Hide
Hide

Acceptable Use

Purpose

To define appropriate and responsible use of campus computing and networking facilities. The intent of this policy is to provide access to campus computing resources that is consistent with the generally accepted principles of ethics that govern the university's academic community. Bryant University seeks to provide access to staff, faculty, and students within institutional priorities and financial capabilities.

Access to university-owned computer facilities, equipment, hardware, software, printing facilities, and services, is a privilege, not a right. This privilege is extended to all faculty, staff, and students. The university expects all members of the community to use computing, data, and information technology resources in a responsible manner, respecting the rights and privacy of others, the integrity of facilities and controls, state and federal laws, and university policies, guidelines, and standards.

Scope

This policy applies to all users of the University’s computing, data, and information technology resources.

Policy

User Compliance

When you use university computing services and accept any university issued computing accounts, you agree to comply with this and all other computing related policies, guidelines, and standards. You have the responsibility to keep up to date on changes in the computing environment, as published, using university electronic and print publication mechanisms. Occasional limited personal use of university facilities, computers, and equipment, including email and internet access, is permitted. University-owned electronic devices are intended for business use. Information Services is not responsible for the recovery of personal data stored on university-owned electronic devices.

Adherence with Federal, State, and Local Laws

As a member of the Bryant University community, you are expected to uphold local ordinances and state and federal law. As a user of Bryant's computing and network resources you must:

  • Abide by all federal, state, and local laws.
  • Abide by all applicable copyright laws and licenses. Bryant University has entered into legal agreements or contracts for many of our software and network resources which require each individual using them to comply with those agreements.
  • Observe the copyright law as it applies to music, videos, games, images, texts, and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified, and sent over the Internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy, and copyright infringement.
  • Not use, copy, or distribute copyrighted works (including but not limited to Web page graphics, sound files, film clips, trademarks, software, and logos) unless you have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation, and criminal prosecution.

Authorized Software

The purpose of this control is to provide measures that will mitigate information security risks associated with authorized software. Authorized software is any software that is acceptable for use on Bryant University information technology resources. All software installed or used on university-owned information technology resources must be appropriately licensed and approved in advance of its use.

Prior to purchase, lease, development, or use of university software, users must contact the IT Service Desk to begin the approval process. The IT Service Desk will assist organizations by guiding the request through the required reviews/approvals process.

Other Inappropriate Activities

Use Bryant's computing facilities and services for those activities that are consistent with the educational, administrative, and public service mission of the university. Other prohibited activities include but are not limited to the following:

  • Activities that would jeopardize the university's tax-exempt status.
  • Use of IT resources for political purposes or personal economic gain
  • Unauthorized access to systems or data
  • Cryptocurrency mining
  • Use of unapproved AI tools
  • Use of unapproved cloud services for storing sensitive data
  • Use of personal printers and surveillance cameras on campus networks are not permitted
  • Personal data is not private, personal use should be limited on university devices
  • If you are handling confidential data, it should be encrypted
  • Confidential and Highly Confidential university data should be encrypted on external hard drives

Privacy and Personal Rights

  • All users of the university's network and computing resources are expected to respect the privacy and personal rights of others.
  • Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to university discipline as well as legal action by those who are the recipient of these actions.

While the university does not generally monitor or limit content of information transmitted across or stored on university resources, it reserves the right to access and review such information under certain conditions if approved by VP or HR or the university President. These include but are not limited to: investigating performance deviations and system problems (with reasonable cause), determining if an individual is in violation of policy, or, as may be necessary, to ensure that Bryant is not subject to claims of institutional misconduct. Access to files on university-owned equipment or information will only be approved by specific university personnel when there is a valid reason to access those files.

Compliance

The university reserves the right to monitor, audit, inspect, and limit the use of its information technology and digital resources, as well as to access, disclose, or remove any data stored or transmitted on or through these resources, in accordance with applicable policies and laws. The university also reserves the right to suspend, revoke, or restrict the access or privileges of any user who violates this policy or any other applicable policies or laws. The university may also impose disciplinary actions, up to and including termination or expulsion, and may refer any violations to the appropriate legal authorities for prosecution.

Exceptions

Any exceptions to directives outlined within this document are to be reviewed and approved by the Vice President of Information Services, as needed.

Policy Review and Revisions

Last ReviewedLast UpdatedSummary
8/30/20258/30/2025Annual review and update.