Appropriate Use of Information Technology Resources
Misuse and Abuse of Information Technology Resources
Indiana University expects IU Blogs and related information technology resources will be used in a lawful manner and in support of the university’s mission of research and creative activity, teaching and learning, and civic engagement.
IU Blogs accounts are provided to individuals with university accounts that authenticate through IU Login. Individuals may not share with or transfer to others their university accounts including network IDs, passwords, or other access codes that allow them to gain access to IU Blogs.
IU Blogs may not be used in a manner that violates the law, for private commercial activities that are not approved by the university, for personal private gain, or for political campaigning and similar activities that are inconsistent with the university’s tax-exempt status.
Only Public and University-Internal data are suitable to be stored in IU Blogs. Restricted and Critical data cannot be stored in IU Blogs. For definitions of Public, University-Internal, Restricted, and Critical data, see Classification levels of institutional data. In addition, federally and state-protected data, human subjects research data, and passwords cannot be stored in the WCMS. For more about data classifications, see About sensitive data at IU.
Indiana University will handle reports of misuse or abuse of information and IU Blogs in accordance with existing policies and procedures issued by appropriate authorities. Depending on the individual and circumstances involved this could include the offices of Human Resources, Vice Provost or Vice Chancellor of Faculties (or campus equivalent), Dean of Students (or campus equivalent), Office of the General Counsel, and/or appropriate law enforcement agencies. See policy IT-02, Misuse and Abuse of Information Technology Resources, for more detail.
- Created May 3, 2021
- Posted May 2021
- Added Data storage section October 2022