Fair Use Policy
   HOME

TheInfoList



OR:

An acceptable use policy (AUP)—also referred to as an acceptable usage policy or, in certain commercial contexts, a fair use policy (FUP)—is a formal set of guidelines established by the administrator, proprietor, or operator of a
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
,
website A website (also written as a web site) is any web page whose content is identified by a common domain name and is published on at least one web server. Websites are typically dedicated to a particular topic or purpose, such as news, educatio ...
, digital platform, or
information system An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, Information Processing and Management, store, and information distribution, distribute information. From a sociotechnical perspective, info ...
. The policy delineates the conditions under which access is granted and specifies the behaviors that are permitted, restricted, or prohibited. AUPs function as regulatory instruments intended to ensure the responsible use of
information and communications technology Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computer ...
, to mitigate institutional liability, and to safeguard the
rights Rights are law, legal, social, or ethics, ethical principles of freedom or Entitlement (fair division), entitlement; that is, rights are the fundamental normative rules about what is allowed of people or owed to people according to some legal sy ...
and
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
of both users and system owners. The term “fair use policy,” though occasionally employed in industry settings (e.g., by
internet service providers An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
to define usage thresholds), is conceptually distinct from
fair use Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
as defined in
copyright law A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, e ...
. The latter constitutes a statutory doctrine governing the lawful reproduction and transformation of protected works; the former reflects privately enforced contractual norms. AUPs commonly address issues such as unauthorized access, distribution of illicit or harmful content,
copyright infringement Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
, violations of
information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as dat ...
, and misuse of communications infrastructure. They may also outline the procedural and disciplinary consequences of policy violations. In transnational environments, AUPs are increasingly shaped by regional legal frameworks, including data protection regulations (e.g., the
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
in the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
) and national cybersecurity standards (e.g.,
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
guidelines in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
).


Terminology

An acceptable use agreement—also referred to in institutional contexts as an access agreement, user agreement, or terms of use—is a policy instrument that codifies the rights, obligations, and restrictions of individuals accessing a designated
information system An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, Information Processing and Management, store, and information distribution, distribute information. From a sociotechnical perspective, info ...
,
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
, or digital resource. These agreements function as governance mechanisms, often embedded within broader contractual or institutional frameworks that regulate digital conduct and access permissions. While terminology may vary across sectors—such as
education Education is the transmission of knowledge and skills and the development of character traits. Formal education occurs within a structured institutional framework, such as public schools, following a curriculum. Non-formal education als ...
,
government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
,
commercial enterprise Business is the practice of making one's living or making money by producing or buying and selling products (such as goods and services). It is also "any activity or enterprise entered into for profit." A business entity is not necessari ...
, or
public service A public service or service of general (economic) interest is any service intended to address the needs of aggregate members of a community, whether provided directly by a public sector agency, via public financing available to private busin ...
environments—the core objective remains the same: to formalize user responsibilities and delineate the scope of permitted activity. In educational institutions, for example, access agreements may appear in student handbooks or technology use policies, whereas in commercial settings, they are commonly integrated into end-user license agreements(EULAs) or general terms of service. The substance of such agreements typically addresses matters such as user authentication, limits on data storage and dissemination, restrictions on the transmission of unlawful or harmful content, and the conditions under which the institution may monitor, restrict, or terminate access. Many agreements also incorporate references to external legal regimes—such as
copyright law A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, e ...
,
data protection Data protection may refer to: * Information privacy, also known as data privacy * Data security {{Authority control ...
, and
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
regulations—that inform both the behavioral norms and potential penalties for violation. To ensure enforceability and
informed consent Informed consent is an applied ethics principle that a person must have sufficient information and understanding before making decisions about accepting risk. Pertinent information may include risks and benefits of treatments, alternative treatme ...
, acceptable use agreements frequently require explicit user acknowledgment, whether through signed consent forms,
clickwrap A clickwrap or clickthrough agreement is a prompt that offers individuals the opportunity to accept or decline a digitally-mediated policy. Privacy policies, terms of service and other user policies, as well as copyright policies commonly emplo ...
acceptance during login, or periodic reaffirmation procedures. Critics of current practice have noted, however, that these agreements are often written in legally dense or
opaque Opacity is the measure of impenetrability to electromagnetic or other kinds of radiation, especially visible light. In radiative transfer, it describes the absorption and scattering of radiation in a medium, such as a plasma, dielectric, shie ...
language, raising concerns about the transparency and actual informedness of user consent.


Common elements of AUP statements

Acceptable use policies (AUPs) typically include a core set of provisions that address legal compliance, user responsibility, and institutional safeguards. According to guidance from the
Virginia Department of Education The Virginia Department of Education is the state education agency of the Commonwealth of Virginia. It is headquartered in the James Monroe Building in Richmond. The department is headed by the Secretary of Education (currently Aimee Guidera) ...
, an effective AUP should align with applicable
telecommunications Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
laws and reflect broader regulatory expectations. This includes reference to national legislation such as the Children’s Internet Protection Act (CIPA) in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, which mandates certain
internet safety Internet safety, also known as online safety, cyber safety, and digital safety, is the science and practice of reducing harms that occur through the (mis)use of technology. It is a multidisciplinary, multi-stakeholder field that encompasses the des ...
measures in
schools A school is the educational institution (and, in the case of in-person learning, the building) designed to provide learning environments for the teaching of students, usually under the direction of teachers. Most countries have systems of ...
and
libraries A library is a collection of Book, books, and possibly other Document, materials and Media (communication), media, that is accessible for use by its members and members of allied institutions. Libraries provide physical (hard copies) or electron ...
receiving federal funding. AUPs also commonly include statements aimed at protecting user privacy and personal safety in digital environments. These provisions encourage secure and ethical behavior, discourage the disclosure of
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
, and often reference privacy-focused legislation, such as the
Family Educational Rights and Privacy Act The Family Educational Rights and Privacy Act of 1974 (FERPA or the Buckley Amendment) is a United States federal law that governs the access to educational information and records by public entities such as potential employers, publicly funded ...
(FERPA) in the educational context. More generally, these clauses are designed to prevent misuse of institutional systems that could expose individuals to harm or data compromise. Another essential element is the emphasis on respecting
copyright A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
and
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
laws. AUPs typically prohibit unauthorized reproduction or distribution of protected materials and may include brief explanations of
fair use Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
principles, especially in contexts where users engage with instructional or research-based digital content. Many policies extend beyond these foundational areas to enumerate specific forms of prohibited conduct. These can include unauthorized access to restricted systems, installation of unapproved software, intentional distribution of
malicious code Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, or the use of institutional platforms for
harassment Harassment covers a wide range of behaviors of an offensive nature. It is commonly understood as behavior that demeans, humiliates, and intimidates a person, and it is characteristically identified by its unlikelihood in terms of social and ...
or discriminatory behavior. AUPs often outline institutional rights to monitoring digital activity and enforce penalties for violations, which may range from temporary account suspension to formal disciplinary or
legal action In legal terminology, a complaint is any formal legal document that sets out the facts and legal reasons (see: cause of action) that the filing party or parties (the plaintiff(s)) believes are sufficient to support a claim against the part ...
. In some cases, policies also reserve the right to revise their terms unilaterally, allowing administrators to update acceptable use conditions without individualized notice to users.


See also

*
Fair use Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
– the U.S. copyright doctrine distinct from contractual “fair use policies” * Terms of service – agreements often incorporating acceptable use language *
End-user license agreement An end-user license agreement or EULA () is a legal contract between a software supplier and a customer or end-user. The practice of selling licenses to rather than copies of software predates the recognition of software copyright, which has ...
– commercial licensing frameworks relevant to AUPs *
Children's Internet Protection Act The Children's Internet Protection Act (CIPA) is one of a number of bills that the United States Congress proposed to limit children's exposure to pornography and explicit content online, along others such as preventing minors from hacking other ...
– U.S. law that shapes school-based AUPs *
Family Educational Rights and Privacy Act The Family Educational Rights and Privacy Act of 1974 (FERPA or the Buckley Amendment) is a United States federal law that governs the access to educational information and records by public entities such as potential employers, publicly funded ...
(FERPA) – federal privacy law often cited in educational AUPs *
Computer and network surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
– institutional enforcement mechanisms tied to AUPs *
Information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as dat ...
– a key concern addressed in most AUPs *
Cyberethics Cyberethics is "a branch of ethics concerned with behavior in an online environment". In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "th ...
– ethical considerations related to digital behavior and policy *
Digital rights Digital rights are those human rights and Natural and legal rights, legal rights that allow individuals to access, use, create, and publish digital media or to access and use computers, other Consumer electronics, electronic devices, and teleco ...
– user freedoms and constraints in digital environments


References

{{DEFAULTSORT:Acceptable Use Policy Information technology management Terms of service