Continuity of Operations planning information for the College of Education: Click here


Acceptable Use Policy ed-au-01

1.0 Purpose

The purpose of this policy is to outline the acceptable use of computer equipment within the College of Education. It is the responsibility of every computer user to know these guidelines and conduct their activities accordingly.

2.0 Scope

This policy applies to all users and all equipment that is connected to the College of Education network. Users are defined as full-time or part-time permanent staff, temporary staff, student interns, work-study students, graduate students, guests, and alumni.

3.0 Policy

3.1 General Policy

Identifiable, sensitive or vulnerable information must be encrypted. (For details, see the College Confidential Data Policy ed-cd-01.) For security and network maintenance purposes, authorized individuals within the College of Education may monitor equipment, systems and network traffic at any time (See the College Account Audit Policy ed-aa-01).
The College of Education reserves the right to scan and audit networks and systems on a periodic basis to ensure compliance with this policy and University policies.

3.2 Acceptable Use Terms of Agreement

The user must be knowledgeable of and agree to abide by the conditions set forth in the following Penn State policies: AD-11, AD-20, AD-23 and ADG-01.

  • AD-11: University Policy on Confidentiality of Student Records
  • AD-20: Computer and Network Security
  • AD-23: Use of Institutional Data
  • ADG-01: Glossary of Computer Data and System Terminology

In addition:

  • The user understands that Penn State computers and network resources are provided to advance the mission of the University and their use for inappropriate, illegal, or profit-making enterprises is not permitted.
  • The user understands that, because computer skills that are valuable in the workplace are often developed after work hours while people work on such things as digital photography, digital movie making, and podcast creation, these activities are encouraged and may be conducted on Penn State computers, but activities of a personal nature must be conducted outside of the normal work day.
  • The user understands that when physically connected to the College network using a Penn State owned computer they will need to accept the following warning to advance to the login screen:
  • "This computer is property of The Pennsylvania State University. Its use is reserved for persons authorized by Penn State University College of Education and is governed by Penn State security and acceptable use policies; including AD-11, AD-20, AD-23 and ADG-01."
  • The user agrees not to share any account passwords, nor allow another user to access a computer under his or her credentials.
  • For each account, the user agrees to adhere to secure password criteria and comply with the requirement for periodic changes.
  • The user agrees not to attempt to obtain or view any electronic institutional data that is not intended for use in her/his job function.
  • The user agrees not to introduce malicious code into departmental computer systems, either as a result of willful intent or as a result of the user's unsafe electronic mail practices.
  • The user understands that use of the College of Education network account constitutes his/her continued agreement with the conditions set forth above. If the user chooses not to comply with this agreement, s/he will cease using the account and immediately notify the College's Education Technology Center office by telephone, electronic mail, or in writing. Upon receipt of the notification, the user's account(s) will be disabled. The account will be terminated in 3 months if no further communication regarding the status of the account is received. Data deleted after 1 year.

3.3 Email and Communications Activities

The user agrees not to engage in the following activities:

  • Sending unsolicited "junk mail" or other advertising material to individuals who did not specifically request such material (email spam).
  • Any form of harassment via email, telephone or paging, whether through content, language, frequency, or size of messages.
  • Unauthorized use, or forging, of email header information.
  • Solicitation of email for other email address, other than that of the poster's account, with the intent to harass or to collect replies.
  • Creating or forwarding "chain letters" or "pyramid" schemes of any type.
  • Posting identical or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam).

4.0 Enforcement

Any user found to have violated this policy may be subject to disciplinary action by their Administrative unit, the College, and/or the University.

5.0 Revision History


Please sign and deliver to 201 Chambers