Compliant Networking

Overview: 

Penn State Policy AD96: Acceptable Use of University Information Resources establishes and defines the "acceptable use" of Penn State electronic resources, including, but not limited to, network connections, computer facilities, and additional network services. Individuals with access to the University's information technology resources are responsible for their appropriate use, and by their use, agree to comply with all applicable University, policies, guidelines and standards, and applicable State and Federal laws and regulations.

For use and access to be acceptable, individuals must demonstrate respect of:

  • the rights of others privacy
  • intellectual property rights (e.g. as reflected in licenses and copyrights)
  • ownership of information
  • system mechanisms designed to limit access
  • an individual's right to be free of intimidation, harassment, and/or retaliation

The University is not responsible for the content of individuals’ personal web spaces, nor the content of servers, programs or files that individuals maintain either in their personally allocated file areas on University-owned computer resources or on personally-owned computers connected to the University's Information Resources.

Getting Started: 

You can learn more about Compliant Networking by reading the entire Penn Stae AD95 Acceptable Use of University Information Resources Policy

Summary

Availability: 

  • This is an active service

Eligibility: 

  • Compliant networking guidelines apply to all faculty, staff, students, and other individuals using Penn State's network resources
  • The guidelines also apply to individuals who are conducting Penn State business using external networks including all University owned, licensed, or managed hardware and software, the use of University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network, and use of information
  • This policy excludes Penn State Health and The Pennsylvania College of Technology, which will follow separate policies

Information Security: 

Support: