Implementation Information and Revision History

Implementation Information

Review Frequency:
Triennial
Responsible Person:
CISO
Approved By:
Office of Legal Counsel
Approval Date:
February 14, 2018

Revision History

Version
Date
Description
1.0
12/04/2004
The initial Acceptable Use Policy includes Applicability, User Responsibilities, and Statement of Prohibited Uses, Enforcement, and Sanctions for Non-Compliance, Privacy, and Emergencies Sections. Additionally, policies for Anti-Spam, Email, Peer-to-Peer, Web Hosting, and Wireless Policies are added as appendices.
2.0
08/15/2008
The policy was extensively reviewed and modified by the Office of Legal Counsel. The following changes were made:
  1. General addition of terms, modification of language, and reorganization of sections and sub-sections to the entire IT Policy;
  2. Addition of “User Names” and “Passwords” sub-sections to the “User Responsibilities and Statement of Prohibited Uses” section;
  3. Addition of the “Intellectual Property” section;
  4. Addition of sub-sections and reorganization of former “Enforcement and Sanctions for Non-Compliance” and “Emergencies” sections, now, collectively, the “Monitoring, Reporting, Violations, and Sanctions” section;
  5. Addition of the “Amendments and Revisions” section in its prior format; and
  6. Addition of the “Internet Usage Policy” as an appendix.
2.1
11/11/2008
This revision includes:
  1. Changes in the password section because of the deployment of AccessIT ID,
  2. A change in Section 5, sub-section B, “Reporting,” which moved the reporting of an incident that involves a student in the Graduate School of Arts and Sciences to the Academic Dean of the school instead of the Dean of Students,
  3. Grammatical corrections throughout multiple sections of this document.
2.2
09/28/2010
This revision includes:
Modifications to the Peer to Peer Policy meet the Higher Education Opportunity Act requirements of 2008.
2.3
09/26/2013
This revision includes:
Addition of the password change policy of 180 days.
2.4
08/19/2016
This revision includes:
  1. Addition of Section XIII Core Google Apps Policy
  2. Addition of Section XIV Non-core Google Apps Policy
  3. Minor grammatical changes
2.5
12/14/2016
This revision includes the following:
Modifications to the Peer-to-Peer Policy that reflect new restrictions on peer-to-peer file-sharing are effective as of January 4, 2017.
3.0
12/20/2017
The policy has been renamed IT Acceptable Use to Acceptable Uses of IT Infrastructure and Resources. Major revisions have occurred in a joint effort between the Office of Legal Counsel and Fordham IT. These revisions include:
  • The reformatting of the policy into the Fordham IT template for policies so that all policies are consistent.
  • The removal of sections from this policy. These sections will now be contained in their standalone policies. The sections removed are as follows:
    • Anti-Spam
    • Email
    • Peer-to-Peer
    • Hosting
    • Wireless
    • Internet Usage
    • Core Google Services
    • Non-Core Google Services
  • Placement of the IT Policy Statement, Applicability, and Related Policies sections of the old policies into the appropriate areas of the IT Policy Template.
  • Elimination of the Current Revision section as that is incorporated in this table.
  • Streamlining of the Password section
  • Modernization of the Intellectual Property section
  • Rewrite the Privacy section to reflect changes in privacy regulations to which the University must adhere.
  • Updates to the Reporting section.
3.1
02/14/2018
Intellectual Property (Section 2) now includes a pointer to the University’s Intellectual Property Policy on the Fordham Web Site.
4.0
07/15/2020
Updated links, removed redundant statements, and updated terms with current language usage.
5.0
02/28/2023
Added mobile device information and updated language.
5.1
08/25/2023
User Responsibilities and Statement of Prohibited Uses section now includes the Roll-Based Email Uses Policy
5.2
01/10/2024
Updated the Spirit of Use and Additional Responsibilities sections

Sections in Acceptable Uses of IT’s Infrastructure and Resources Policy

  1. User Responsibilities and Statement of Prohibited Uses
  2. Intellectual Property
  3. Privacy
  4. Monitoring, Reporting, Violations, and Sanctions
  5. User Obligation to Review
  6. Implementation Information and Revision History

Need Help?


Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours