2.2 Appropriate Use & Terms of Use

quote block

Users are required to adhere to the following Appropriate Use standards whenever they access or interact with the University’s Information Technology Resources and Institutional Information:

  1. Access Controls & Authentication: Access to restricted resources is granted through authentication credentials and controls provided as a privilege tied to a user’s role. The university reserves the right to revoke credentials to safeguard resources.
  2. User Responsibility & Security Awareness: Users are responsible for maintaining the integrity, security, and confidentiality of university resources and data. They must follow instructions from resource administrators and take proactive measures to prevent unauthorized access, such as recognizing phishing attempts, malware risks, and social engineering threats.
  3. Prohibited Activities: Circumventing security controls, accessing unauthorized systems or data, sharing credentials, or granting unauthorized access to others is strictly prohibited. Users must only access resources and data within the scope of their roles and responsibilities, ensuring compliance with all related policies and procedures.

By accessing the University’s Information Technology Resources and Institutional Information, users agree to adhere to these Terms of Use, which define acceptable behavior, security practices, and user responsibilities. These Terms of Use are subject to updates to reflect changes in legal, regulatory, and cybersecurity requirements. Additionally, users must comply with all applicable federal, state, and local laws, including those governing intellectual property, communications, privacy, and the appropriate use of government resources.

quote block
Related Policies:

Why

Utah State University (USU) relies on the secure and responsible use of Information Technology Resources and Institutional Information to support its academic, research, and administrative functions. Unauthorized or inappropriate use of these resources can lead to data breaches, system compromises, regulatory non-compliance, and operational disruptions. This policy ensures that all users understand their role in safeguarding institutional data, adhering to security best practices, and complying with university policies and legal requirements.

By establishing clear Appropriate Use and Terms of Use standards, USU protects sensitive information, mitigates cybersecurity risks, and upholds ethical and legal responsibilities. These standards define acceptable behavior, outline security practices, and clarify user responsibilities. Users must acknowledge these terms and accept their obligation to prevent unauthorized access, misuse, and exposure of confidential information—including personal data, research records, and institutional resources. A failure to do so could result in financial, reputational, and legal consequences for both individuals and the university.

Moreover, the Terms of Use provide structured guidance on interacting with university systems, handling information responsibly, and reporting security incidents. By aligning user actions with USU’s broader security policies and regulatory requirements, this policy fosters a cohesive and secure IT environment. Ultimately, it ensures that everyone—from students and faculty to staff and researchers—contributes to a safe, compliant, and resilient digital ecosystem, reducing the risk of data breaches while supporting the university’s mission.