OUHSC Information Technology Department |
Monitoring Computer Use
(A component of the Acceptable Use of Information Systems Policy) The University employs various measures to protect the security of its computing resources and users' accounts. Users should be aware, however, that the University cannot guarantee such security. Users should also be aware that their uses of University computing resources are not completely private. While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the University's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for providing service. The University may also specifically monitor the activity and accounts of individual users of University computing resources, including but not limited to, individual login sessions and communications, without notice, when (a) the user has voluntarily made them accessible to the public, as by posting to Usenet or a web page; (b) it reasonably appears necessary to do so to protect the integrity, security, or functionality of University or other computing resources or to protect the University from liability; (c) there is reasonable cause to believe that the user has violated, or is violating, the Acceptable Use of Information Systems policy*; (d) an account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (e) it is otherwise required or permitted by law. Any such individual monitoring, other than when the user has voluntarily made them accessible to the public, or necessary to respond to perceived emergency situations, must be authorized in advance by the Chief Information Officer, University Legal Counsel, or their designees. The University, at its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings. Communications made by means of University computing resources are also generally subject to discovery requests and Oklahoma's Open Records Act to the same extent as they would be if made on paper. *The Acceptable Use of Information Systems policy may be found at www.ouhsc.edu/it/security/policy/aup.asp Approved by the Provost and Deans' Council September 6, 2000 Reviewed 02/01/2013 Frequently Asked Questions about Monitoring Computer UseDoes the restriction on individualized monitoring prohibit a supervisor or co-worker from accessing an employee's computer files for work-related purposes?
|
|
Copyright © 2006 The Board of Regents of the University of Oklahoma, All Rights Reserved.- Disclaimer | Copyright |