IUPUI Bulletins » Policies » Related Policies » Technology Access, Security, and Use Policies

Related Policies

Technology Access, Security, and Use Policies

Indiana University has a rich information technology environment, and while some personal use of computers, networks, and telecommunications systems is permitted, access to and use of these resources is restricted to purposes related to the university's mission of research and creative activity, teaching and learning, and civic engagement.

Indiana University technology resources may not be used in a manner that violates the law, for private commercial activities that are not approved by the university, for personal private gain, or for political campaigning and similar activities that are inconsistent with the university's tax-exempt status.

By receiving and using your IU username and passphrase, you accept certain responsibilities and standards for computer use, which apply to all IU computing resources. 

The university deals seriously with failure to use IU computing resources as described. Violators are subject to the normal disciplinary procedures of the university, and the loss of computing privileges may result. Illegal acts involving IU computing resources may also be subject to prosecution by state and federal authorities.

By accepting your IU computing accounts, you agree to observe the responsibilities and standards outlined in the Acceptable Use Agreement for access to technology and information resources at IU.

For detailed information on university-wide IT policies, visit https://informationsecurity.iu.edu/policies/index.html.

Student Status

Your access to UITS accounts and services is dependent upon your status with Indiana University.  Once you have been admitted to IU, you are eligible to create the full suite of student computing accounts, even if you have not yet paid your enrollment fee or registered for classes. If you do not register for classes at IU, your accounts will be disabled approximately six weeks into the semester.

Student status is determined by your presence in the Student Information System (SIS).  If you have questions about your standing as a student, contact the Office of the Registrar.

Eligibility to Use Information Technology Resources

Students are eligible to access and use university information technology resources.

  • Undergraduate, graduate, and non-degree students are eligible to use information technology resources for the duration of their enrollment. Eligibility is based on information supplied by the campus registrar's office.
  • Distance education students are eligible to use technology resources for the duration of their enrollment. Eligibility is based on information supplied by the relevant continuing studies/distance education unit (or campus/department equivalents), and may require the student to request access and pay a service fee.
  • Once individuals are entered into the official university records system, they may create and maintain their own central computing accounts by visiting https://access.iu.edu.
  • Continued eligibility is automatic for enrolled students, and enrollment status is based on official university records.
  • A student's access to his or her accounts will be disabled after official university records indicate the student is not enrolled.
  • Students who are no longer enrolled are eligible to use technology resources for purposes that directly support the mission of the university, with a written request from a university faculty member or academic faculty advisor. The sponsor submits the request to add an affiliate account by visiting https://access.iu.edu. Periodic renewal by the faculty member or advisor is required, and accounts will be removed at the termination of the activity.
  • Student accounts will be deleted 180 days after they have been disabled.

Misuse and Abuse of Information and Technology Resources

Indiana University will handle reports of misuse and abuse of information and information technology resources in accordance with existing policies and procedures issued by appropriate authorities. Depending on the individual and circumstances involved this could include the offices of Human Resources, Vice Provost or Vice Chancellor of Faculties (or campus equivalent), Dean of Students (or campus equivalent), Office of the General Counsel, and/or appropriate law enforcement agencies. See policy IT-02, Misuse and Abuse of Information Technology Resources for more detail.

Failure to comply with Indiana University information technology policies may result in sanctions relating to the individual's use of information technology resources (such as suspension or termination of access, or removal of online material); the individual's employment (up to and including immediate termination of employment in accordance with applicable university policy); the individual's studies within the university (such as student discipline in accordance with applicable university policy); civil or criminal liability; or any combination of these.

Expectations of Use

Use for personal commercial gain is not permitted under any circumstances, so students may not use IU resources to support a private business.

Students are responsible for ensuring that their personal computers are secure and free from viruses and other malicious programs.

Illegal acts will be reported to the appropriate law enforcement agency. Such acts include but are not limited to harassment, threats, pyramid schemes, trafficking in child pornography, and computer trespass or tampering.

Many common uses of computers, photocopiers, and other technologies can result in violation of copyright law. Downloading or distributing whole copies of copyrighted material for personal use or entertainment without explicit permission from the copyright owner is most certainly illegal. Copyright law applies to materials such as music, movies, games, or other software in both digital and analog format. File sharing applications are not illegal, but many of the files being shared through such applications are illegal copies being distributed by users who do not have permission to share them.

While Indiana University does not actively search for instances of copyright violation, the university is obligated to investigate complaints of illegal activities or inappropriate use taking place on the IU network. When IU receives such a complaint, the university is legally required to take action to remove the offending material from the IU network. More information is available at https://informationsecurity.iu.edu/personal-preparedness/file-sharing/index.html.

Those who commit an infringement may be held personally liable under the law; those who commit the infringement with university-owned resources also violate university policy and could face disciplinary actions. Students must make the effort to understand the copyright law that protects books, computer software, Web sites, multimedia files such as movies and music, and other works. Remember that a work need not include any copyright notice or other indication of copyright to have automatic legal protection. Copying short excerpts of works for limited distribution and access may be “fair use” and not an infringement. Students are responsible for learning about fair use and its application to their projects. Information about copyright and fair use can be found at the Copyright Management Center site (http://copyright.iu.edu/).

If the University receives any report of violations of law or policy perpetrated by any member of the IU community using IU resources, that report will be investigated and reported to the appropriate law enforcement and/or university office for possible action. Students should visit the Web pages of the University Information Technology Policy Office (https://informationsecurity.iu.edu/index.html) to learn more about Indiana University information technology appropriate use policies, and the services of the Policy Office.