Beruflich Dokumente
Kultur Dokumente
APPROVEDACCEPTABLEUSEPOLICYFORINFORMATIONTECHNOLOGY(IT)RESOURCESOFTHEUPSYSTEM
Section1.PolicyStatement
(a)
Computersandnetworksarepowerfultechnologiesforaccessinganddistributinginformationandknowledge.Theyare
strategictechnologiesforthecurrentandfutureneedsoftheUPSYSTEM.
(b)
Fornow,computingfacilitiesandnetworkinfrastructureareacostlyresourceandthusmustbeusedsolelyfor
teaching,learning,research,andotherofficiallysanctionedactivities.Also,sincethesetechnologiesallowindividuals
toaccessandcopyinformationfromremotesources,usersmustrespecttherightsofothers,particularlytotheir
privacyandintellectualproperty.Thereisthereforeaneedforrulesandregulationstoensureequitable,secureand
reliableaccesstotheseresources.Thefollowingregulationswillgoverntheuseofcomputingfacilities,networksand
otherInformationTechnology(IT)resourcesoftheUniversityofthePhilippinesSystem.
(c)
Theseregulationsaimto:
(i)
ensureaninformationinfrastructurethatpromotesthebasicmissionsoftheUPSYSTEMinteaching,learning
andresearch
(ii)
protecttheintegrity,reliability,availability,confidentialityandefficiencyoftheITresourcesoftheUP
SYSTEM
(iii)
establishprocessesforaddressingpolicyviolationsandprovidingsanctionsforviolators
(iv)
emphasizethattheUPSYSTEMshallnotbeliableforanydamagesincurredfromtheuseofITresourcesand
foranyclaimsandsuitsarisingfromtheunauthorizedandirresponsibleuseofthesame
(v)
warnusersthatuseofITresourcesforpartisanpoliticalactivitiesasdefinedinrelevantrulesandregulations
ofthecivilservicecommissionortheuniversityofthePhilippines,orforanyunauthorizedcommercial
purposesisprohibitedand
(vi)
notifyusersoftheexistenceofthisPolicy.
Section2.BasicStandards
(a)
Thesamestandardsandprinciplesofintellectualandacademicfreedomdevelopedforuniversitylibrariesshallbe
appliedtomaterialreceivedfromthenetwork.Thesamestandardsofintellectualandacademicfreedomdeveloped
forfacultyandstudentpublicationintraditionalmediashallbeappliedtopublicationincomputermedia.
(b)
Asconstituentsoftheacademiccommunity,faculty,students,andacademicandnonacademicstaffshouldbefree,
individuallyandcollectively,toexpresstheirviewsonissuesofinstitutionalpolicyandonmattersofgeneralinterest
totheacademicbody.Theconstituentsoftheacademiccommunityshouldhaveclearlydefinedmeanstoparticipate
intheformulationandapplicationofinstitutionalpolicyaffectingacademicandstudentaffairs.Theactionsofthe
constituentsoftheacademiccommunitywithintheareasofitsjurisdictionsshouldbereviewedonlythroughorderly
prescribedprocedures.
Section3.Definitions
(a)
AgreementFormmeansdocumentinwhichtheuserundertakestocomplywiththisPolicy.Theformmaybe
electronic.
(b)
Confidentialinformationmeansdataorinformationwhichonitsfaceisnotintendedforunrestricteddissemination.
Examplesincludestudentrecords,examinationarchives,proprietarytechnicalinformation,disciplinarycaserecords,
administrativerecords,andthelike.
(c)
DocumentwhenusedinthisPolicyshallreferbothtothepaperanditselectronicformat.
(d)
InformationTechnologySystemorITSystemincludescomputers,terminals,printers,networks,modembanks,online
andofflinestoragemediaandrelatedequipment,andsoftware,databasesandotherdatafilesthatareowned,
managed,ormaintainedbyanyunitoftheUniversityofthePhilippines.
ForpurposesofthisPolicy,anyotherequipment,computerunitorexternalnetwork,whenattachedto,orusedto
accessand/orinteractwithanycomponentof,theITSystemmayalsobeconsideredpartoftheITSystem.
(e)
Privatefilesmeansinformationthatauserwouldreasonablyregardasprivate.Examplesincludethecontentsof
electronicmailboxes,privatefilestorageareasofindividualusers,andinformationstoredinotherareasthatarenot
public,evenifnomeasurehasbeentakentoprotectsuchinformation.
(f)
SystemandNetworkAdministratormeansapersondesignatedtomanagetheparticularsystemassignedtoher/him,
tooverseethedaytodayoperationofthesystem,ortopreliminarilydeterminewhoispermittedaccesstoparticular
facilitiesandresourcesoftheITSystem,whetherhiredonatemporary,contractualorpermanentbasis.
(g)
UPSYSTEMmeanstheUniversityofthePhilippinesSystemandallitsconstituentunits.
(h)
Usermeansanyperson,whetherauthorizedornot,whomakesanyuseoftheITSystemoranyofitscomponentsby
anymeansorfromanylocation.
Section4.ScopeAndApplicability
(a)
(b)
GeneralCoverage.
(i)
ThisPolicyappliestoallfacilitieswithintheITSystemandallitsusers.
(ii)
Allusersshouldbeawareoftheseregulations,andshouldrealizethatwhenusingthecomputerswithintheUP
SYSTEM,theyareboundbytheseregulations.Usersmayberequiredtosignaformagreeingtocomplywith
thisPolicy.However,failuretosigntheagreementformwillnotreleaseusersfromcoverageofthisPolicy.
LocalandExternalConditionsofUse.
(i)
IndividualunitswithintheUPSYSTEMmaydefineadditional"conditionsofuse"forcomponentsofthe
ITSystemundertheircontrol.
(ii)
Theseconditionsmustbeconsistentwiththisoverallpolicybutmayprovideadditionaldetail,guidelines,
restrictions,and/orenforcementmechanisms.Theseunitswillberesponsibleforpublishingtheregulationsthey
establishandtheirpoliciesconcerningtheauthorizedandappropriateuseoftheequipmentforwhichtheyare
responsible.CopiesofthesepoliciesshouldbegiventothePresident,VicePresidentforDevelopment,the
IntellectualPropertyOfficeandtheOfficeofLegalServices.
(iii)
Whereuseofexternalnetworksisinvolved,policiesgoverningsuchusewillbeapplicableandmustbeadhered
to.
Section5.GeneralResponsibilities
(a)
GeneralResponsibilitiesofUsers.Ingeneral,usersoftheITSystemmust:
(i)
usetheITSystemonlyforitsintendedpurpose,andrefrainfrommisusingorabusingit
(ii)
maintaintheintegrity,reliability,availability,confidentialityandefficiencyofcomputerbasedinformation
resources
(iii)
refrainfromseekingtogainunauthorizedaccessorexceedauthorizedaccess
(iv)
respectsoftwarecopyrightandlicensesandotherintellectualpropertyrights
(v)
respecttherightsofothercomputerusersand
mail.up.edu.ph/local/files/aup.html
1/5
4/10/12
(vi)
(b)
(c)
beawarethatalthoughcomputingandinformationtechnologyprovidersthroughouttheuniversityarecharged
withpreservingtheintegrityandsecurityofresources,securitysometimescanbebreachedthroughactions
beyondtheircontrol.Usersarethereforeurgedtotakeappropriateprecautionssuchassafeguardingtheir
accountandpassword,takingfulladvantageoffilesecuritymechanisms,backingupcriticaldataandpromptly
reportinganymisuseorviolationsofthepolicy.
EverymemberoftheuniversitycommunityhasanobligationtoreportsuspectedviolationsoftheAcceptable
UsePolicyforInformationTechnologyoftheU.P.Systemoranyofitsunits.Reportsshouldbedirectedtothe
systemandnetworkadministrators,Chairs,Deans,ChancellorsorthePresident.
GeneralResponsibilitiesOfSystemAndNetworkAdministrators
(i)
SystemandnetworkadministratorsandprovidersofuniversityInformationTechnologyresourceshavethe
additionalresponsibilityofensuringtheintegrity,confidentiality,andavailabilityoftheresourcestheyare
managing.Personsinthesepositionsaregrantedsignificanttrusttousetheirprivilegesappropriatelyfortheir
intendedpurposeandonlywhenrequiredtomaintainthesystem.Anyprivateinformationseenincarryingout
thesedutiesmustbetreatedinthestrictestconfidence,unlessitrelatestoaviolationorthesecurityofthe
system.
(ii)
Systemandnetworkadministratorsareexpectedtotreatthecontentsofelectronicfilesasprivateand
confidential.Anyinspectionofelectronicfiles,andanyactionbaseduponsuchinspection,willbegovernedby
thisPolicy,otheruniversityrulesandallapplicablelaws.
GeneralResponsibilitiesOfUniversityAdministrators
(i)
Tobeinformedandknowledgeableaboutthesepolicies
(ii)
Toinitiatesystematicprogramstoinformacademicandnonacademicpersonnelofthesepolicies
Section6.AppropriateUse
(a)
AppropriateUse.UsersmayonlyusetheITSystemforitsauthorizedpurposes,whichistosupporttheresearch,
education,clinical,administrativeandotherfunctionsoftheUPSYSTEM.Theparticularpurposesofanyofthe
componentsoftheITSystem,aswellasthenatureandscopeofauthorizedincidentalpersonaluse,mayvary
accordingtothedutiesandresponsibilitiesofauser.
(b)
ProperAuthorization.UsersmayaccessonlythosefacilitiesandcomponentsoftheITSystemthatareconsistentwith
theirauthorizationcomingfromcompetentauthorities.
(c)
SpecificProscriptionsonUse.ThefollowingcategoriesofuseoftheITSystemareconsideredprohibitedand/or
inappropriate:
(i)
(ii)
UsesContraryToLaw
1.
Unlawfuluse.UsersmaynotusetheITSystemforanyactivitythatiscontrarytoanylawor
administrativeruleorregulation,ortoencourageanysuchunlawfulactivity.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneyeartoexpulsionordismissal
2.
Infringementofprotectedmaterial.Usersmustnotinfringeonthecopyrightandotherpropertyrights
coveringsoftware,databasesandallothercopyrightedmaterialsuchastext,images,icons,retrieved
fromorthroughtheITSystem.Theseactsshallinclude,butisnotlimitedto,theunauthorizedcopying,
reproduction,dissemination,distribution,importation,use,removal,alteration,substitution,
modification,storage,unloading,downloading,communication,publicationorbroadcastingofsuch
material.UsersmustproperlyattributeanymaterialtheycopyfromorthroughtheITSystem.Usersare
remindedthattheinfringementofintellectualpropertyrightsbelongingtoothersthroughtheuseof
telecommunicationsnetworksisacriminaloffenseunderSection33(b)oftheElectronicCommerceAct.
Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtoexpulsionordismissal.
3.
Hacking.UsersmaynotusetheITSystemtogainunauthorizedaccessintoorinterferewithanother
computer,system,server,informationorcommunicationsystem,ortoobtainanyaccessinorderto
corrupt,alter,stealordestroyanysuchsystemorinformationwithinsuchsystemortointroduce
viruses.UsersareremindedthatalloftheforegoingactsconstitutethecrimeofHackingunderSection
33(a)oftheElectronicCommerceActandarepunishablebymandatoryimprisonmentand/orafine.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsionordismissal.The
penaltyshallcarrywithitpermanentwithdrawalofallITprivileges.
UsesInconsistentWithThePurposesOfTheUPSystem
1.
Cheating.UsersmaynotusetheITSystemtoengageincheatingoracademicdishonesty.Acts
prohibitedunderthisprovisionincludebutarenotlimitedtothefollowing:
a.
Copyingacomputerfilethatcontainsanotherperson'sworkandsubmittingitforone'sown
credit
b.
Copyingacomputerfilethatcontainsanotherperson'sworkandusingitasamodelforone'sown
work
c.
Collaboratingonawork,sharingthecomputerfilesandsubmittingthesharedfile,ora
modificationthereof,asone'sindividualwork,whentheworkissupposedtobedoneindividually
and
d.
Communicatingwithanotherpersononlineduringtheconductofanexamination.Violatorsshall
sufferapenaltyofsuspensionfornotlessthanonesemester.Studentsfoundguiltyofcheating
shallbebarredformgraduatingwithhonors,eveniftheirweightedaverageiswithinthe
requirementforgraduationwithhonors.
2.
Politicaluse.UsersmaynotusetheITSystemforanypartisanpoliticalactivities.Violatorsshallsuffer
apenaltyrangingfromsuspensionforonemonthtooneyear.
3.
UnauthorizedCommercialuse.
a.
UsersmaynotusetheITSystemforcommercialpurposes,exceptaspermittedunderother
writtenpoliciesoftheUPSYSTEMorwiththewrittenapprovalofacompetentauthority.
b.
Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtooneyearwithfine.If
theviolatorisastudent,thefineshallbeP1,000.00ortheamountequivalenttotheearnings,
whicheverishigher.Iftheviolatorisafacultymemberoranemployee,thefineshallbeonehalf
ofhismonthlysalaryortheamountequivalenttotheearnings,whicheverishigher.
4.
Personaluse.UsersmaynotusetheITSystemforpersonalactivitiesnotrelatedtoappropriate
Universityfunctionsexceptinapurelyincidentalmanner.Violatorsshallsufferapenaltyrangingfrom
suspensionforonemonthtooneyear.
5.
Unauthorizedgamingorentertainment.Usersmaynotplaygamesoruseentertainmentsoftwareonor
throughtheITSystemunlessauthorizedinwritingbycompetentauthorities.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneweektooneyearprovided,thatthepenaltyforhabitual
offenseshallbeexpulsionordismissal.Thepresenceofgamesoftwareoranypartthereofmaybe
presumptiveevidenceofunauthorizedgamingorentertainment.
6.
UsecontrarytoUniversitypolicyorcontract.UsersmaynotusetheITSysteminviolationofother
policiesoftheUniversity,orinanymannerinconsistentwiththecontractualobligationsofthe
University.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyearinaddition
tothepenaltyoftheoffensefacilitatedthroughITnetwork.
mail.up.edu.ph/local/files/aup.html
2/5
4/10/12
(iii)
(iv)
UsesThatDamageTheIntegrity,Reliability,ConfidentialityAndEfficiencyOfTheITSystem
1.
Softwareandhardwareinstallationandremoval.Unlessproperlyauthorized,usersmaynotdestroy,
remove,modifyorinstallanycomputerequipment,peripheral,operatingsystem,diskpartition,
software,database,orothercomponentoftheITSystemorconnectanycomputerunitorexternal
networktotheITSystem.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthto
expulsion.
2.
Unauthorizedordestructiveprograms.Unlessproperlyauthorizedandpartofher/hisadministrativeor
academicduties,usersmaynotdeveloporuseprogramsontheITSystemthatmayorareintendedto:
interferewiththeabilityoftheUPSYSTEMtoenforcethesepolicies
b.
damageanysoftwareorhardwarecomponentofthesystem
c.
modifynormallyprotectedorrestrictedportionsofthesystemoruseraccounts
d.
accessprivateorrestrictedportionsofthesystemor
e.
interferewithordisruptothercomputerusers.Violatorsshallsufferapenaltyrangingfrom
suspensionforoneyeartoexpulsion.
3.
Destructiveacts.Usersmaynotattempttocrash,tieup,ordenyanyserviceon,theITSystem.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsion.
4.
Unauthorizedaccess.Usersmaynotattempttogainunauthorizedaccess,exceedauthorizedaccess,or
enableunauthorizedaccesstotheITSystem,ortoothernetworksorsystemsofwhichtheITSystemis
apart.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtooneyear.
5.
Passwordprotection.Auserwhohasbeenauthorizedtouseapasswordprotectedaccountmaynot
disclosesuchpasswordorotherwisemakestheaccountavailabletootherswithoutpermissionofthe
systemadministrator.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyear.
6.
Concealingaccess.Usersmaynotconceal,delete,ormodifyinformationorrecordspertainingtoaccess
totheITSystematthetimeofaccess,oraltersystemlogsaftersuchaccessforthepurposeof
concealingidentityortohideunauthorizeduse.Usersmaynotconcealtheirownidentityormasquerade
asotheruserswhenaccessing,sending,receiving,processingorstoringthroughorontheITSystem.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsion.
7.
Prohibitedmaterial.Usersmaynotpublish(onmailinglists,bulletinboards,andtheWorldWideWeb)
ordisseminateprohibitedmaterialsover,orstoresuchinformationon,theITSystem.Prohibited
materialsunderthisprovisionincludebutarenotlimitedtothefollowing:
a.
Anycollectionofpasswords,personalidentificationnumbers(PINs),privatedigitalcertificates,
creditcardnumbers,orothersecureidentificationinformation
b.
Anymaterialthatenablesotherstogainunauthorizedaccesstoacomputersystem.Thismay
includeinstructionsforgainingsuchaccess,computercode,orotherdevices.Thiswould
effectivelyprecludedisplayingitemssuchas'HackersGuides',etc.
c.
Anymaterialthatpermitsanunauthorizeduser,whohasgainedaccesstoasystem,tocarryout
anymodificationofthecomputerprogramsordatastoredinthesystemand
d.
Anymaterialthatincitesorencouragesotherstocarryoutunauthorizedaccesstoormodification
ofacomputersystem.Violatorsshallsufferapenaltyrangingfromsuspensionforoneyearto
expulsion.
UsesThatEncroachOnTheRightsOfTheUsers
1.
2.
3.
(v)
a.
Wastefulanddestructivepractices.Usersmaynotencroachonothers'accessanduseoftheITSystem
throughwastefulanddestructivepracticessuchasbutnotlimitedtothefollowing:
a.
Sendingchainlettersorexcessivemessagesincludingspamming,eitherlocallyoroffcampus
violatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonthspamming,
includestheactof(1)repeatedcrosspostingthesamemessagetoasmanynewsgroupsor
mailinglistsaspossible,whetherornotthemessageisgermanetothestatedtopicofthe
newsgroupsormailingliststargeted,(2)maliciouslysendingoutofunsolicitedemailinbulk,or
(3)sendinglargeunwantedorunnecessaryfilestoasingleemailaddress.
b.
Printingexcesscopiesofdocuments,files,data,orprogramsviolatorsshallsufferapenalty
rangingfromsuspensionforoneweektoonemonth
c.
Runninggrosslyinefficientprogramswhenefficientalternativesareknownbytheusertobe
availableviolatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonth
d.
Usingmorethanonecomputerterminalatatime,unlessspecificallyauthorizedbycompetent
authority.Facultymemberswhosedutiesrequiretheuseofmorethanonecomputershallbe
exempted.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyear
e.
Lockingpublicaccesscomputersusingscreensaversorotherwise,unlessspecificallyauthorized
bycompetentauthorityviolatorsshallsufferapenaltyrangingfromsuspensionforoneweekto
onemonth
f.
Notloggingoutofthesystemtoallowotheruserstomakeuseofthepublicaccesscomputer
violatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonthand
g.
UsingaservicewhichhasbeenidentifiedbytheSystemAdministratorascausinganexcessive
amountoftrafficontheITSystemoritsexternalnetworklinksviolatorsshallsufferapenalty
rangingfromsuspensionforoneweektooneyear.
Offensivematerial.
a.
UsersmaynotusethefacilitiesoftheITSystemtoproduce,disseminate,ordisplaymaterial
thatcouldbeconsideredoffensive,pornographic,raciallyabusive,orlibelousinnature.
b.
Usersmaynotuseelectroniccommunicationfacilities(suchasmail,chat,orsystemswithsimilar
functions)tosendmessageswhicharefraudulent,maliciouslyharassing,obscene,threatening,or
inviolationoflaws,administrativerulesandregulations,orotherpoliciesoftheUniversity
Systemoritsconstituentuniversities(CU).Violatorsshallsufferapenaltyrangingfrom
suspensionforonemonthtoexpulsionordismissal.
Inappropriatemessages.Usersmaynotsendtoamailinglist,includinglocalornetworknewsgroups
andbulletinboards,anyunsolicitedmaterialinconsistentwiththelist'spurpose.Usersofanelectronic
mailinglistareresponsiblefordeterminingthepurposeofthelistbeforesendingmessagestoor
receivingmessagesfromthelist.Subscriberstoanelectronicmailinglistaredeemedtohavesolicited
anymaterialdeliveredbythelistthatisconsistentwiththelist'spurpose.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneweektoonemonth.
UseswhichViolatePrivacy
1.
Confidentialinformation.
a.
mail.up.edu.ph/local/files/aup.html
Unlessproperlyauthorized,usersmaynotattempttogainaccesstoarchivesorsystemsthat
contain,process,ortransmitconfidentialinformation.Authorizedusersmaynotexceedtheir
approvedlevelsofaccess,norshouldtheydiscloseconfidentialinformationtoothers.
3/5
4/10/12
b.
Usersshalltreatasconfidentialsuchinformationwhichmaybecomeavailabletothemthrough
theuseoftheITSystem,whetherintentionallyoraccidentally.Usersmaynotcopy,modify,
disseminate,orusesuchinformation,eitherinwholeorinpart,withoutthepermissionofthe
personorbodyentitledtogiveit.Violatorsshallsufferapenaltyrangingfromsuspensionforone
yeartoexpulsionordismissal.
2.
Encryptedinformation.Usersshallconsiderasconfidentialallencryptedinformation.Thisincludesbutis
notlimitedtopasswords,digitalkeysandsignatures.Usersmaynotdecrypt,attempttodecrypt,or
enableotherstodecryptsuchinformationiftheyarenottheintendedrecipient.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneyeartoexpulsionordismissal.
3.
Informationbelongingtoothers.Usersmaynotintentionallyseekorprovideinformationon,obtain
copiesof,ormodifyfiles,programs,orpasswordsbelongingtootherusers,withoutthepermissionof
thoseotherusers.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtoexpulsionor
dismissal.
4.
Wiretapping,trafficcaptureandsnooping.Unlessproperlyauthorized,usersmaynotrerouteorcapture
datatransmittedovertheITSystem.Violatorsshallsufferapenaltyrangingfromsuspensionforone
yeartoexpulsionordismissal.
vi
Inadditiontothepenaltiesprovided,allITprivilegesoftheoffendermaybesuspendedforamaximumofthe
periodofthepenalty.Iftheviolationamountstoapenaltypunishablebyexpulsionordismissal,ITprivileges
mayberevokedpermanently.
vii
repeatedviolationsofanyoftheactsproscribedunderthispolicyshallbeconsideredasgrossmisconduct.
Section7.ToleratedUse
Fromtimetotime,theUPSYSTEMoritsconstituentuniversitiesmayissuealistclassifyingcertaintypesofuseunderthe
categoryoftolerateduse.ThislistshallformpartofthisPolicyandwillbeconsideredbindingonallusers.Usersshould
consulttheirsystemandnetworkadministratorsiftheyarenotsurewhetheracertaintypeofuseisconsideredallowed,
tolerated,unacceptableorprohibited.
Section8.EnforcementProcedures
(a)
Monitoring.TheUPSYSTEMoritsconstituentuniversitiesmaymonitoralluseoftheITSystematalltimesasmay
benecessaryforitspropermanagement.ActivitiesontheITSystemmaybeautomaticallyand/orcontinuously
logged.Systemandnetworkadministratorsmayexaminetheselogsanytime.Alllogsshallbeconsidered
confidential.
(b)
AccesstoPrivateFiles.TheUPSYSTEMmayaccessallaspectsoftheITSystem,includingprivatefiles,withoutthe
consentoftheuser,inthefollowinginstances:
(i)
Whennecessarytoidentifyordiagnosesystemsorsecurityvulnerabilitiesandproblems,orotherwisepreserve
theintegrity,reliability,availability,confidentialityandefficiencyoftheITSystem
(ii)
WhensuchaccesstotheITSystemisrequiredtocarryoutessentialbusinessfunctionsoftheUPSYSTEM
(iii)
WhennecessarytoavoiddisreputetotheUPSYSTEM
(iv)
WhentherearereasonablegroundstobelievethataviolationoflaworasignificantbreachofthisPolicyor
anyotherpolicyoftheUPSYSTEMmayhavetakenplace,andthataccessandinspectionmayproduce
evidencerelatedtothemisconduct
(v)
Whenrequiredbylaworadministrativerulesorcourtorderor
(vi)
Whenrequiredtopreservepublichealthandsafety.TheUPSYSTEMwillaccessprivatefileswithoutthe
consentoftheuseronlywiththeapprovaloftheChancellorexceptwhenanemergencyentryisnecessaryto
preservetheintegrity,reliability,availability,confidentialityandefficiencyoftheITSystemortopreserve
publichealthandsafety.TheUPSYSTEMthroughthesystemandnetworkadministratorswilldocumentall
instancesofaccesswithoutconsent.
(c)
ReportingProblemsandmisuse.Usersmustreporttotheappropriatesystemadministratorsanydefectsdiscoveredin
systemaccountingorsystemsecurity,allknownorsuspectedabuseormisuseoftheITSystem,andespeciallyany
damagetoorproblemswiththeirfacilitiesorfiles.
(d)
UserCooperation.Users,whenrequested,areexpectedtocooperatewithUPSYSTEMinanyinvestigationofIT
systemabuse.
(e)
GuidelinesforImmediateAction.
(f)
(i)
Notification.Whenanysystemadministratorormemberofthefacultyorstaffhaspersuasiveevidenceof
abuseormisuseoftheITSystem,andifthatevidencepointstotheactivitiesorthefilesofanindividual,he
orsheshall,within24hoursofthediscoveryofthepossiblemisuse,notifytheChancellororhis/herduly
designatedauthority.
(ii)
Suspension.Insuchcases,thesystemadministratormaytemporarilysuspendorrestricttheuser'saccess
privilegesforaperiodnotexceeding72hours.Ausermayappealsuchsuspensionorrestrictionandpetition
forimmediatereinstatementofprivilegesthroughtheChancellororhis/herdulydesignatedauthority.The
Chancellormayextendthesuspensionforthirty(30)days.
(iii)
Removal.Inaddition,insuchcases,thesystemadministratormayimmediatelyremoveoruninstallfromthe
ITSystemanymaterial,softwareorhardwarewhichposesanimmediatethreattotheintegrity,reliability,
availability,confidentialityandefficiencyoftheITSystemoranyofitscomponentsoriftheusemightbe
contrarytothisPolicy.Theusershallbenotifiedoftheactiontaken.Ausermayappealsuchremovaland
petitionforreinstatementofthematerialwithinfifteen(15)daysfromremoval.
Investigation.Theinvestigationandprosecutionofacademicandadministrativepersonnelandstudentsshallbein
accordancewiththeregulationsoftheUPSYSTEM.Theinvestigatingcommittee,bodyortribunalmusthaveatleast
onememberknowledgeableaboutIT.Theactionstheproperofficermayundertakeincludebutarenotlimitedtothe
following:
(i)
Extendthesuspensionorrestrictionofauser'sprivilegesforthedurationoftheinvestigation,orasmaybe
deemednecessarytopreserveevidenceandprotectthesystemanditsusers
(ii)
Callandinterviewpotentialwitnessesand
(iii)
Summonthesubjectofthecomplainttoprovideinformation.
(g)
FilingofCriminalCharges.Incaseswherethereisevidenceofseriousmisconductorpossiblecriminalactivity,the
Chancellorshallfiletheappropriatecriminalchargeswiththepropercourts.Whereproceedingshavebeeninstituted
againstauserforviolationofthisPolicy,theChancellormayindefinitelysuspendorrestricttheuser'saccess
privilegesforthedurationofsuchproceedings.
(h)
CumulativeRemedies.TheproceduresunderthisPolicyshallnotexcludeanyotherremedyavailabletoanyinjuredor
interestedpartyunderanyrelevantlaw,administrativeruleorregulation,orotherpolicyoftheUPSYSTEM.
(i)
ExternalLegalProcesses.TheUPSYSTEMshallcomplywithanylawfulordertoprovideelectronicorotherrecordsor
otherinformationrelatedtothoserecordsorrelatingtouseoftheITSystemwhichmayresultfromcoercive
processesinadministrativeinvestigations,orjudicialactionsorproceedings.
Section9.Waiver
(a)
LossofData.Usersrecognizethatsystemsandnetworksareimperfectandwaiveanyclaimforlostworkortime
mail.up.edu.ph/local/files/aup.html
4/5
4/10/12
thatmayarisefromtheuseoftheITSystem.TheUPSYSTEMshallnotbeliablefordegradationorlossofpersonal
data,software,orhardwareasaresultoftheiruseoftheITSystem.
(b)
Authorization.UsersrecognizethattheUPSYSTEMprovidesaccesstotheITSystemonlyasaprivilegeandnota
rightthattheyhavenorighttouseitforanypurposeotherthanthosedirectlyconnectedwiththeworkoftheUP
SYSTEMandthattheUPSYSTEMmaytakewhatevermeasuresitdeemsnecessarytoenforcethis.Userstherefore
waiveanyactiontheymayhaveagainsttheUPSYSTEMunderanylaworadministrativeruleorregulationforanyact
theUPSYSTEMundertakesunderthisPolicy,specificallyincluding,butnotlimitedto,thoseactsenumeratedunder
Section7hereof.
mail.up.edu.ph/local/files/aup.html
5/5