆ”œЄЌ ДМФЬ д 0<ф' ‚и 0Information Resources Acceptable Use Guidelines Title  €(0<|„ œ Є А М ШаиEktContentID64EktContentLanguageEktFolderId64 EktQuickLinkEktContentTypeEktFolderName EktCmsPath EktExpiryType EktDateCreated EktDateModified EktTaxCategory EktCmsSizeEktSearchableEktEDescriptionekttaxonomyenabledEktShowEventsА CX д;DownloadAsset.aspx?id=88131e@ TtsЪ@POiхфtЪ€Archived ACPAC File able Use Guidelines Title|Ј0€8@LT` Ј@ Д М Ш д рш№јpEktContentID64EktContentLanguageEktFolderId64 EktQuickLinkEktContentTypeEktFolderName EktCmsPath EktExpiryType EktDateCreated EktDateModified EktTaxCategory EktCmsSizeEktSearchableEktEDescriptionekttaxonomyenabledEktShowEvents EktInPermА CX д;DownloadAsset.aspx?id=88131e@ TtsЪ@POiхфtЪ€ Summary Archived ACPACeEktTaxCategory FileArchived ACPAC File# ўџџџ !"#$%&'()ўџџџ+,ўџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџ§џџџ<ўџџџўџџџ?*џџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџRoot Entryџџџџџџџџ РFp8YчфtЪ>@1Tableџџџџџџџџ$WordDocumentџџџџџџџџ.,SummaryInformation(џџџџ8DocumentSummaryInformation8џџџџџџџџџџџџ pCompObjџџџџџџџџџџџџqџџџџџџџџџџџџџџџџџџџџџџџџўџџџ ўџџџ  ўџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџџўџ џџџџ РFMicrosoft Office Word Document MSWordDocWord.Document.8є9Вqўџр…ŸђљOhЋ‘+'Гй0\ ьДфd ,  Ј Д РЬдмф4Pф@@bƒLХ@bƒLХ7Vaup-guidelines$Mr. Christopher G. Bennett