Network/Email Policies and Guidelines

The IS department provides computing resources and support to students, faculty, and staff exclusively to meet Law School-related computing needs. The IS department will provide assistance for Law School supported applications and systems.

Use of Computing Facilities & Resources

Access to Law School resources is available at the sole discretion of the Law School and will remain available only to those who make proper use of these resources and comply with Law School policies. As a general guideline, no individual should make use of computer resources in any manner that interferes with the ability of others to make equal use of those same resources. Users are expected to adhere to established policies and procedures such as those on usage, respect for intellectual property and copyright, and observing network etiquette.

Account Policies

The Law School's computer systems are available for use except during those periods when scheduled or emergency servicing is required. Accounts are deleted 90 days after graduation or upon termination of employment with the Law School. Accounts are allocated a set amount of disk space on the server, which will be reviewed annually.

Security and Privacy

Unauthorized access to resources or data is not permitted. The ability to access a resource or data does not explicitly or implicitly imply authorization. Account security is provided via passwords. Providing one's account password to another user constitutes authorization for that other user to access all information in your account. Giving your password to another person is not recommended, and the account owner accepts responsibility for the actions of and charges incurred by any other person they authorize to use their account.

Attempts to compromise the security of the network or its connected systems are prohibited. Any attempt of this nature, or the introduction of viruses, worms, Trojan horses, or other forms of electronic subversion will result in the immediate loss of access. Further University, civil, or criminal action may be taken as appropriate.

The computer systems and network at the Law School are a University resource and are provided as a business tool. Users of the resources do so at their own risk. In particular, they assume the risk of malfunction, destruction, corruption, alteration, or mis-transmission of any data, software or hardware, whether due to negligence on the part of the University and its employees, forces beyond the University's control (such as fire or flood), or any other cause. Users agree to hold the University harmless for any damage whatsoever that arises from use of these computer resources.

In general, the practice is to treat electronic data with as much privacy as possible. However, situations may arise where employees with legitimate business purposes may have the need to view information (or email) stored on the network. Any material on the network (including data stored on servers or the mainframe at the Storrs campus) may be accessed for and only for, administrative purposes by the University. Approval for such viewing of information will be required from the Dean of the Law School or the Dean's duly authorized designee.

Network Etiquette

Ethical behavior should be observed at all times, and no individual should engage in behavior over the network that would be deemed inappropriate in a face-to-face meeting. Violators will be subject to the loss of access, or more severe action, depending on the circumstances.

Unacceptable Use of the Campus Network. Specific examples of unacceptable uses of the network include, but are not limited to, the following:

  1. Interfering with the purpose and goals of the network, disrupting the network host systems, and disrupting network services;
  2. Messages that are likely to result in the loss of recipients' work or systems;
  3. Advertising and marketing from commercial organizations;
  4. Communications that violate applicable laws and regulations;
  5. "Chain letters" and other types of use that would cause congestion of the network or otherwise interfere with the work of others;
  6. Communications that would in some way injure the recipient or are deemed inappropriate either because they violate written policy or because they are counter to the general spirit of the University community.

Software Copyright and Compliance Policy

The unauthorized copying of any software that is licensed or protected by copyright is theft. Failure to observe software copyright and/or licensing agreements may result in disciplinary action by the institution and/or legal action by the copyright owner. No institution-owned computing resources should be used for unauthorized commercial purposes. Respect for the intellectual work and property of others has traditionally been essential to the mission of colleges and universities. The faculty and staff of this institution recognizes its obligation to provide continuing guidance as to what constitutes academic honesty, and to promote procedures that will reinforce this principle.