University computing resources are provided in support of the University’s mission. Only legally obtained software may be loaded onto University-owned equipment; the University expressly forbids illegal copies of software. In addition, a list of forbidden software will be regularly updated and published by the Office of Information Technology. Software on the forbidden list may be installed as part of an academic curriculum, if approved by Information Technology Services.
Freely available software that supports the work of an individual may be loaded onto University-owned equipment. Freely available software that does not support the work of an individual should not be loaded on University equipment. Applications solely intended for personal use are forbidden.
All university-owned desktops and laptops will be configured to automatically enter the Windows Screen Saver mode if no activity takes place within a 20-minute time span. Faculty, staff, and students will have to re-enter their e~ID password to regain access to the machine. Once the correct password is provided, the machine will return to the same application it was running before the timeout.
All enterprise or multi-user departmental software programs must conform to the list of software standards supported by Information Technology Services (ITS). All newly acquired enterprise or multi-user departmental level software must conform to the security policies and practices specified by ITS.
All new purchases of enterprise or multi-user software must be submitted to Information Technology Services (ITS) for review at least 60 days before contract signing so ITS can determine if the software complies with the University’s software standards.