Technology Policies

The general goal of these policies is to remind the University community to use technology responsibly.

Technology Policy Locations

Please see the full list of student technology policies on the

Employee Technology Policies
Employee technology policies are located on the intranet

Acceptable Use

Please note that while the following are examples of acceptable and unacceptable behaviors on the network, we do not attempt to cover every possible use. 

  • Use resources only for authorized purposes.
  • Protect your user id and system from unauthorized use. You are responsible for all activities on your userid or that originate from your system. Your userid and password act together as your electronic signature.
  • Access only information that is your own, that is publicly available, or to which you have been given authorized access.
  • Use only legal versions of copyrighted software in compliance with vendor license requirements.
  • Be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connection time, disk space, printer paper, manuals, or other resources.
  • Use another person's system, files, or data without permission (note that permission from an individual user may not be sufficient - some systems may require additional authority).
  • Give your password to another person. Contact the Information Technology Help Desk if you need assistance with giving other people authority to access your files or e-mail.  (IT Help Desk E-Mail)
  • Use computer programs to decode passwords or access-control information.
  • Attempt to circumvent or subvert system or network security measures.
  • Engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, worms, or "Trojan horse" programs; disrupting services; damaging files; or making unauthorized modifications to university data.
  • Make or use illegal copies of copyrighted software, store such copies on university systems, or transmit them over University networks.
  • Use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else's name or userid.
  • Waste shared computing or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings.
  • Use the University's systems or networks for commercial purposes, for example, by selling access to your userid or by performing work for profit with University resources in a manner not authorized by the university.

Computer Labs

两性色午夜 provides a number of computers for use by students, staff and faculty in the Computer Labs. Use of computers in these labs follow all of the general policies, including Acceptable Use.

Please see additional information regarding storing data on lab computers below.

Users of 两性色午夜 computers may often wish to temporarily store their data on 两性色午夜 computers. This practice is permitted with the following constraints:

  • Data on 两性色午夜 computers (PCs and workstations) is not backed up.
  • Other users, or 两性色午夜 IT, may periodically clean the hard drive and delete all data.
  • Every semester the lab computers will be reformatted and wiped clean so that all data is removed.
  • 两性色午夜 holds no responsibility for any data temporarily stored on a 两性色午夜 lab computer.

Email

Email is a mechanism for official communication within 两性色午夜 University of California. Therefore all students at 两性色午夜 University of California are required to have a 两性色午夜 student email account set up and working.

Website Privacy Policy