Acceptable Use Policy
Responsible Official: Chief Information Officer
Responsible Office: Information Technology
Effective Date: 2025-10-03
Last Revision Date: 2025-10-03
Associated Documents
- Data Classification and Handling Policy
- Reed Response to Claims of Copyright Infringement and Pre-Litigation Letters
- IT Procedures for Handling Violations of the Acceptable Use Policy
Policy Statement
The purpose of this Acceptable Use Policy is to define responsible use of the organization's technology resources. This policy is designed to protect the integrity, confidentiality, and availability of these assets, ensure compliance with applicable laws and regulations, and establish a secure and productive teaching, learning and working environment for all users. Use of the organization's resources is a privilege, not a right, and is granted based on acceptance of and compliance with the terms of this policy. These resources, including, but not limited to networks, computer systems, hardware, software, applications, data, and electronic communications, are the property of ÁñÁ«ÊÓÆÁ.
Scope and Applicability
This policy applies to all individuals who access or use ÁñÁ«ÊÓÆÁ’s technology resources. This includes, but is not limited to, all employees, students, contractors, consultants, temporary staff, and any other individuals affiliated with the college. The policy covers all college-owned or leased equipment, as well as any personally owned devices (BYOD) used to access the college’s networks, systems, or data, regardless of physical location. It is the user’s responsibility to read and understand this policy and to conduct their activities in accordance with its terms.
User Responsibilities
ÁñÁ«ÊÓÆÁ's computing resources are provided primarily for academic purposes. This includes education, research, communication, and college administration.
- Authorization and Access: Users shall only access resources for which they have explicit authorization and for their intended purpose.
- Account Security: Users are individually responsible for the security of their assigned accounts, usernames, and passwords. Sharing login credentials is strictly prohibited under any circumstances.
- Data Handling: Users must exercise care and good judgment when handling college data. All information must be created, used, and shared in compliance with the college’s data classification and handling policy, as well as all applicable laws.
- Security Incidents: Users must promptly report any theft, loss, or unauthorized disclosure of college information or IT resources to their supervisor and the IT department.
- Personal Use: Incidental and reasonable personal use of the organization’s technology resources is permitted, subject to the Data Classification and Handling Policy, provided that the use does not interfere with the user's job performance or result in a direct cost to the organization and the use does not violate any other provision of this policy.
- System Access: User-assigned accounts must only access assets, operating systems, applications, files, and data to which they have been granted access. The ability to inadvertently read, execute, modify, delete, or copy data does not imply permission to do so.
Prohibited Uses
The following is a non-exhaustive list of activities that are strictly prohibited when using the organization's technology resources.
- Illegal and Unlawful Conduct: Any activity that violates local, state, federal, or international laws is strictly prohibited, including the use of resources to facilitate illegal activities.
- Security Violations: Users are prohibited from attempting to bypass, circumvent, or disable any security measures, including network security, access controls, or user authentication protocols. This also includes the intentional introduction of malicious software such as viruses, worms, or Trojans.
- Intellectual Property Infringement: The unauthorized use, reproduction, or distribution of copyrighted materials, trade secrets, patented inventions, or other intellectual property is forbidden. This includes unauthorized downloads of software, music, text, or images. (see ÁñÁ«ÊÓÆÁ’s Copyright Policy)
- System Misuse: Prohibited activities include, but are not limited to, intentionally disrupting the computing environment, degrading the performance of information systems, or obtaining more resources than allocated.
- Communication Misconduct: The transmission of abusive, harassing, threatening, defamatory, or discriminatory messages is forbidden. Users must not infringe on another individual's right to privacy or otherwise adversely affect members of the user community.
- For-Profit Activities: Activities that are inconsistent with the academic mission and the not-for-profit status of ÁñÁ«ÊÓÆÁ are prohibited.
- Unapproved Cloud Services: Confidential or otherwise sensitive college information must not be stored, shared, or otherwise processed by a cloud computing service unless the service provider enters into a legally binding agreement with ÁñÁ«ÊÓÆÁ that is approved by the chief information officer.
Failure to Comply
Ongoing use of Reed's computing facilities and services implies a user's acceptance of the most current version of this policy. Users who decline to accept the current version will be prohibited from using Reed's computing facilities and services.
If a computer user fails to comply with these terms and conditions, the "Procedures for Handling Violations of the Acceptable Use Agreement," will be followed. These procedures available on the IT website at:
/it/policies/violations_procedures.html
Other policies related to the use of Reed's computing resources are available on the IT website at: /it/policies/