FAQs about the Acceptable Use Policy

What are examples of “University information technology resources"?

The following are all examples of University information technology resources:

  • The University’s network
  • University-provided software and applications
  • University-provided cell phones, laptops, tablets
  • University-provided servers
  • University-provided cloud services such as Google Docs and Drive, Google Sites, Box and Box Assured Apps, Microsoft O365 platform (OneDrive, Sharepoint, Office Online, etc. ), Microsoft Azure (Microsoft Cloud platform), Amazon Web Services (AWS) (Amazon Cloud platform), Zoom, other University funded cloud storage
  • University-provided mobile and removable devices
  • Data processed or stored in documents, files, emails and attachments, research data, voice mails, text messages, and associated metadata.
What is “Covered Data”?

Data created, stored, or maintained by or on behalf of the University. Data created, stored, or maintained by or on behalf of the University.

What are examples of “non-University devices that store Covered Data”?

Non-University devices that store Covered Data are devices not owned by the University that handle or store Covered Data or information. For example, personal laptops or cell phones that process or store University documents, files, emails and attachments, research data, voice mails, text messages, and associated metadata. In some circumstances, the University may be required to access data on a personal device.

 

Does it matter if the resource is on the university network? Does it matter where the resource is being used, such as off-campus, home, on campus?

The geographic location or type of network does not change the applicability of the University Information Technology policies. The policies apply to all University-funded devices and all devices and services that handle or store Covered Data or information. The geographic location or network ownership of the device does not change the policy’s applicability.

What are examples of incidental personal use of information technology resources?

Some examples of the incidental personal use of information technology resources include the following:

  • Sending and receiving emails to friends and family
  • Taking personal phone calls using a University phone
  • Preparing a personal tax return on a University laptop
  • Visiting web pages or streaming videos using your University laptop or over the University network

 

Can university-owned computers and services be used to operate an external business (including products or services like consulting)?

No. The University of Chicago is a non-profit organization, and its assets are to be used in furtherance of its research and education missions. In addition, most University software and services are licensed only for non-profit use for University purposes. Limited incidental use of office space and equipment for personal purposes or in connection with permitted consulting activities is permissible so long as such use is modest and does not interfere with the conduct of University business. Examples of permitted uses include sending a personal email, working on a personal document, or taking a personal phone call. If an individual runs a business that routinely sells goods or services, then they should purchase separate technology resources for or on behalf of the business.

 

What are examples of activities that are not incidental personal use of information technology resources?

Some examples of activities that are not “incidental personal use” are:

  • Using University resources to operate a personal file-sharing server.
  • Using University-provided technology to operate or sell goods or services for a commercial business.
  • Hosting a website on the University web servers for non-UChicago organizations (e.g., a business or unaffiliated not-for-profit entity), for political functions, or for other activities unrelated to the mission of the University.
  • Using a university-provided server or information technology service for non-university tasks.
How does the University “determine that it has a legitimate operational need” to access or review data?
What are examples of when the University would need to access, preserve, and review information stored in or on an individual’s University information technology resources?

The following are examples of when the University may need to access, preserve, or review information in University information technology resources:

  • If the University receives a subpoena for an individual’s records in connection with a lawsuit
  • If a student makes a request for their education records stored on University computers
  • If the University has a legal or regulatory obligation to preserve or disclose information stored on University computers
  • If the University must respond to an imminent threat to other users or to the University’s technology infrastructure. For example, if the University is responding to an information security incident or physical security threat, it may be necessary to access information on information technology resources.