Skip to content Skip to main navigation Report an accessibility issue
Information Security

Understanding Acceptable Use Policies (AUPs)



As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But what exactly is an AUP, and why do we need one? Let’s dive into the essentials.

What Is an Acceptable Use Policy?

An Acceptable Use Policy is like a set of digital guardrails. It outlines the rules and guidelines for using an organization’s computer network, website, or other technology resources. Think of it as a code of conduct for the digital realm. Whether you’re a seasoned IT pro or a casual user, adhering to the AUP ensures responsible and secure use of these resources.

Why Do We Have an AUP?

  1. Security: An AUP helps protect the organization’s digital assets. It prevents misuse, unauthorized access, and potential security breaches. By defining acceptable behavior, it reduces the risk of data leaks, malware infections, and other cyber threats.
  2. Resource Optimization: Imagine a network where everyone streams HD videos simultaneously or downloads large files without restraint. Chaos, right? An AUP ensures fair resource allocation, optimizing bandwidth and server capacity.
  3. Legal Compliance: Organizations must comply with legal requirements related to data privacy, intellectual property, and network usage. An AUP helps meet these obligations and avoids legal pitfalls.

Key Elements of an AUP

  1. Purpose Statement: Clearly states the purpose of the AUP. Explains that it applies to all users, including faculty, staff, students, and guests.
  2. Authorized Use: Specifies what users of technology resources are allowed to do. This includes legitimate business or academic activities. For example, accessing work-related websites, sending professional emails, and collaborating on shared documents.
  3. Prohibited Activities: Enumerates actions that violate the AUP. These may include unauthorized access, downloading illegal content, spreading malware, or engaging in cyberbullying.
  4. User Responsibilities: Outlines users’ responsibilities. Emphasizes password security, reporting incidents promptly, and respecting others’ privacy.
  5. Consequences: Describes the consequences of AUP violations. Penalties may range from warnings to account suspension or legal action.

Read the University’s AUP

Remember, an AUP isn’t just a bunch of legal jargon—it’s a shield that safeguards our digital ecosystem. Our Acceptable Use of Information Technology Resources is available online for your review.

So, next time you log in, keep those AUP principles in mind!