USE OF IT RESOURCES
Acceptable Use
Acceptable use of IT Resources is use that is consistent with Johns Hopkins missions of education, research, service, and patient care, and is legal, ethical, and honest; it must respect intellectual property, ownership of data, system security mechanisms, and individuals rights to privacy and freedom from intimidation, harassment, and annoyance; it must show consideration in the consumption and utilization of IT Resources; and it must not jeopardize Johns Hopkins' not-for-profit status. Incidental personal use of IT Resources is permitted if consistent with applicable JH and divisional policy, and if such use is reasonable, not excessive, and does not impair work performance or productivity.
Unacceptable Use
Unacceptable use of IT Resources includes, but is not limited to:
Unauthorized access to or unauthorized use of Johns Hopkins IT Resources.
Use of IT Resources in violation of any applicable law (e.g., downloading of copyrighted materials, such as music, movies, and e-books, without the written consent from the copyright owner).
Harassing others by sending annoying, abusive, profane, threatening, defamatory, offensive, or unnecessarily repetitive messages, or by sending e-mails that appear to come from someone other than the sender.
Any activity designed to hinder another person's or institution's use of its own information technology resources.
Privacy violations (e.g., disclosure or misuse of private information of others).
Installation of inappropriate software or hardware on IT Resources (e.g., network "sniffing" software, offensive applications, and malicious software).
Any use of copyrighted materials in violation of copyright laws or of vendor licensing agreements.
Intentional acquisition, storage, and/or display of sexually explicit material, except for acknowledged, legitimate work-related medical, scholarly, educational, or forensic purposes. Exposure and/or display of such material may be offensive, constitute sexual harassment or create a hostile work environment.
Security breaches, intentional or otherwise, including improper disclosure of a password and negligent management of a server resulting in its unauthorized use or compromise.
Processing, storing or transmitting of information classified by the U.S. Government, except in accordance with the laws pertaining to such information.
Commercial use of IT Resources for business purposes not related to Johns Hopkins.
Use, without specific authorization, to imply Johns Hopkins support, or to organize or solicit support, inside or outside of Johns Hopkins, for commercial ventures, religious organizations or causes, political campaigns, outside organizations, or other non-JH-related activities. (Note - this does not preclude incidental de minimis personal communication between acquaintances regarding such subjects.)
ENFORCEMENT
The failure to comply with any of these Policies may result in loss of access to some or all of IT Resources and/or loss of access privileges to IT Resources. In addition, violators of these Policies may be subject to criminal and/or civil penalties and to disciplinary action, up to and including termination/expulsion.
For further information on JHU policies on E-mail use, anti-virus measures, network security, wireless security, access control, and workstation and device security see http://jumpstart.jhu.edu.
This JHU policy applies to all EPP computer use.