Security Banner with Transparent Bottom

Bypassing IAS Network Protections and the Computer Use Policy

We remind the IAS community that bypassing the protections we have in place is against our Computer Use Policy. Here are some sections worth reviewing.

2.1 Appropriate use

IAS makes information technology resources available to its users for scholarly and administrative purposes. Appropriate use of these resources should always be ethical, reflect academic honesty, adhere to copyright laws, and respect all users' rights to privacy and freedom from any form of harassment or intimidation.

2.2 Inappropriate use

Using computer systems in any way that compromises the performance, security or integrity of IAS's information technology resources or other computers on the Internet.

Using IAS's information technology resources to gain unauthorized access to resources of this or other institutions, organizations, or individuals.

We are here to help!

If you find that you are in need of help to get your scholarly pursuits completed, please reach out to us.  Our friendly computing staff is happy to help.  Bypassing security controls can lead to large, institution-wide issues that could negatively impact the work of all of our scholars.  Let's be safe and discuss your needs.

Contact your Computing Helpdesk today!