Procedures​

A. Reporting Suspected Violations of the Acceptable Use Policy 


If a potential violation occurs in a UF classroom or lab, violations should be reported to the faculty or staff monitoring the facility, or to the Information Technology Officer. If a potential violation occurs in a non-instructional area, the situation should be reported to the supervisor of the area. Alternatively, complaints may be filed with the Office of Security or the Office of Student Affairs. 


Where appropriate, whoever is notified first shall review the activities and, if merited, notify the user that they are in violation of this Policy and request that they take immediate remedial action to bring their conduct into compliance. The violation should then be immediately reported to the Information Technology Officer so damage to data or system integrity may be assessed. University’s IT personnel may take immediate action, as needed, to abate ongoing interference with network and system operations, or to insure system integrity. 


The details of all reports, including the identity of the complainant, will be handled in the strictest of confidence. Anonymous reports may be investigated but are not likely to result in judicial action or resolution. 


B. Procedures For Gathering and Reporting Evidence 


Any office receiving a complaint about a suspected violation of the Acceptable Use Policy will report this to the Information Technology Officer in writing or email. The Information Technology Officer will ensure that the report is forwarded to the most appropriate IT staff member for initial investigation.


Authorizations are required before specific evidence can be gathered about an individual’s activity unless required by law or necessary to respond to a perceived emergency situation. Authorization for monitoring an individual’s use of resources or the gathering of evidence from an individual’s assigned account, network storage space or a University-owned computer must be granted by the appropriate authority. In the case of student accounts, authorizations come from the Vice President for Student Affairs or his/her designee. In the case of members of the faculty, authorizations come from the Vice President of Academic Affairs or his/her designee. In all other cases, authorizations come from the Director of Human Resources or the Vice President of Finance. Authorizations must be specific and delivered in writing or by email to the Information Technology Officer before any evidence is gathered from an individual’s accounts. 


C. Negligent Computer Use 


It is a violation of the Acceptable Use Policy for anyone to continue to operate any computer on The University of Findlay network that is known to propagate any potentially disruptive software code. Ignorance of technical methods to update, patch or disinfect a computer is not justification for continued use. It is the responsibility of the computer user to take all reasonable steps to ensure that any vulnerable or infected computer on the network is restored to proper operating condition.​