Vanderbilt University Information Technology Resources Acceptable Use Policy

349 KB | 3 files |  PDF, DOC

Even organizations that highly value openness and freedom of expression need to set guidelines for how team members use technology. This sample Acceptable Use Policy from a leading university will help your organization get started.

The mission of Vanderbilt University is to be a center of scholarly research, informed and creative teaching and service to the community and society at large. The university upholds the highest standards and is a leader in the quest for new knowledge through scholarship, dissemination of knowledge through teaching and outreach and creative experimentation of ideas and concepts. In pursuit of these goals, Vanderbilt values most highly intellectual freedom that supports open inquiry, and equality, compassion, and excellence in all endeavors.

To achieve its mission, the university applies substantial financial and personnel assets toward operating a reliable, available and secure network-computing infrastructure. The mass adoption of digital technologies in the everyday lives of members of our community requires that Vanderbilt establish clear policies that guide how community members may use the university's information technology resources. This Acceptable Use Policy (AUP) communicates the respective policies associated with our role in the Vanderbilt community as students, faculty, staff or other authorized users.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Vanderbilt University Information Technology Resources Acceptable Use Policy.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Vanderbilt University, located in Nashville, Tenn., is a private research university and medical center offering a full-range of undergraduate, graduate and professional degrees.

All IT Downloads from Vanderbilt University» | Visit Vanderbilt University »
Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ...  More >>

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ...  More >>

Security35.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.