Acceptable Use Policy: Primer

This overview guide was prepared for anyone that uses the University’s computing and network resources.

    What is the Computer Systems Acceptable Use Policy (AUP)?

    The AUP establishes the appropriate use of computing and network resources and embodies the principles of respect and reverence for every person that are at the core of Georgetown’s Catholic, Jesuit identity.

    GU Network Responsibilities

    • Don’t modify existing University systems by setting up routers, switches, hubs or other devices that can temporarily or permanently disrupt routine operation of systems.
    • Don’t conduct activities that tie up network resources, these include:
      • using the network to transfer large media files, such as downloading or uploading music or movies using a file sharing service
      • sending excessive amounts of email messages, such as spam.
      • subverting the security of any system or network.
      • unauthorized modification, alteration, and deletion of computers, networks, software, applications or files

    Respecting Intellectual Property

    • Fair use allows you to enjoy legally acquired music, movies and software, but you must avoid unauthorized redistribution or use of copyrighted content.
    • Avoid:
      • Downloading or distributing copyright protected documents. 
      • Using the network to distribute or publish materials that infringe on copyright.

    NetID Password Protection

    • Don’t share your NetID password, even with those you trust. Compromised passwords are threats to the security of your personally identifiable and confidential information, like course grades and financial information.
    • Don’t log in to another person’s University accounts, such as Google Apps or MyAccess. Your friends and colleagues should never provide you with user names or passwords.
    • Report compromises to your University accounts immediately to the University Information Security Office. Change the password immediately.
    • Read the Password security page for additional tips.

    Connecting To The Network

    Before connecting to the University network, make sure your computer runs the following:

    • Antivirus and anti-spyware software with updated definitions
    • Firewall
    • Patches and updates for your computer’s operating systems and desktop applications
    • Passwords that follow the University’s recommended password policy.

    When connected to the network:

    • Avoid surfing at disreputable Web sites
    • Make backups of your work
    • Stay informed about the latest UIS Security Alerts

    Check out the Awareness page for more security tips.

    Read the full AUP.

    Myth Busters!

    Myth: I will never be caught if I download copyrighted music and movies.

    Fact: Hundreds of college students have been sued by the recording and movie associations for downloading copyrighted content illegally. The identities of file swappers are not anonymous!

    Myth: I am allowed to set up a wireless network on campus.

    Fact: False. Personal networks that are misconfigured can cause outages affecting large areas of campus. If you add a banned device to the University network, you risk losing your University network privileges and could be disconnected from the Internet. 

    Myth: The University’s network protects me from identity theft, snooping and virus-attacks.

    Fact: The University network is simply a way for you to connect to the Internet. It is your responsibility to secure personal information and practice safe computing. For example, do not divulge personal information on disreputable websites.