Published on Information Security at UVA (https://security.virginia.edu)

Home > Information Policy Library > Acceptable Use

Acceptable Use

About

All users of University information technology (IT) resources are required to use them in an ethical, professional, and legal manner.

Policy

Acceptable Use of the University’s Information Technology Resources (IRM-002) [1]

Standards

Accounts Provisioning and Deprovisioning [2]

Authentication [3]

Connecting Network Equipment [4]

Copyrights of Digital Materials and Software [5]

Electronic Access Requirements [6]

External Physical Network Connections [7] >> Replaced by Connecting Network Equipment [4]

Responsible Disclosure [8]

Virginia.edu Subdomain Naming Standard [9]

Procedures

Connecting Network Equipment Procedures [10]

Copyrights of Digital Materials and Software Procedures [11]

External Physical Network Connections Procedures [12] >> Replaced by Connecting Network Equipment Procedures [10]
 

Guidance

Accounts Provisioning and Deprovisioning Guidance [13]

Information Security Awareness for Faculty and Staff  [14]

Information Security Awareness for Students [15]

 


Source URL:https://security.virginia.edu/acceptable-use

Links
[1] https://uvapolicy.virginia.edu/policy/IRM-002 [2] https://security.virginia.edu/accounts-provisioning-and-deprovisioning-standard [3] https://security.virginia.edu/authentication [4] https://security.virginia.edu/connecting-networking-equipment-standard [5] https://security.virginia.edu/copyrights-digital-materials-and-software-standard [6] https://security.virginia.edu/electronic-access-requirements [7] https://security.virginia.edu/external-physical-network-connections-standard [8] https://security.virginia.edu/responsible-disclosure [9] https://security.virginia.edu/subdomain-naming-standard [10] https://security.virginia.edu/connecting-networking-equipment-procedures [11] https://security.virginia.edu/copyrights-digital-materials-and-software-procedures [12] https://security.virginia.edu/external-physical-network-connections-procedures [13] https://security.virginia.edu/accounts-provisioning-and-deprovisioning-guidance [14] https://security.virginia.edu/responsible-computing-faculty-staff [15] https://security.virginia.edu/responsible-computing-students