Policies & Procedures

The University of Pikeville has developed and instituted policies as a way to ensure the continued offering of consistent, modern and innovative services hinged upon the University’s growing telecommunications and computing infrastructure.

With the demand for advanced computing skills increasing in both the professional and educational sectors, the department of Information Technology felt it was crucial to institute bold initiatives in order to remain competitive for potential students and for their graduates to remain competitive in the workplace. By making available an online version of their policies, Information Technology hopes that they will equip their staff and students with the skills and understanding to use computers effectively both in their time at University of Pikeville and beyond.

Acceptable User Policy
The University of Pikeville provides computing and networking services for UPIKE students, faculty, and staff. A University of Pikeville network account is a privilege, and the following usage guidelines have been established for this system.

Users are expected to act ethically, responsibly, and legally or risk forfeiture of their network accounts. Unacceptable conduct may include:
  • Maliciously interfering with normal ability of others to use computer and network resources
  • Masquerading as another user
  • Violating the privacy of others' files and accounts
  • Violating software copyright and/or licensing agreements
  • Abusing computing facilities at other sites through network connections from the University of Pikeville
  • Using University accounts for personal business
Use of a University of Pikeville network account must comply with all federal, Kentucky, and other applicable law; all applicable contracts and licenses; and University policies as articulated in the Student, Faculty and Staff handbooks. These laws, contracts, licenses, and policies include the laws pertaining to defamation, privacy, civil rights, copyright, trademark, obscenity, and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit "hacking," "cracking," and similar activities; and the University's sexual harassment policy.

While the University's administration desires to provide a reasonable level of privacy, users should be aware that the data they create or send on the University networks and systems (documents, email, voice messages, etc.) remains the property of the University. Because of the need to protect the University's networks and systems, the administration cannot and will not guarantee the confidentiality of information stored or sent on any network device or system owned or operated the University.

For security and network maintenance purposes, authorized individuals within the University may monitor equipment, systems and network traffic at any time. Such access will be governed by the normal expectations of professional conduct. The University reserves the right to audit networks, systems, and data on a periodic basis, and further as needed, to ensure compliance with this policy, and to fulfill any obligations the University may have under applicable local, state, federal or international laws and regulations.

Any person who violates any provision of this policy, of other relevant University policies, or of applicable City, State, or Federal laws or regulations may face disciplinary action up to and including termination or expulsion.



There has never been a better time to be a UPIKE Bear! APPLY NOW
UPike Tigers