Acceptable Technology Use Policy

Acceptable Use

  • You may use only the computers, computer accounts, and computer files for which you have authorization.
  • You may not use another individual's account, or attempt to capture or guess other users' passwords. [ Computing Passwords Policy ]
  • You are individually responsible for appropriate use of all resources assigned to you, including the computer, the network address or port, software and hardware. Therefore, you are accountable to the University for all use of such resources. As an authorized Brown University user of resources, you may not enable unauthorized users to access the network by using a School District's computer or a personal computer that is connected to Your School District. [ Network Connection Policy ]
  • The School District is bound by its contractual and license agreements respecting certain third party resources; you are expected to comply with all such agreements when using such resources.
  • You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing the School District's network and computing resources.
  • You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
  • You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
  • You must not use the School District's computing and/or network resources in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system.
  • On the School District network and/or computing systems, do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password 'crackers,' vulnerability scanners, network sniffers, etc.) unless you have been specifically authorized to do so by the CIS Information Security Group.

See Acceptable Use Examples to clarify Brown's interpretation of acceptable use.

 

 

Acceptable Use Policy.(2015) Retrieved from https://it.brown.edu/computing-policies/acceptable-use-policy.