University Information Policies

The following University policies define the acceptable use of -- and your responsibilities for --  protecting information technology (IT) resources at the University. Read and understand these policies and take time to see how they apply to your work responsibilities. Ask questions if you are unsure of what is expected of you; you can ask your supervisor or send email to the IT Support Center.

  • The Information Security Policy (No. 1-15) establishes employee responsibility for protecting University information from unauthorized access, modification, destruction or disclosure. The policy states that all employees are responsible for protecting University information and that each department is required to make protection of this information a part of its overall business plan.
  • The Policy for Responsible Computing (No. 1-14) requires University students, faculty, and staff to make responsible use of computing and information resources and to guard against abuse.
  • The Departmental Information and Records Management Policies (No. 1-13) makes it the responsibility of each department to establish standards for electronic file organization, measures for protecting sensitive information stored electronically, and procedures for file backup.
  • The Policy for Employees' Use of Computing Resources for Web Pages (No. 1-16) governs the use of University computing resources by employees for home pages. This policy applies to all University full-time, part-time, and miscellaneous wage employees.
  • The Policy for Electronic Mail Management and Retention (No. 1-18) advises University employees and departmental managers of their responsibilities regarding the creation of email messages, the routine deletion of email, and the retention of email messages that are official University of Delaware records.
  • The Policy for Employees' Use of Electronic Communications (No. 1-19) establishes the applicability of existing University policies and federal, state, and local law to electronic communications (e-communications), including expectations for privacy and requirements for good electronic community citizenship.
  • The Policy for Wireless Computing at the University of Delaware (No. 1-20) regulates campus wireless airspace to ensure its fair and efficient allocation and to prevent collision, interference, and failure.
  • The Policy for Use of University-Wide Mailing Lists (No. 1-21) regulates the use of University owned mailing lists for those purposes determined to be in the best interest of the University.
  • The Personal Non-Public Information Policy (No. 1-22) expands on Information Security Policy #1-15 to establish requirements for protecting personal information and notifying individuals whose personal information may have been disclosed by computer security breaches.
  • The Credit Card Policy (No. 3-26) defines the minimum technical criteria that must be met for University departments to receive credit card information over the Web.
  • The Family Educational Rights and Privacy Act (No. 4-20), or FERPA, requires the University protect the confidentiality of student educational records. These records include academic, financial, disciplinary, medical, and counseling office records.
  • The Policy for Copyrightable Material (No. 6-07) defines the general principles and administrative responsibilities and procedures for establishing and safeguarding intellectual property developed by University employees.

This manual provides guidelines to help you comply with these requirements. If you haven't already, you must become familiar with these policies and indicate your understanding and compliance with them at Understanding of Employee Computing Responsibilities and Notice of Monitoring.