All faculty, staff, and students who use any computer at the ECE Department (and the University of Washington in general) are responsible for using computer resources in an ethical and legal manner. University policy prohibits account theft, file theft, violations of informational privacy, and penetration or harm to operating systems. If abuse of computer systems occurs, those responsible for such abuse will be held legally accountable.

When you use ECE computer resources, you agree to the following conditions:

1. User Privacy:

  • There should be no expectation of privacy on the part of the user.
  • As required by state law, the University hereby notifies users that email may be a public record and open to public inspection under the Washington State Public Records Act, unless the email is covered by an exception to the Act, such as personally identifiable student information, proprietary information, or trade secrets.
  • Users should be aware that any activity on systems and networks may be monitored, logged, and reviewed by university approved personnel or may be discovered in legal proceedings. All documents created, stored, transmitted, or received on university computers and networks may be subject to monitoring by systems administrators.

2. Users will:

  • Comply with all University policies to ensure confidentiality, integrity, and availability of university resources under their control.
  • Only use University resources for which the User has authorization.
  • Be responsible for using University-approved resources for electronic data and understanding the back up and retention policies associated with those resources.
  • Control and secure physical and network access to University resources, including data.
  • Properly log out of sessions.
  • Monitor access to their accounts. If a User suspects unauthorized activity or that their account has been compromised, they must report the compromise to the IT Computing Group responsible for information security or their designee, and change passwords immediately.
  • Install, use, and regularly update virus protection software.
  • Use only supported and patched applications and operating systems on University-owned devices. Exceptions must be documented and approved by the IT Computing Group or their designee.
  • Where technically possible, abide by the password protection best practices specified for each University resource.
  • Use only the passwords and privileges associated with their computer account(s) and use those account(s) only for their authorized purpose.
  • Respect and honor the rights of other individuals with regard to intellectual property, privacy, freedom from harassment, academic freedom, copyright, and use of University resources.
  • Use University provided software in a manner that strictly adheres to all licensing provisions, including installation, use, copying, number of simultaneous users, and other terms of the license.

3. Users WILL NOT:

  • Share access codes or passwords.
  • Use accounts, access codes, privileges or IT resources for which they are not authorized.
  • Tamper, modify, or alter any restrictions or protections placed on their accounts, the University’s system, or network facilities.
  • Physically damage or vandalize University resources.
  • Commit copyright infringement, including file sharing of video, audio, or data without permission from the copyright owner.
  • Use University resources to introduce, create, or propagate SPAM, PHISHING email, computer viruses, worms, Trojan horses, or other malicious code.
  • Obtain extra University resources or gain access to accounts for which they are not authorized.
  • Eavesdrop on or intercept other Users’ transmissions.
  • Attempt to degrade the performance or availability of any system or to deprive authorized Users access to any University resources.
  • Misrepresent their identity with actions such as IP address “spoofing,” email address falsification, or social engineering.
  • Send email chain letters or mass mailings for purposes other than official University business.
  • Use University resources as an email relay between non-university email systems (routing email through university email systems between two non-university systems).
  • Engage in activities that violate state or federal law, a University contractual obligation, or another University policy or rule including but not limited to Human Resources policies and Standards of Conduct for students.
  • Comment or act on behalf of the University over the Internet without authorization.
  • Connect devices (such as switches, routers, hubs, computer systems, and wireless access points) to the network without prior approval from the Campus IT organization.
  • Use without authorization any device or application that consumes a disproportionate amount of network bandwidth.
  • Include or request Sensitive Information be included in unprotected electronic communication (email, instant message, text message, etc.).

4. University Rights

  • The University reserves the right to access, monitor, review, and release the contents and activity of an individual User’s account(s) as well as that of personal Internet account(s) used for University business. The University reserves the right to access any University owned resources and any non-University owned resources on University property, connected to University networks, or containing University data. This action may be taken to maintain the network’s integrity and the rights of other authorized Users. Additionally, this action may be taken if the security of a computer or network system is threatened, misuse of University resources is suspected, or The University has a legitimate business need to review activity or data. This action will be taken only after obtaining approval from the Campus Authority, an authorized University office (e.g. Office of Attorney General, orOffice of Audit and Compliance), or in response to a subpoena or court order.

5. Copyrights and Licenses

  • Violation of copyright law or infringement is prohibited by University policy, state, and federal law. Any unauthorized use of copyrighted material, may subject the User to discipline as a violation of one or more provisions of the general standard of conduct in the student handbook or to discipline under the Code of Conduct in the Human Resources Policy and Procedures.
  • Violation of copyright law or infringement is prohibited by University policy, state, and federal law. Any unauthorized use of copyrighted material, may subject the User to discipline as a violation of one or more provisions of the general standard of conduct in the student handbook or to discipline under the Code of Conduct in the Human Resources Policy and Procedures.
  • Users will properly license software and strictly adhere to all licensing provisions, including installation, use, copying, number of simultaneous users, and terms of the license.
  • All copyrighted information, such as text and images, retrieved from University resources or stored, transmitted, accessed, or maintained with University resources must be used in compliance with applicable copyright and other laws.
  • Copied material must be properly credited using applicable legal and professional standards.Each Unit is responsible and accountable for maintaining records of purchased software licensure. The providing organization is responsible for maintaining records and information related to centrally provided software. These records are subject to internal audit for compliance
  • Each Unit is responsible and accountable for maintaining records of purchased software licensure. The providing organization is responsible for maintaining records and information related to centrally provided software. These records are subject to internal audit for compliance.

6. Personal Use

  • University Resources are provided for use in conducting authorized University business. All users are prohibited from using these resources for personal gain, illegal activities, or obscene activities.
  • The prohibition against using the University’s IT resources for personal gain does not apply to:
      • Scholarly activities, including the writing of textbooks or preparation of other teaching materials by faculty members;
      • Consulting and other activities that relate to a faculty member’s professional development or as permitted under University policy.
  • Incidental or casual personal use of theses resources is permitted by this policy, excpet when such use:
      • Is excessive or interferes with the performance of the User’s University responsibilities.
      • Results in additional incremental cost or burden to the University’s resources.
      • Violates any state or federal law or is otherwise in violation of this or any other University policy.
      • Results in additional risk to the confidentiality, integrity, and availability to the University’s resources.
  • University IT resources may not be used for commercial purposes, except as specifically permitted under other written university policies or with the written approval of the Campus Authority.
  • Any commercial use of University IT resources must be properly related to University activities and provide for appropriate reimbursement of taxes and other costs the University may incur by reason of such use.
  • The “.edu” domain on the Internet has rules restricting or prohibiting commercial use.
  • Activities not appropriate for the “.edu” domain but otherwise permissible using University resources must use other domain designations.
  • University Campuses may impose more stringent restrictions on personal use.

7. Misuse of IT Resources

  • Users must report all suspected or observed illegal activities to the appropriate University or Campus administrative office. Examples include theft, fraud, copyright infringement, illegal electronic file sharing, sound or video recording piracy, hacking, and viewing or distribution of child pornography.
  • Abuse of networks or computers at other sites through the use of University resources will be treated as an abuse of resource privileges.
  • State law prohibits the use of University resources by employees for campaign or political advertising on behalf of any party, committee, agency, or candidate for political office. (Washington State RCW 42.52.180). This does not prohibit use of University resources to discuss or examine political topics or issues of public interest, so long as it does not advocate for or against a particular party, committee, agency, or candidate.