University of Iowa Hospitals and Clinics

THE UNIVERSITY OF IOWA HOSPITALS AND CLINICS GUESTNET ACCEPTABLE USE POLICY

It is the University of Iowa Hospitals and Clinics' intent to provide our customers with Internet access while they are visiting our facilities. To help us accomplish this, we have adopted an Acceptable Use Policy (AUP) that is set out below. This policy outlines the proper use and standards of conduct for the University of Iowa Hospitals and Clinics ("UIHC") GuetNet service ("GuetNet").

It is the responsibility of all GuetNet users to comply with these policies. Failure to comply with these policies could subject you to removal from GuestNet. If you do not agree to comply with all of these policies, you must immediately stop use of the GuestNet service.

General Information

  1. UIHC cannot take any responsibility for any user data traversing GuestNet. We cannot guarantee that your data will not become lost, damaged, or intercepted in transit. We cannot take responsibility if you lose an email or a download or any other kind of transmission, or if someone gains access to your passwords, or for any other like circumstances.
  2. GuestNet may become unavailable at any time, and without notice. If this happens, we will endeavor to restore the GuestNet as soon as we can.
  3. Security of the Customers equipment and data is not the responsibility of the UIHC. It is the Customers responsibility to safeguard against the risks of hacking, viruses, eavesdropping, and all other such hazards. UIHC is not liable for any kind of loss or damage whatsoever.
  4. If your use of GuestNet has a negative impact on GuestNet services, we will attempt to locate and notify you of the situation, and work to correct the problem. If we are unable to locate you in a timely manner, and a rapid response is necessary to ensure ongoing GuestNet services, your access may be suspended or terminated.
  5. UIHC reserves the right to alter the terms and conditions stated in this document at any time and for any reason.

Prohibited Uses

  1. Undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening, defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any local, provincial or federal law, order or regulation.
  2. Post, access, store, transmit or disseminate any information or material which a reasonable person could person could deem to be objectionable, offensive, indecent, pornographic, harassing, threatening, embarrassing, distressing, vulgar, hateful, racially or ethnically offensive or otherwise inappropriate, regardless of whether such material or its dissemination is unlawful.
  3. Access any other person's computer, software, or data without their knowledge and consent; breach the security of another user or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for Customer, logging into or making use of a server or account Customer is not expressly authorized to access, or probing the security of other hosts, networks or accounts.
  4. Use or distribute tools designed or used for compromising security, including, but not limited to password guessing programs, decoders, password gatherers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Network probing or port scanning tools are only permitted when explicitly authorized by the UIHC IT Security Office. Unauthorized port scanning, for any reason, is strictly prohibited.
  5. Upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through GuestNet or otherwise, which is protected by copyright or other proprietary right, without obtaining permission of the owner.
  6. Restrict, inhibit or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy GuestNet, including, without limitation, posting or transmitting any information or software which contains a worm, virus or other harmful feature, or generating levels of traffic sufficient to impede ability of other users to send or retrieve information.
  7. Transmit unsolicited bulk or commercial messages or "spam". This includes, but is not limited to, unsolicited advertising, promotional materials or other solicitation material; bulk mailing of commercial advertising, chain mail, commercial informational announcements.
  8. Distribute programs that remove locks or time-outs built into software (cracks).
  9. Impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity.
  10. Any policy set forth by another service provider accessed through GuestNet must be strictly adhered to.

Remedies

  1. In the event that you violate this AUP, UIHC may restrict your access to the GuestNet
  2. UIHC may investigate incidents that are contrary to this AUP and cooperate with law enforcement organizations.
  3. Customer agrees to indemnify, defend and hold harmless UIHC against all claims and expenses resulting from Customer engaging in any of the prohibited activities listed in this AUP.