Skip to content Skip to main navigation Report an accessibility issue
Information Security

Information Technology Resources



This week, we call your attention to the importance of the Acceptable Use of Information Technology Resources Policy (“AUP”), IT0110. Essentially, this policy provides principles aimed at protecting the confidentiality and integrity of electronic information and the privacy of its users. These policies ensure that the use of electronic communications complies with the provisions of university and campus policy, state and federal law, and principles that allow for the free exchange of ideas and support of academic freedom.

Unless noted, this policy applies to ALL students, faculty, staff, contractors, agents, representatives, and visitors that use IT resources owned, operated, or provided by the University of Tennessee System and includes all campuses, institutes, and administration. The policy addresses six key areas: User Privacy, User Requirements, User Restrictions, University Rights, Copyrights and Licenses, and Personal Use.

Important Highlights from the Six Key Areas of the Acceptable Use Policy:

  1. User Privacy: When using the University’s IT resources, users have no expectation of privacy. User email may be subject to the Tennessee Open Records Act. Further, users should be aware that their activity on systems and networks may be monitored, logged, and reviewed by university-approved personnel and system administrators and discovered in legal proceedings.
  2. User Requirements: Requires that users follow other policies and implement best practices when using the University’s IT resources. These requirements may be as simple as properly logging out of sessions and updating software to monitor access to user accounts.
  3. User Restrictions: Provides for all prohibited conduct by users of University IT resources.
  4. University Rights: Provides for the University’s rights to monitor, review, and release the contents and activity of a user’s account. Further, this section sets forth the type of IT resources that may be accessed, how they may be accessed, and the circumstances in which they may be accessed or monitored.
  5. Copyrights and Licenses: Outlines all user restrictions concerning copyrighted software and the use of licenses.
  6. Personal Use: Prohibits the use of the University’s IT resources for personal gain, illegal activities, or obscene activities; however, it also outlines the scope of acceptable personal use as well as unacceptable misuse of IT Resources.

As you can see, when using the University’s IT resources, it is crucial that users are aware of their rights as well as the rights of the University. Knowing the Acceptable Use Policy allows users to better understand their relationship with University’s IT resources and helps them protect themselves and our larger community.

UT Policy IT0121 requires that the Chancellor of each campus designate an individual or functional position responsible for Information Security. The UTK CIO, Joel Reeves, is designated as the Position of Authority for UTK and can speak with authority on and for the campus.

Access the UT Acceptable Use Policy website for more information.