A.
Reporting Suspected Violations of the Acceptable Use Policy
If
a potential violation occurs in a UF classroom or lab, violations should be
reported to the faculty or staff monitoring the facility, or to the Information
Technology Officer. If a potential violation occurs in a non-instructional
area, the situation should be reported to the supervisor of the area.
Alternatively, complaints may be filed with the Office of Security or the
Office of Student Affairs.
Where
appropriate, whoever is notified first shall review the activities and, if
merited, notify the user that they are in violation of this Policy and request
that they take immediate remedial action to bring their conduct into
compliance. The violation should then be immediately reported to the
Information Technology Officer so damage to data or system integrity may be
assessed. University’s IT personnel may take immediate action, as needed, to
abate ongoing interference with network and system operations, or to insure
system integrity.
The
details of all reports, including the identity of the complainant, will be handled
in the strictest of confidence. Anonymous reports may be investigated but are
not likely to result in judicial action or resolution.
B.
Procedures For Gathering and Reporting Evidence
Any
office receiving a complaint about a suspected violation of the Acceptable Use
Policy will report this to the Information Technology Officer in writing or
email. The Information Technology Officer will ensure that the report is
forwarded to the most appropriate IT staff member for initial investigation.
Authorizations
are required before specific evidence can be gathered about an individual’s
activity unless required by law or necessary to respond to a perceived
emergency situation. Authorization for monitoring an individual’s use of
resources or the gathering of evidence from an individual’s assigned account,
network storage space or a University-owned computer must be granted by the
appropriate authority. In the case of student accounts, authorizations come
from the Vice President for Student Affairs or his/her designee. In the case of
members of the faculty, authorizations come from the Vice President of Academic
Affairs or his/her designee. In all other cases, authorizations come from the
Director of Human Resources or the Vice President of Finance. Authorizations must
be specific and delivered in writing or by email to the Information Technology
Officer before any evidence is gathered from an individual’s accounts.
C.
Negligent Computer Use
It is a violation of the
Acceptable Use Policy for anyone to continue to operate any computer on The
University of Findlay network that is known to propagate any potentially
disruptive software code. Ignorance of technical methods to update, patch or
disinfect a computer is not justification for continued use. It is the responsibility
of the computer user to take all reasonable steps to ensure that any vulnerable
or infected computer on the network is restored to proper operating condition.