Information Technology (IT) Acceptable Use Policy
ABAC IT resources must be used in accordance with applicable licenses and contracts, and according to their intended use in support of the College’s mission.
All users must comply with federal, state, and local laws, as well as University System of Georgia and ABAC policies, when using ABAC IT resources.
Acceptable Use
Employees and Student Employees
With the exception of incidental personal use, as defined below, ABAC IT resources must be used only to conduct the legitimate business of the College (e.g. scholarly activity, academic instruction, research, learning, business operations).
Incidental personal use of ABAC IT resources by College employees is permitted if the personal use does not interfere with the execution of job duties, does not incur costs on behalf of the College, and is not unacceptable as defined in the Unacceptable Use section below.
Students
ABAC students may use ABAC’s networks for recreational and personal purposes to the extent that such use is not unacceptable as defined in the Unacceptable Use section below and does not adversely affect network service performance for other users engaged in academic, research, or official business activities.
Unacceptable Use
ABAC employees, including students acting as employees, are prohibited from the following actions when using ABAC IT resources:
Unauthorized use of IT resources for commercial purposes or personal gain
Transmitting unapproved commercial or personal advertisements, solicitations, or promotions
All users are prohibited from using ABAC IT resources in a manner that results in a violation of law or policy or potentially adversely affects network service performance. Examples of unacceptable use include, but are not limited to, the following:
Activities that violate federal, state, or local law
Activities that violate any College or Board of Regents policy
Actions that lead to the destruction or damage of equipment, software, or data belonging to others or the College
Circumventing information security controls of College IT resources
Releasing malware
Intentionally installing malicious software
Impeding or disrupting the legitimate computing activities of others
Unauthorized use of accounts, access codes, passwords, or identification numbers
Unauthorized use of systems and networks
Unauthorized monitoring of communications
This list is not complete or exhaustive. It provides examples of prohibited actions. Any user in doubt about the acceptable use of ABAC IT resources should contact the Office of Technology Services for further clarification and assistance at techsupport@abac.edu or 229.391.5400.
For the complete Information Technology Acceptable Use Policy, please reference the Abraham Baldwin Agricultural College policy repository: ABAC 11.3.1 - Information Technology Acceptable Use Policy.