Resource Administration

Acceptable Use

Duke University expects that all members of the community will adhere to fundamental standards of honesty, integrity and respect for the rights of others.  As a Division, Student Affairs has high standards of conduct for all employees.  Access to institutional systems, data and other resources imposes certain responsibilities and is granted subject to University and Division policies as well as local, state and federal laws.  It is the responsibility of every employee to remain informed about security, acceptable use, and confidentiality policies and procedures regarding the data and information to which s/he has access.  Please carefully read and consider the following statements of acceptable use.  Questions regarding these statements may be addressed to your supervisor, the Student Affairs ITS department at 684-5143 or to Resource Administration at

To ensure acceptable use of resources, you should:

  • Use Duke resources only for authorized purposes
  • Protect your userID and password—your userID and password act together as your electronic signature indicating authorized access to data and information
  • Access only information to which you have been given authorized access or that is publicly available
  • Use only legal versions of copyrighted software in compliance with license requirements
  • Ensure that your use of content is in compliance with applicable copyright and licensing laws and requirements
  • Be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting disk space, printer paper and other resources

In making acceptable use of resources you should not:

  • Give your password to another person.
  • Use another person's userID and/or password
  • Allow another person access to systems requiring your userID and password
  • Access or use files or data without permission (note that permission from an individual user may not be sufficient; some systems require additional authority for access)
  • Attempt to circumvent or subvert system or network security measures
  • Engage in any activity that might be purposefully harmful to systems or to any in-formation stored thereon
  • Use mail or messaging services to harass or intimidate another person
  • Use the university's systems or networks for commercial purposes

Violations of the acceptable use policy must be documented and reported immediately to the employee’s supervisor, department head, Student Affairs Information Technology Services, and the Assistant Vice President of Student Affairs for Resource Administration. Violations and are subject to disciplinary action up to and including termination as well as prosecution under applicable local, state, and federal laws.