Penn State Policy AD96: Acceptable Use of University Information Resources establishes and defines the "acceptable use" of Penn State electronic resources, including, but not limited to, network connections, computer facilities, and additional network services. Individuals with access to the University's information technology resources are responsible for their appropriate use, and by their use, agree to comply with all applicable University, policies, guidelines and standards, and applicable State and Federal laws and regulations.
For use and access to be acceptable, individuals must demonstrate respect of:
- the rights of others privacy
- intellectual property rights (e.g. as reflected in licenses and copyrights)
- ownership of information
- system mechanisms designed to limit access
- an individual's right to be free of intimidation, harassment, and/or retaliation
The University is not responsible for the content of individuals’ personal web spaces, nor the content of servers, programs or files that individuals maintain either in their personally allocated file areas on University-owned computer resources or on personally-owned computers connected to the University's Information Resources.
You can learn more about Compliant Networking by reading the entire Penn Stae AD95 Acceptable Use of University Information Resources Policy
This service is part of the Networking category.
- This is an active service
- Compliant networking guidelines apply to all faculty, staff, students, and other individuals using Penn State's network resources
- The guidelines also apply to individuals who are conducting Penn State business using external networks including all University owned, licensed, or managed hardware and software, the use of University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network, and use of information
- This policy excludes Penn State Health and The Pennsylvania College of Technology, which will follow separate policies
- Exceptions to, or exemptions from, any provision of the Policy AD96 or supplemental IT Guidelines and Standards must be approved by the Office of Information Security in accordance with the Requests for Exception to Information Security Policy Standard
- Any questions about the contents of this policy or supplemental IT Guidelines and Standards should be referred directly to the Chief Information Security Officer and the Office of Information Security (by e-mail) who has the responsibility to interpret the Security Standards
- For questions or additional details on Compliant Networking, please contact the Office of Information Security directly by e-mail