Your browser is unsupported

We recommend using the latest version of IE11, Edge, Chrome, Firefox or Safari.

Acceptable Usage Policy

All users have a responsibility to use the Technology Solutions (TS) computing services in an efficient, ethical, and legal manner. Users of the TS computer facilities are expected to abide by the following policies, which are intended to preserve the utility and flexibility of the computer system, protect the work of students, staff, and faculty, and preserve the right to access networks to which the University is connected.

You will be assigned a TS computer account to access TS computer facilities. The University reserves the right to access your account and the system to the extent necessary to investigate security breaches or other infractions of these rules. Your own password will allow access to your account and you may not allow any other person to use your account for any reason. In addition, it is your responsibility to protect your account from unauthorized use by changing passwords periodically and using passwords that are not easily guessed.

Identify yourself clearly and accurately in electronic communications. Concealing or misrepresenting your name or affiliation to mask irresponsible or offensive behavior is a serious abuse. Using identifiers of other individuals as your own constitutes fraud.

You are expected to take proper care of the equipment in TS facilities. Eating, drinking, and smoking are not allowed in UIC labs (i.e., food and beverages are not allowed). Report any malfunction to the consultant on duty or send email to consult@uic.edu. Do not attempt to move, repair, reconfigure, modify, or attach external devices to the systems. Individual TS computer laboratories can post additional operational rules and restrictions that are considered part of the TS computer policy. You are responsible for reading and following these rules.

Accept limitations or restrictions on computing resources, such as storage space, time limits, or amount of resources consumed, when asked to do so by system administrators. Such restrictions are designed to ensure fair access for all users. You are expected to use computing resources in a responsible and efficient manner consistent with the instructional, research, and administrative goals of the University.

Accept responsibility for your own work by learning appropriate uses of software to maintain the integrity of what you create. Keep archives and backup copies of important work; learn and properly use the features for securing or sharing access to your files on any computers you use. While great effort is made to keep the contents of what you create, store, and send to be seen only by those to whom you intend or give permission, the University cannot and does not guarantee the security of electronic files on its computer systems. These systems can sometimes be breached by someone determined to do so. Additionally, as specified above, the University reserves the right to access its computer systems, including your account, if it deems it appropriate.

You are expected to refrain from engaging in deliberate wasteful practices such as multi-user dungeons (MUDs), sending chain letters through electronic mail, printing unnecessary output, printing multiple copies of files, performing unnecessary computations, generating excessive network traffic, or unnecessarily holding public PCs or dial-up phone lines for long periods of time when others are waiting for these resources. Academic work always has priority over other authorized uses.

You are expected to refrain from installing or using unauthorized software, particularly software that creates security risks on University computer facilities. Other programs may be restricted by the departmental system administrators and will be announced through appropriate channels.

Unauthorized transferring of copyrighted materials to or from TS computing and/or storage systems without the expressed consent of the owner is a violation of federal law. In addition, the use of the Internet for commercial gain, profit, or advertisement is not allowed from UIC.

Use of email and other network communications facilities to harass, offend, or annoy other users of the network is forbidden. All users need to be aware that obscene, defamatory, or any other material which violates University policy on non-discrimination will not be tolerated at UIC. The University reserves the right to take whatever action it sees as appropriate to prevent, correct, or discipline behavior that violates this policy.

Any attempt to circumvent system security, guess other passwords, or in any way gain unauthorized access to local or network resources is forbidden. Distributing passwords or otherwise attempting to evade, disable, or "crack" passwords or other security provisions threatens the work of many others and is therefore grounds for immediate suspension of your privileges. You may not develop programs or use any mechanisms to alter or avoid accounting for the use of computing services or to employ means by which the facilities and systems are used anonymously or by means of an alias.

Access to and utilization of the resources of TS computing services is a privilege and NOT a right; they can be withdrawn or curtailed forthwith and without notice if there is a reason to believe that the user has or may have violated this policy or applicable law. Additionally, violation of this policy can result in further discipline under the appropriate procedures extant at UIC or by civil or criminal prosecution. All users, as a condition of their access to or utilization of TS computing services, agree to cooperate in every way with TS in an investigation of alleged improprieties or abuse of this privilege and waive any right of confidentiality. Failure to cooperate fully with TS shall be considered a violation of policy.

The staff at TS will investigate apparent or alleged violations of these guidelines. TS also reserves the right to immediately suspend user privileges for potential violations of these guidelines to the extent necessary to protect the security and integrity of TS computing systems. When appropriate, at the discretion of TS, cases of apparent abuse will be reported to the Vice-Chancellor of Student Affairs (student cases), to the Assistant Vice President for Human Resources (academic professional and support staff cases), or to the Provost (faculty cases). These respective offices are responsible for determining any further disciplinary actions.

Issues concerning these guidelines, or allegations of harassment or other irresponsible use of computing resources, should be brought to the attention of TS by sending email to consult@uic.edu.