![]() |
|
|
|
What is Abuse?The term "abuse" is commonly used on the Internet as a keyword for reporting problems caused by someone's conduct. In this context, "abuse" can take many forms and may involve any one of a variety of technology resources, including desktop computers, network servers, the Internet, or even the telephone system. This web site describes how to report incidents of apparent abuse, it provides a few answers to questions about these situations, and describes ways to protect yourself from abuse. Responsible Computing and Information Technology PoliciesEveryone within the University of Virginia community who uses University computing and communications technology has the responsibility to use these resources for legal and ethical activities. Members of this community should always keep in mind that the intended use of these resources is to support the University's general mission of instruction, research, and service. The Department of Information Technology and Communications (ITC) oversees the University's technology resources and infrastructure. ITC created the following documents to help members of the University community understand this community's expectations:
Abuse Response TeamThe University has a team which responds to reports and complaints about abuse. This group investigates the problems reported and takes appropriate action to protect the members of the community and the University's resources. Members of this team include staff from many different areas within ITC, as well as the University's email postmaster,the University's newsmaster,and staff from the Office of Dean of Students and/or Student Affairs Office,officers from the University Police,the University's General Counsel's Office,Human Resources or the Provost's Office may also be involved in a response, depending on the situation. Each member of the abuse team recognizes the often sensitive nature of both reports received and what is found during the course of an investigation.All members of the team will hold both reports and findings confidential consistent with both the letter and the spirit of the procedure described in this document and the rules of the disciplinary bodies involved. With the explosive growth of the Internet and as information technology becomes a more important part of our lives, these sorts of problems have become more frequent. Being a responsible user of these resources helps prevent these kinds of problems and minimizes the chances that you'll be the victim of abuse. |
Related Links |
||
|
Print This Page | Text-only Version Abuse of Information Technology
Maintained by: |