Search11 Results

Policies and guidelines that are a part of an overall strategy to provide a secure and stable IT environment to support users, research, and university business.
It is a violation of the Code of Computing Practices for any user to commit copyright infringement using university resources. Copyright infringement can also result in civil and criminal penalties with fines ranging from $750 to $30,000 per work infringed.
The University of Arkansas wireless networking systems is an enterprise system covering external areas of the campus and interconnected building wireless networks. These systems are intended to allow campus users access to all campus computing facilities from mobile or portable devices such as notebook computers, tablets and smartphones.
Every computer on the internet is assigned a numerical IP address.
This policy establishes requirements for how faculty and staff use mobile technology to access sensitive university data and university data resources.
Voice over Internet Protocol (VoIP) users on campus should be aware that emergency calls placed to 911 will report location based on Emergency Response Location (ERL) information. Maintaining accurate location information is vital to ensure first responders can quickly find the correct location of a call during an emergency.
Any personal home page or other personal collection of electronic material that is accessible to others must include the following disclaimer: "These materials are not endorsed, approved, sponsored, or provided by or on behalf of the University of Arkansas, Fayetteville."
The purpose of this policy is to provide guidelines for MFA connections to the University of Arkansas network and information systems on and off campus.
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
This summary is compiled to make possible a quick review of the terms and provisions of the University of Arkansas' Code of Computing Practices. By using a University of Arkansas computer account, you are deemed to have agreed to comply with the Code of Computing Practices and to know its provisions.