{"id":872,"date":"2025-10-29T09:41:39","date_gmt":"2025-10-29T14:41:39","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=872"},"modified":"2025-10-29T10:16:08","modified_gmt":"2025-10-29T15:16:08","slug":"it-acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/","title":{"rendered":"IT Acceptable Use Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"872\" class=\"elementor elementor-872\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d5ae81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d5ae81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3f1ce1\" data-id=\"e3f1ce1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ae500b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae500b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c9b2c3\" data-id=\"0c9b2c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a01332 elementor-widget elementor-widget-global elementor-global-473 elementor-widget-text-editor\" data-id=\"4a01332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedures\u200b<\/a><\/h2><ul><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-center-access-policy\/\">Data Center Access Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\">Lab Policies<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27edaa4\" data-id=\"27edaa4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f3f042 elementor-widget elementor-widget-heading\" data-id=\"7f3f042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font color=\"#000000\"><span style=\"font-size: 40px\">ACCEPTABLE USE POLICY<\/span><\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92765b7 elementor-widget elementor-widget-embedpres_document\" data-id=\"92765b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embedpres_document.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"embedpress-document-embed ep-doc-fe59f106380a4a3bfaea7462a23b42d0 ose-document \" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\">\n\n                        <div >\n\n                <div id=\"ep-elementor-content-92765b7\" class=\"ep-elementor-content    ep-content-protection-disabled\">\n                    <div id=\"92765b7\" class=\"ep-embed-content-wraper\">\n                        <div class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7\" data-emid=\"embedpress-pdf-92765b7\" data-embedpress-content=\"d956a882147afb5668e341a33f389865\" data-embed-type=\"Document\" data-emsrc=\"https:\/\/www.nicholls.edu\/information-tech\/wp-content\/uploads\/sites\/30\/2025\/10\/Nicholls-State-University-Acceptable-Use-Policy-July-2023.pdf\"><iframe title=\"Nicholls State University &#8211; Acceptable Use Policy &#8211; July 2023\" class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7 lazyload\" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\" data-src=\"https:\/\/www.nicholls.edu\/information-tech\/wp-admin\/admin-ajax.php?action=get_viewer&#038;file=https%3A%2F%2Fwww.nicholls.edu%2Finformation-tech%2Fwp-content%2Fuploads%2Fsites%2F30%2F2025%2F10%2FNicholls-State-University-Acceptable-Use-Policy-July-2023.pdf#key=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\" frameborder=\"0\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe><p class=\"embedpress-el-powered\">Powered By EmbedPress<\/p><\/div>                    <\/div>\n                <\/div>\n                            <\/div>\n        <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE USE POLICY Powered By EmbedPress<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-872","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Acceptable Use Policy - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Acceptable Use Policy - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE USE POLICY Powered By EmbedPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T15:16:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-acceptable-use-policy\\\/\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-acceptable-use-policy\\\/\",\"name\":\"IT Acceptable Use Policy - Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\"},\"datePublished\":\"2025-10-29T14:41:39+00:00\",\"dateModified\":\"2025-10-29T15:16:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-acceptable-use-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-acceptable-use-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-acceptable-use-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Acceptable Use Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Acceptable Use Policy - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/","og_locale":"en_US","og_type":"article","og_title":"IT Acceptable Use Policy - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE USE POLICY Powered By EmbedPress","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/","og_site_name":"Information Technology","article_modified_time":"2025-10-29T15:16:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/","name":"IT Acceptable Use Policy - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2025-10-29T14:41:39+00:00","dateModified":"2025-10-29T15:16:08+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure","item":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"},{"@type":"ListItem","position":3,"name":"IT Acceptable Use Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/872\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}