Chapter 15: Information Technology (IT) Policy and Procedures

Table of contents | Previous chapter | Next chapter

Emory has several general policies related to information technology. The policies pertain to:

All of these policies are on the Policies and Procedures website under the "Information Technology: General Policies" section. This chapter highlights four policies that are particularly relevant to faculty.

15.1 Policy on Information Technology Conditions of Use (Policy 5.1)

Computers, networks, and software applications are powerful tools that can facilitate Emory's core missions in teaching, learning, research, and service. Access and utilization of these tools is a privilege to which all university faculty, staff, students, and authorized guests are entitled. This policy sets forth the terms of acceptable use for IT-related systems and services. The general principles are that:

  • Emory's information technology (IT) resources are provided for uses consistent with the university's missions of teaching, learning, research, and service or for related administrative support.
  • Emory's information technology (IT) resources are provided for uses consistent with the university's missions of teaching, learning, research, and service or for related administrative support.
  • Use of Emory's IT resources must be consistent with other university policies, government regulations, and laws.
  • IT resources are not to be used for private financial gain, for supporting non-Emory related businesses, or for supporting political candidates or campaigns.
  • Users of Emory IT resources are expected to read and abide by all relevant IT policies and standards and to complete any prescribed IT security training.
15.2 Policy on Connecting to the Emory Data Network (Policy 5.4)

This policy explains the rules about connecting devices to the Emory data network. To maintain electronic systems integrity and ensure service availability, Emory data network connections and equipment installation are made only by authorized personnel under the direction of Network Communications.

15.3 Policy on Peer-to-peer File Sharing Utilities (Policy 5.7)

This policy explains Emory's official position on peer-to-peer file sharing utilities. It applies to anyone using a peer-to-peer file sharing utility on the Emory network.

15.4 Smart Device Security Policy (Policy 5.14)

This policy explains Emory's official position on the security requirements of smart devices that access Emory Exchange e-mail, and/or store sensitive Emory data. Emory maintains a centrally managed service that supports the synchronization of data between smart devices and the Emory Exchange messaging and calendaring system: Exchange ActiveSync (EAS). It applies to any smart device, either Emory owned or privately owned, that accesses Emory Exchange e-mail, and/or stores sensitive Emory data.

Back to top