Responsible Computing User Agreement

Users of Western’s IT Resources are obligated to understand their responsibilities under this User Agreement as well as all related University policies that govern ethical and legal behavior.

Acceptable Use

Authorized Users are provided access to IT Resources in order to support their roles and responsibilities at the University. Acceptable use of IT Resources is use that conforms to the University’s policies in support of its educational, research, service, student, and campus life activities; administrative and business functions; and financial and human resource administration.


Authorized Users are to respect the rights of other computing users; respect the integrity of the physical facilities and controls; and respect all pertinent copyright, license, and contractual agreements. It is the policy of the University that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations while applying the highest standard of ethics.


All users are expected to comply with the University’s policy on Securing Information Systems. In accordance with this policy, all faculty and staff are required to complete annual information security awareness training.

Social Media

The use of social media, including both official university and personal posts and comments, shall conform to the University’s policy on Using Social Media at Western.


The University is committed to protecting the privacy of users and any of their electronic records with personal information in compliance with state and federal regulations. Employees may only access, use, or share personal information in accordance with University policies, including, but not limited to the Affording Individual Privacy Rights, the Managing University Records, and the Student Records policies.

Prohibited Activities

Prohibited computing activities include, but are not limited to:

  • Sharing your account password or using another user’s credentials for access.
  • Falsifying an identity.
  • Circumventing or attempting to circumvent security protocols.
  • Assisting in, encouraging, or concealing from authorities any unauthorized use, or an attempt at unauthorized use, of any IT Resource.
  • Using electronic communications to threaten, harass or defame.
  • Commercial or illegal activities including illegal pornography and theft of intellectual property.

Additional prohibited computing activities by employees in accordance with the Using University Resources Policy include, but are not limited to:

  • Soliciting, lobbying, or assisting a political campaign or any commercial activities.
  • Activities beyond de minimis use, as determined by state ethics laws and University policy.


Failure to comply with the University’s policies on IT Resources may result in loss of privileges, disciplinary action, or prosecution.


Revised: March 25, 2022

Associated Articles