Skip to main content
Main content

Acceptable Use Policy

Purpose

The University provides information resources to the members of the University community to support and enable the University’s mission. This policy (the “Policy”) sets forth the requirements for the acceptable use of information technology resources at the University of Chicago.

The University’s Acceptable Use Policy aims to establish acceptable practices regarding using the University of Chicago’s information technology and digital resources to protect the confidentiality, integrity, and availability of information created, collected, and maintained.

In general, acceptable use means ensuring that the information technology resources of the University are used for their intended purposes, including respecting the rights of other information technology end users, the integrity of the physical facilities, the confidentiality of data, information, and information assets, and all pertinent license and contractual agreements. Inappropriate use potentially exposes the organization to security risks, inaccessible or compromised networks, systems, and services, and issues with legal and regulatory compliance.

Applicability

This Policy applies to all University information technology resources owned or operated by or on behalf of the University, including the University network, University software and applications, University mobile and removable devices, or and non-University devices that store Covered Data or information. This includes data processed or stored and applications used by the University in hosted environments where the University does not operate the technology infrastructure. This policy also applies to personal computers and other devices to the extent that they connect to or use University information technology to store or process Covered Data.

All University faculty, other academic appointees, students, post-doctoral researchers, staff, associates, volunteers, and contractors (“Covered Persons”) must adhere to this policy.

Policy Ownership

Responsible University Officer(s): Chief Information Officer
Responsible Office: IT Services
Effective date: 04-12-2024

Policy

The University provides information technology to advance its educational, research, scholarship, and healthcare missions. University of Chicago (“University”) information technology and digital resources and the data contained in those resources are provided for University-related purposes. This policy governs the access and use of University information technology and digital resources.

Acceptable Use

The individuals covered by this policy, “Covered Persons,” must comply with University policies, contractual obligations, and Federal, State, and local law when using University information technology resources. The use of University information technology resources should be for purposes consistent with the University’s missions and with its policies and legal requirements (including license agreements and terms of service) and not for commercial purposes. Individuals must also protect the University’s confidential information from unauthorized use or disclosure.

Prohibited Use

The individuals covered by this policy, “Covered Persons,” must not use the University’s information technology systems and services in the following ways:

a) To violate laws, University policies, contractual obligations, or to violate the safety, security, privacy, and intellectual property rights of others.
b) To send or distribute messages or material that is fraudulent, harassing, threatening (as described in the Policy on Harassment, Discrimination, and Sexual Conduct), or otherwise in violation of law or University policies, standards, procedures, guidelines, and codes of conduct.
c) To conduct a political campaign or any other activity that violates the Political Campaign Activity Memorandum issued by the Office of Legal Counsel.
d) For the benefit of individuals or external organizations except as permitted by the University’s Conflict of Interest Policy for Staff and Conflict of Interest Policy for Faculty or other Academic Appointees.

Personal Use

Incidental personal use of the University’s information technology and digital resources is permitted, provided such use is consistent with this policy.

Institutional Use and Privacy

The University has the legal right to access, preserve and review all information stored or transmitted through its information technology networks, systems and services. Except to the extent necessary to comply with the University’s legal obligations, the University will maintain the confidentiality of all privileged communications and work product.

The University works to afford reasonable privacy for users. It does not access information created and stored by users on its IT Systems except when it determines that it has a legitimate operational need in accordance with the process set forth in the Policy on Information Technology Resources and Account Privacy. In limited circumstances and with the approval of the Provost, the University may permit University researchers to access Covered Data for the purpose of conducting research.

Consequences of Violating the Policy

Violations of the policy may result in disciplinary action, up to and including the suspension of network privileges, suspension or expulsion from further study and termination of employment.

Definitions

  • Associate: An associate is an individual who requires access to information technology resources to work in conjunction with the University but is not a University of Chicago Covered Person (e.g., is not faculty, other academic appointees, students, staff, post-doctoral researchers, volunteers, and contractors).
  • Confidential Information: Generally consists of non-public information about a person or an entity that, if disclosed, could reasonably be expected to place either the person or the entity at risk of criminal or civil liability or damage to the person or entity’s financial standing, employability, privacy, or reputation. Reference University HR policy 601 Treatment of Confidential Information for more information.
  • Covered Persons: All University faculty, other academic appointees, students, staff, post-doctoral researchers, volunteers, and contractors.
  • Information Security Program (“The Program”): The Information Security Program is a set of coordinated services and activities designed to protect Covered Data and information technology and manage the risks to the University associated with those resources, including the regulations below, as well as the procedures, standards, assessments, protocols to govern information resources’ storage, accessibility, and security.
  • Information Technology Resources: Information technology resources are:
    • Computers or electronic resources that are used in the search, access, acquisition, transmission, storage, retrieval, or dissemination of Covered Data.
    • Technologies or services that are owned, contracted by, or managed by the University that connect to the University network or link to another University technology or service, or store Covered Data or information.
    • Services or applications used by the University in hosted environments where the University does not own or operate the technology infrastructure.
  • Service: IT infrastructure, platforms, or software hosted by third-party providers and made available to users through a network.
  • Third-Party: An organization or partner that the University contracts with to perform certain services on behalf of the University.
  • Covered Data: Data created, stored, or maintained, by or on behalf of the University.

Roles and Responsibilities

  • Chief Information Officer (CIO): The CIO is responsible for providing guidance to University leadership concerning the appropriate use of information technology resources.
  • Chief Information Security Officer (CISO): The CISO shall be responsible for leading the development, execution, monitoring, and enforcement of the University Information Security Program.

Contacts

Associate Vice President and Chief Information Officer
cio@uchicago.edu
773.702.5800

IT Services Information Security Office
security@uchicago.edu
773.702.2378

Executive Director and Chief Information Security Officer (CISO)
ciso@uchicago.edu
773.702.2378

Revision Authority

Associate Vice President and Chief Information Officer

Please see the frequently asked questions below for more information.

Category: Eligibility and Acceptable Use
Policy Owner: Chief Information Security Officer

Frequently Asked Questions

What are examples of “University information technology resources"?
What is “Covered Data”?
What are examples of “non-University devices that store Covered Data”?
Does it matter if the resource is on the University network? Does it matter where the resource is being used, such as off-campus, home, on campus?
What are examples of incidental personal use of information technology resources?
Can University-owned computers and services be used to operate an external business (including products or services like consulting)?
How does the University “determine that it has a legitimate operational need” to access or review data?
What are examples of when the University would need to access, preserve, and review information stored in or on an individual’s University information technology resources?