CINXE.COM

Acceptable Use Policy for University Students | UT Austin Information Security Office

<!DOCTYPE html> <html lang="en" dir="ltr" prefix="og: https://ogp.me/ns#"> <head> <meta charset="utf-8" /> <meta name="description" content="Table of Contents Purpose Audience Privacy Expectations Responsibilities Requirements" /> <link rel="canonical" href="https://security.utexas.edu/policies/aup" /> <meta property="og:type" content="website" /> <meta property="og:url" content="https://security.utexas.edu/policies/aup" /> <meta property="og:title" content="Acceptable Use Policy for University Students" /> <meta property="og:image" content="https://security.utexas.edu/sites/default/files/opengraph_images/ut_tower.jpg" /> <meta property="og:updated_time" content="2022-06-27T16:48:51-05:00" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:title" content="Acceptable Use Policy for University Students" /> <meta name="Generator" content="Drupal 10 (https://www.drupal.org)" /> <meta name="MobileOptimized" content="width" /> <meta name="HandheldFriendly" content="true" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link rel="manifest" href="/site.webmanifest" /> <link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" /> <link rel="icon" sizes="16x16" href="/favicon.ico" /> <link rel="icon" sizes="32x32" href="/favicon-32x32.png" /> <link rel="icon" sizes="48x48" href="/favicon-48x48.png" /> <link rel="icon" sizes="150x150" href="/mstile-150x150.png" /> <link rel="icon" sizes="192x192" href="/android-chrome-192x192.png" /> <link rel="icon" sizes="512x512" href="/android-chrome-512x512.png" /> <link rel="mask-icon" sizes="400x400" href="/safari-pinned-tab.svg" color="#bf5700" /> <link rel="icon" href="/favicon.ico" type="image/vnd.microsoft.icon" /> <meta name="application-name" content="UT Drupal Kit version 3" /> <link rel="icon" href="/themes/custom/iso/images/iso-eye1.png" type="image/png" /> <script>window.a2a_config=window.a2a_config||{};a2a_config.callbacks=[];a2a_config.overlays=[];a2a_config.templates={};a2a_config.icon_color = "#bf5700";</script> <title>Acceptable Use Policy for University Students | UT Austin Information Security Office</title> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_So54Nk7JccTeqfUcdBHGtxMVwA7B4qD7-KgORDiaEX4.css?delta=0&amp;language=en&amp;theme=iso&amp;include=eJyFjkGSwyAMBD8Ey5MoYWSXKoBckkjC70PW9mH3kNympdGMIGdjaCPAKX5W4WZOhxrWkEDRrSw2IiyCGrbCCYoj5Ut2wydorJgJoo19mn61Z6wJ87mfs9b1gsRsagK7KzC4W8ykC99RRuCGCxc3u3ZuSneMBqmgxpWKoYSD4OEPvurPnNSpZJSoNqZr9sgkf9BnqyDkd_SXwMLLzVeQjdqXQKqwoT8--OvU8O-i0wv3cZyl" /> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_ojUDk7WAj3S10M1CxnwrDOTfcl_DzopH-yUr_c1bXM4.css?delta=1&amp;language=en&amp;theme=iso&amp;include=eJyFjkGSwyAMBD8Ey5MoYWSXKoBckkjC70PW9mH3kNympdGMIGdjaCPAKX5W4WZOhxrWkEDRrSw2IiyCGrbCCYoj5Ut2wydorJgJoo19mn61Z6wJ87mfs9b1gsRsagK7KzC4W8ykC99RRuCGCxc3u3ZuSneMBqmgxpWKoYSD4OEPvurPnNSpZJSoNqZr9sgkf9BnqyDkd_SXwMLLzVeQjdqXQKqwoT8--OvU8O-i0wv3cZyl" /> </head> <body class="user-logged-out path-node"> <svg aria-hidden="true" style="position: absolute; width: 0; height: 0; overflow: hidden;" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"> <defs> <symbol id="ut-retweet" viewBox="0 0 30 28"> <title>retweet icon</title> <path d="M20 23.5c0 0.266-0.234 0.5-0.5 0.5h-15c-0.578 0-0.5-0.609-0.5-1v-9h-3c-0.547 0-1-0.453-1-1 0-0.234 0.078-0.469 0.234-0.641l5-6c0.187-0.219 0.469-0.344 0.766-0.344s0.578 0.125 0.766 0.344l5 6c0.156 0.172 0.234 0.406 0.234 0.641 0 0.547-0.453 1-1 1h-3v6h9c0.141 0 0.297 0.063 0.391 0.172l2.5 3c0.063 0.094 0.109 0.219 0.109 0.328zM30 17c0 0.234-0.078 0.469-0.234 0.641l-5 6c-0.187 0.219-0.469 0.359-0.766 0.359s-0.578-0.141-0.766-0.359l-5-6c-0.156-0.172-0.234-0.406-0.234-0.641 0-0.547 0.453-1 1-1h3v-6h-9c-0.141 0-0.297-0.063-0.391-0.187l-2.5-3c-0.063-0.078-0.109-0.203-0.109-0.313 0-0.266 0.234-0.5 0.5-0.5h15c0.578 0 0.5 0.609 0.5 1v9h3c0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-bullhorn" viewBox="0 0 28 28"> <title>bullhorn icon</title> <path d="M26 10c1.109 0 2 0.891 2 2s-0.891 2-2 2v6c0 1.094-0.906 2-2 2-2.781-2.312-7.266-5.484-12.688-5.938-1.859 0.625-2.5 2.797-1.281 4.047-1.094 1.797 0.313 3.063 1.969 4.359-0.969 1.906-5 1.937-6.438 0.609-0.906-2.781-2.25-5.563-1.156-9.078h-1.906c-1.375 0-2.5-1.125-2.5-2.5v-3c0-1.375 1.125-2.5 2.5-2.5h7.5c6 0 11-3.5 14-6 1.094 0 2 0.906 2 2v6zM24 19.437v-14.906c-4.078 3.125-8.031 4.922-12 5.359v4.219c3.969 0.438 7.922 2.203 12 5.328z"></path> </symbol> <symbol id="ut-reply" viewBox="0 0 28 28"> <title>reply icon</title> <path d="M28 17.5c0 2.188-1.094 5.047-1.984 7.047-0.172 0.359-0.344 0.859-0.578 1.188-0.109 0.156-0.219 0.266-0.438 0.266-0.313 0-0.5-0.25-0.5-0.547 0-0.25 0.063-0.531 0.078-0.781 0.047-0.641 0.078-1.281 0.078-1.922 0-7.453-4.422-8.75-11.156-8.75h-3.5v4c0 0.547-0.453 1-1 1-0.266 0-0.516-0.109-0.703-0.297l-8-8c-0.187-0.187-0.297-0.438-0.297-0.703s0.109-0.516 0.297-0.703l8-8c0.187-0.187 0.438-0.297 0.703-0.297 0.547 0 1 0.453 1 1v4h3.5c5.125 0 11.5 0.906 13.672 6.297 0.656 1.656 0.828 3.453 0.828 5.203z"></path> </symbol> <symbol id="ut-info" viewBox="0 0 10 28"> <title>info icon</title> <path d="M10 21v2c0 0.547-0.453 1-1 1h-8c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h1v-6h-1c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h6c0.547 0 1 0.453 1 1v9h1c0.547 0 1 0.453 1 1zM8 3v3c0 0.547-0.453 1-1 1h-4c-0.547 0-1-0.453-1-1v-3c0-0.547 0.453-1 1-1h4c0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-flickr" viewBox="0 0 24 28"> <title>flickr icon</title> <path d="M19.5 2c2.484 0 4.5 2.016 4.5 4.5v15c0 2.484-2.016 4.5-4.5 4.5h-15c-2.484 0-4.5-2.016-4.5-4.5v-15c0-2.484 2.016-4.5 4.5-4.5h15zM10.906 14c0-1.828-1.484-3.313-3.313-3.313s-3.313 1.484-3.313 3.313 1.484 3.313 3.313 3.313 3.313-1.484 3.313-3.313zM19.719 14c0-1.828-1.484-3.313-3.313-3.313s-3.313 1.484-3.313 3.313 1.484 3.313 3.313 3.313 3.313-1.484 3.313-3.313z"></path> </symbol> <symbol id="ut-tumblr" viewBox="0 0 17 28"> <title>tumblr icon</title> <path d="M14.75 20.766l1.25 3.703c-0.469 0.703-2.594 1.5-4.5 1.531-5.672 0.094-7.812-4.031-7.812-6.937v-8.5h-2.625v-3.359c3.938-1.422 4.891-4.984 5.109-7.016 0.016-0.125 0.125-0.187 0.187-0.187h3.813v6.625h5.203v3.937h-5.219v8.094c0 1.094 0.406 2.609 2.5 2.562 0.688-0.016 1.609-0.219 2.094-0.453z"></path> </symbol> <symbol id="ut-vimeo" viewBox="0 0 28 28"> <title>vimeo icon</title> <path d="M26.703 8.094c-0.109 2.469-1.844 5.859-5.187 10.172-3.469 4.484-6.375 6.734-8.781 6.734-1.484 0-2.734-1.375-3.75-4.109-0.688-2.5-1.375-5.016-2.063-7.531-0.75-2.734-1.578-4.094-2.453-4.094-0.187 0-0.844 0.391-1.984 1.188l-1.203-1.531c1.25-1.109 2.484-2.234 3.719-3.313 1.656-1.469 2.922-2.203 3.766-2.281 1.984-0.187 3.187 1.156 3.656 4.047 0.484 3.125 0.844 5.078 1.031 5.828 0.578 2.594 1.188 3.891 1.875 3.891 0.531 0 1.328-0.828 2.406-2.516 1.062-1.687 1.625-2.969 1.703-3.844 0.141-1.453-0.422-2.172-1.703-2.172-0.609 0-1.234 0.141-1.891 0.406 1.25-4.094 3.641-6.078 7.172-5.969 2.609 0.078 3.844 1.781 3.687 5.094z"></path> </symbol> <symbol id="ut-reddit" viewBox="0 0 28 28"> <title>reddit icon</title> <path d="M28 13.219c0 1.219-0.688 2.266-1.703 2.781 0.125 0.484 0.187 0.984 0.187 1.5 0 4.937-5.578 8.937-12.453 8.937-6.859 0-12.437-4-12.437-8.937 0-0.5 0.063-1 0.172-1.469-1.047-0.516-1.766-1.578-1.766-2.812 0-1.719 1.391-3.109 3.109-3.109 0.891 0 1.687 0.375 2.266 0.984 2.109-1.469 4.922-2.422 8.047-2.531l1.813-8.141c0.063-0.281 0.359-0.469 0.641-0.406l5.766 1.266c0.375-0.75 1.172-1.281 2.078-1.281 1.297 0 2.344 1.047 2.344 2.328 0 1.297-1.047 2.344-2.344 2.344-1.281 0-2.328-1.047-2.328-2.328l-5.219-1.156-1.625 7.375c3.141 0.094 5.984 1.031 8.109 2.5 0.562-0.594 1.359-0.953 2.234-0.953 1.719 0 3.109 1.391 3.109 3.109zM6.531 16.328c0 1.297 1.047 2.344 2.328 2.344 1.297 0 2.344-1.047 2.344-2.344 0-1.281-1.047-2.328-2.344-2.328-1.281 0-2.328 1.047-2.328 2.328zM19.187 21.875c0.234-0.234 0.234-0.578 0-0.812-0.219-0.219-0.578-0.219-0.797 0-0.938 0.953-2.953 1.281-4.391 1.281s-3.453-0.328-4.391-1.281c-0.219-0.219-0.578-0.219-0.797 0-0.234 0.219-0.234 0.578 0 0.812 1.484 1.484 4.344 1.594 5.187 1.594s3.703-0.109 5.187-1.594zM19.141 18.672c1.281 0 2.328-1.047 2.328-2.344 0-1.281-1.047-2.328-2.328-2.328-1.297 0-2.344 1.047-2.344 2.328 0 1.297 1.047 2.344 2.344 2.344z"></path> </symbol> <symbol id="ut-podcast" viewBox="0 0 24 28"> <title>podcast icon</title> <path d="M15.531 18.625c0 1.031-0.109 2.063-0.266 3.078-0.234 1.625-0.469 3.297-0.859 4.891-0.281 1.141-1.344 1.406-2.375 1.406s-2.094-0.266-2.375-1.406c-0.391-1.594-0.625-3.266-0.859-4.891-0.156-1.016-0.266-2.047-0.266-3.078 0-2.109 1.703-2.625 3.5-2.625s3.5 0.516 3.5 2.625zM24 12c0 5.063-3.125 9.391-7.562 11.156-0.172 0.063-0.359-0.094-0.328-0.281 0.047-0.328 0.094-0.672 0.156-1.031 0.031-0.25 0.063-0.5 0.094-0.734 0.016-0.094 0.063-0.156 0.141-0.187 3.25-1.656 5.5-5.031 5.5-8.922 0-5.703-4.781-10.297-10.547-9.984-5.281 0.281-9.484 4.781-9.453 10.063 0.031 3.891 2.297 7.25 5.563 8.875 0.078 0.031 0.125 0.109 0.141 0.187 0.031 0.219 0.063 0.453 0.094 0.703 0.063 0.375 0.109 0.719 0.172 1.062 0.031 0.187-0.172 0.344-0.344 0.266-4.641-1.813-7.875-6.438-7.609-11.766 0.297-6.047 5.172-11 11.219-11.375 6.969-0.438 12.766 5.094 12.766 11.969zM15.531 11.5c0 1.937-1.563 3.5-3.5 3.5s-3.5-1.563-3.5-3.5 1.563-3.5 3.5-3.5 3.5 1.563 3.5 3.5zM20.031 12c0 2.578-1.234 4.891-3.125 6.344-0.156 0.125-0.375 0.016-0.406-0.187-0.047-0.438-0.172-0.953-0.453-1.437-0.063-0.094-0.047-0.219 0.047-0.313 1.188-1.094 1.937-2.656 1.937-4.406 0-3.531-3.078-6.359-6.687-5.969-2.766 0.313-5.016 2.594-5.281 5.375-0.203 1.969 0.578 3.781 1.906 5 0.094 0.094 0.109 0.219 0.047 0.313-0.281 0.484-0.406 1-0.453 1.453-0.031 0.187-0.25 0.297-0.406 0.172-1.937-1.5-3.172-3.859-3.125-6.516 0.094-4.156 3.469-7.625 7.609-7.812 4.594-0.219 8.391 3.437 8.391 7.984z"></path> </symbol> <symbol id="ut-angle-down" viewBox="0 0 18 28"> <title>angle-down icon</title> <path d="M16.797 11.5c0 0.125-0.063 0.266-0.156 0.359l-7.281 7.281c-0.094 0.094-0.234 0.156-0.359 0.156s-0.266-0.063-0.359-0.156l-7.281-7.281c-0.094-0.094-0.156-0.234-0.156-0.359s0.063-0.266 0.156-0.359l0.781-0.781c0.094-0.094 0.219-0.156 0.359-0.156 0.125 0 0.266 0.063 0.359 0.156l6.141 6.141 6.141-6.141c0.094-0.094 0.234-0.156 0.359-0.156s0.266 0.063 0.359 0.156l0.781 0.781c0.094 0.094 0.156 0.234 0.156 0.359z"></path> </symbol> <symbol id="ut-angle-left" viewBox="0 0 11 28"> <title>angle-left icon</title> <path d="M9.797 8.5c0 0.125-0.063 0.266-0.156 0.359l-6.141 6.141 6.141 6.141c0.094 0.094 0.156 0.234 0.156 0.359s-0.063 0.266-0.156 0.359l-0.781 0.781c-0.094 0.094-0.234 0.156-0.359 0.156s-0.266-0.063-0.359-0.156l-7.281-7.281c-0.094-0.094-0.156-0.234-0.156-0.359s0.063-0.266 0.156-0.359l7.281-7.281c0.094-0.094 0.234-0.156 0.359-0.156s0.266 0.063 0.359 0.156l0.781 0.781c0.094 0.094 0.156 0.219 0.156 0.359z"></path> </symbol> <symbol id="ut-angle-right" viewBox="0 0 9 28"> <title>angle-right icon</title> <path d="M9.297 15c0 0.125-0.063 0.266-0.156 0.359l-7.281 7.281c-0.094 0.094-0.234 0.156-0.359 0.156s-0.266-0.063-0.359-0.156l-0.781-0.781c-0.094-0.094-0.156-0.219-0.156-0.359 0-0.125 0.063-0.266 0.156-0.359l6.141-6.141-6.141-6.141c-0.094-0.094-0.156-0.234-0.156-0.359s0.063-0.266 0.156-0.359l0.781-0.781c0.094-0.094 0.234-0.156 0.359-0.156s0.266 0.063 0.359 0.156l7.281 7.281c0.094 0.094 0.156 0.234 0.156 0.359z"></path> </symbol> <symbol id="ut-angle-up" viewBox="0 0 18 28"> <title>angle-up icon</title> <path d="M16.797 18.5c0 0.125-0.063 0.266-0.156 0.359l-0.781 0.781c-0.094 0.094-0.219 0.156-0.359 0.156-0.125 0-0.266-0.063-0.359-0.156l-6.141-6.141-6.141 6.141c-0.094 0.094-0.234 0.156-0.359 0.156s-0.266-0.063-0.359-0.156l-0.781-0.781c-0.094-0.094-0.156-0.234-0.156-0.359s0.063-0.266 0.156-0.359l7.281-7.281c0.094-0.094 0.234-0.156 0.359-0.156s0.266 0.063 0.359 0.156l7.281 7.281c0.094 0.094 0.156 0.234 0.156 0.359z"></path> </symbol> <symbol id="ut-ban" viewBox="0 0 24 28"> <title>ban icon</title> <path d="M20.5 13.953c0-1.703-0.5-3.281-1.359-4.609l-11.781 11.766c1.344 0.875 2.938 1.391 4.641 1.391 4.688 0 8.5-3.828 8.5-8.547zM4.891 18.625l11.797-11.781c-1.344-0.906-2.953-1.422-4.688-1.422-4.688 0-8.5 3.828-8.5 8.531 0 1.734 0.516 3.328 1.391 4.672zM24 13.953c0 6.656-5.375 12.047-12 12.047s-12-5.391-12-12.047c0-6.641 5.375-12.031 12-12.031s12 5.391 12 12.031z"></path> </symbol> <symbol id="ut-hamburger" viewBox="0 0 24 28"> <title>hamburger icon</title> <path d="M24 21v2c0 0.547-0.453 1-1 1h-22c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h22c0.547 0 1 0.453 1 1zM24 13v2c0 0.547-0.453 1-1 1h-22c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h22c0.547 0 1 0.453 1 1zM24 5v2c0 0.547-0.453 1-1 1h-22c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h22c0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-book" viewBox="0 0 26 28"> <title>book icon</title> <path d="M25.609 7.469c0.391 0.562 0.5 1.297 0.281 2.016l-4.297 14.156c-0.391 1.328-1.766 2.359-3.109 2.359h-14.422c-1.594 0-3.297-1.266-3.875-2.891-0.25-0.703-0.25-1.391-0.031-1.984 0.031-0.313 0.094-0.625 0.109-1 0.016-0.25-0.125-0.453-0.094-0.641 0.063-0.375 0.391-0.641 0.641-1.062 0.469-0.781 1-2.047 1.172-2.859 0.078-0.297-0.078-0.641 0-0.906 0.078-0.297 0.375-0.516 0.531-0.797 0.422-0.719 0.969-2.109 1.047-2.844 0.031-0.328-0.125-0.688-0.031-0.938 0.109-0.359 0.453-0.516 0.688-0.828 0.375-0.516 1-2 1.094-2.828 0.031-0.266-0.125-0.531-0.078-0.812 0.063-0.297 0.438-0.609 0.688-0.969 0.656-0.969 0.781-3.109 2.766-2.547l-0.016 0.047c0.266-0.063 0.531-0.141 0.797-0.141h11.891c0.734 0 1.391 0.328 1.781 0.875 0.406 0.562 0.5 1.297 0.281 2.031l-4.281 14.156c-0.734 2.406-1.141 2.938-3.125 2.938h-13.578c-0.203 0-0.453 0.047-0.594 0.234-0.125 0.187-0.141 0.328-0.016 0.672 0.313 0.906 1.391 1.094 2.25 1.094h14.422c0.578 0 1.25-0.328 1.422-0.891l4.688-15.422c0.094-0.297 0.094-0.609 0.078-0.891 0.359 0.141 0.688 0.359 0.922 0.672zM8.984 7.5c-0.094 0.281 0.063 0.5 0.344 0.5h9.5c0.266 0 0.562-0.219 0.656-0.5l0.328-1c0.094-0.281-0.063-0.5-0.344-0.5h-9.5c-0.266 0-0.562 0.219-0.656 0.5zM7.688 11.5c-0.094 0.281 0.063 0.5 0.344 0.5h9.5c0.266 0 0.562-0.219 0.656-0.5l0.328-1c0.094-0.281-0.063-0.5-0.344-0.5h-9.5c-0.266 0-0.562 0.219-0.656 0.5z"></path> </symbol> <symbol id="ut-bookmark" viewBox="0 0 20 28"> <title>bookmark icon</title> <path d="M18.188 2c0.234 0 0.469 0.047 0.688 0.141 0.688 0.266 1.125 0.906 1.125 1.609v20.141c0 0.703-0.438 1.344-1.125 1.609-0.219 0.094-0.453 0.125-0.688 0.125-0.484 0-0.938-0.172-1.297-0.5l-6.891-6.625-6.891 6.625c-0.359 0.328-0.812 0.516-1.297 0.516-0.234 0-0.469-0.047-0.688-0.141-0.688-0.266-1.125-0.906-1.125-1.609v-20.141c0-0.703 0.438-1.344 1.125-1.609 0.219-0.094 0.453-0.141 0.688-0.141h16.375z"></path> </symbol> <symbol id="ut-bug" viewBox="0 0 26 28"> <title>bug icon</title> <path d="M25.5 15c0 0.547-0.453 1-1 1h-3.5c0 1.953-0.422 3.422-1.047 4.531l3.25 3.266c0.391 0.391 0.391 1.016 0 1.406-0.187 0.203-0.453 0.297-0.703 0.297s-0.516-0.094-0.703-0.297l-3.094-3.078s-2.047 1.875-4.703 1.875v-14h-2v14c-2.828 0-4.891-2.063-4.891-2.063l-2.859 3.234c-0.203 0.219-0.469 0.328-0.75 0.328-0.234 0-0.469-0.078-0.672-0.25-0.406-0.375-0.438-1-0.078-1.422l3.156-3.547c-0.547-1.078-0.906-2.469-0.906-4.281h-3.5c-0.547 0-1-0.453-1-1s0.453-1 1-1h3.5v-4.594l-2.703-2.703c-0.391-0.391-0.391-1.016 0-1.406s1.016-0.391 1.406 0l2.703 2.703h13.188l2.703-2.703c0.391-0.391 1.016-0.391 1.406 0s0.391 1.016 0 1.406l-2.703 2.703v4.594h3.5c0.547 0 1 0.453 1 1zM18 6h-10c0-2.766 2.234-5 5-5s5 2.234 5 5z"></path> </symbol> <symbol id="ut-caret-down" viewBox="0 0 16 28"> <title>caret-down icon</title> <path d="M16 11c0 0.266-0.109 0.516-0.297 0.703l-7 7c-0.187 0.187-0.438 0.297-0.703 0.297s-0.516-0.109-0.703-0.297l-7-7c-0.187-0.187-0.297-0.438-0.297-0.703 0-0.547 0.453-1 1-1h14c0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-caret-left" viewBox="0 0 11 28"> <title>caret-left icon</title> <path d="M10 7v14c0 0.547-0.453 1-1 1-0.266 0-0.516-0.109-0.703-0.297l-7-7c-0.187-0.187-0.297-0.438-0.297-0.703s0.109-0.516 0.297-0.703l7-7c0.187-0.187 0.438-0.297 0.703-0.297 0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-caret-right" viewBox="0 0 9 28"> <title>caret-right icon</title> <path d="M9 14c0 0.266-0.109 0.516-0.297 0.703l-7 7c-0.187 0.187-0.438 0.297-0.703 0.297-0.547 0-1-0.453-1-1v-14c0-0.547 0.453-1 1-1 0.266 0 0.516 0.109 0.703 0.297l7 7c0.187 0.187 0.297 0.438 0.297 0.703z"></path> </symbol> <symbol id="ut-caret-up" viewBox="0 0 16 28"> <title>caret-up icon</title> <path d="M16 19c0 0.547-0.453 1-1 1h-14c-0.547 0-1-0.453-1-1 0-0.266 0.109-0.516 0.297-0.703l7-7c0.187-0.187 0.438-0.297 0.703-0.297s0.516 0.109 0.703 0.297l7 7c0.187 0.187 0.297 0.438 0.297 0.703z"></path> </symbol> <symbol id="ut-chain" viewBox="0 0 26 28"> <title>chain icon</title> <path d="M22.75 19c0-0.406-0.156-0.781-0.438-1.062l-3.25-3.25c-0.281-0.281-0.672-0.438-1.062-0.438-0.453 0-0.812 0.172-1.125 0.5 0.516 0.516 1.125 0.953 1.125 1.75 0 0.828-0.672 1.5-1.5 1.5-0.797 0-1.234-0.609-1.75-1.125-0.328 0.313-0.516 0.672-0.516 1.141 0 0.391 0.156 0.781 0.438 1.062l3.219 3.234c0.281 0.281 0.672 0.422 1.062 0.422s0.781-0.141 1.062-0.406l2.297-2.281c0.281-0.281 0.438-0.656 0.438-1.047zM11.766 7.984c0-0.391-0.156-0.781-0.438-1.062l-3.219-3.234c-0.281-0.281-0.672-0.438-1.062-0.438s-0.781 0.156-1.062 0.422l-2.297 2.281c-0.281 0.281-0.438 0.656-0.438 1.047 0 0.406 0.156 0.781 0.438 1.062l3.25 3.25c0.281 0.281 0.672 0.422 1.062 0.422 0.453 0 0.812-0.156 1.125-0.484-0.516-0.516-1.125-0.953-1.125-1.75 0-0.828 0.672-1.5 1.5-1.5 0.797 0 1.234 0.609 1.75 1.125 0.328-0.313 0.516-0.672 0.516-1.141zM25.75 19c0 1.188-0.484 2.344-1.328 3.172l-2.297 2.281c-0.844 0.844-1.984 1.297-3.172 1.297-1.203 0-2.344-0.469-3.187-1.328l-3.219-3.234c-0.844-0.844-1.297-1.984-1.297-3.172 0-1.234 0.5-2.406 1.375-3.266l-1.375-1.375c-0.859 0.875-2.016 1.375-3.25 1.375-1.188 0-2.344-0.469-3.187-1.313l-3.25-3.25c-0.859-0.859-1.313-1.984-1.313-3.187 0-1.188 0.484-2.344 1.328-3.172l2.297-2.281c0.844-0.844 1.984-1.297 3.172-1.297 1.203 0 2.344 0.469 3.187 1.328l3.219 3.234c0.844 0.844 1.297 1.984 1.297 3.172 0 1.234-0.5 2.406-1.375 3.266l1.375 1.375c0.859-0.875 2.016-1.375 3.25-1.375 1.188 0 2.344 0.469 3.187 1.313l3.25 3.25c0.859 0.859 1.313 1.984 1.313 3.187z"></path> </symbol> <symbol id="ut-check" viewBox="0 0 28 28"> <title>check icon</title> <path d="M26.109 8.844c0 0.391-0.156 0.781-0.438 1.062l-13.438 13.438c-0.281 0.281-0.672 0.438-1.062 0.438s-0.781-0.156-1.062-0.438l-7.781-7.781c-0.281-0.281-0.438-0.672-0.438-1.062s0.156-0.781 0.438-1.062l2.125-2.125c0.281-0.281 0.672-0.438 1.062-0.438s0.781 0.156 1.062 0.438l4.594 4.609 10.25-10.266c0.281-0.281 0.672-0.438 1.062-0.438s0.781 0.156 1.062 0.438l2.125 2.125c0.281 0.281 0.438 0.672 0.438 1.062z"></path> </symbol> <symbol id="ut-check-circle" viewBox="0 0 24 28"> <title>check-circle icon</title> <path d="M20.062 11.469c0-0.266-0.094-0.531-0.281-0.719l-1.422-1.406c-0.187-0.187-0.438-0.297-0.703-0.297s-0.516 0.109-0.703 0.297l-6.375 6.359-3.531-3.531c-0.187-0.187-0.438-0.297-0.703-0.297s-0.516 0.109-0.703 0.297l-1.422 1.406c-0.187 0.187-0.281 0.453-0.281 0.719s0.094 0.516 0.281 0.703l5.656 5.656c0.187 0.187 0.453 0.297 0.703 0.297 0.266 0 0.531-0.109 0.719-0.297l8.484-8.484c0.187-0.187 0.281-0.438 0.281-0.703zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-chevron-down" viewBox="0 0 28 28"> <title>chevron-down icon</title> <path d="M26.297 12.625l-11.594 11.578c-0.391 0.391-1.016 0.391-1.406 0l-11.594-11.578c-0.391-0.391-0.391-1.031 0-1.422l2.594-2.578c0.391-0.391 1.016-0.391 1.406 0l8.297 8.297 8.297-8.297c0.391-0.391 1.016-0.391 1.406 0l2.594 2.578c0.391 0.391 0.391 1.031 0 1.422z"></path> </symbol> <symbol id="ut-chevron-left" viewBox="0 0 21 28"> <title>chevron-left icon</title> <path d="M18.297 4.703l-8.297 8.297 8.297 8.297c0.391 0.391 0.391 1.016 0 1.406l-2.594 2.594c-0.391 0.391-1.016 0.391-1.406 0l-11.594-11.594c-0.391-0.391-0.391-1.016 0-1.406l11.594-11.594c0.391-0.391 1.016-0.391 1.406 0l2.594 2.594c0.391 0.391 0.391 1.016 0 1.406z"></path> </symbol> <symbol id="ut-chevron-right" viewBox="0 0 19 28"> <title>chevron-right icon</title> <path d="M17.297 13.703l-11.594 11.594c-0.391 0.391-1.016 0.391-1.406 0l-2.594-2.594c-0.391-0.391-0.391-1.016 0-1.406l8.297-8.297-8.297-8.297c-0.391-0.391-0.391-1.016 0-1.406l2.594-2.594c0.391-0.391 1.016-0.391 1.406 0l11.594 11.594c0.391 0.391 0.391 1.016 0 1.406z"></path> </symbol> <symbol id="ut-chevron-up" viewBox="0 0 28 28"> <title>chevron-up icon</title> <path d="M26.297 20.797l-2.594 2.578c-0.391 0.391-1.016 0.391-1.406 0l-8.297-8.297-8.297 8.297c-0.391 0.391-1.016 0.391-1.406 0l-2.594-2.578c-0.391-0.391-0.391-1.031 0-1.422l11.594-11.578c0.391-0.391 1.016-0.391 1.406 0l11.594 11.578c0.391 0.391 0.391 1.031 0 1.422z"></path> </symbol> <symbol id="ut-circle" viewBox="0 0 24 28"> <title>circle icon</title> <path d="M24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-circle-o" viewBox="0 0 24 28"> <title>circle-o icon</title> <path d="M12 5.5c-4.688 0-8.5 3.813-8.5 8.5s3.813 8.5 8.5 8.5 8.5-3.813 8.5-8.5-3.813-8.5-8.5-8.5zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12v0c6.625 0 12 5.375 12 12z"></path> </symbol> <symbol id="ut-clone" viewBox="0 0 28 28"> <title>clone icon</title> <path d="M26 25.5v-17c0-0.266-0.234-0.5-0.5-0.5h-17c-0.266 0-0.5 0.234-0.5 0.5v17c0 0.266 0.234 0.5 0.5 0.5h17c0.266 0 0.5-0.234 0.5-0.5zM28 8.5v17c0 1.375-1.125 2.5-2.5 2.5h-17c-1.375 0-2.5-1.125-2.5-2.5v-17c0-1.375 1.125-2.5 2.5-2.5h17c1.375 0 2.5 1.125 2.5 2.5zM22 2.5v2.5h-2v-2.5c0-0.266-0.234-0.5-0.5-0.5h-17c-0.266 0-0.5 0.234-0.5 0.5v17c0 0.266 0.234 0.5 0.5 0.5h2.5v2h-2.5c-1.375 0-2.5-1.125-2.5-2.5v-17c0-1.375 1.125-2.5 2.5-2.5h17c1.375 0 2.5 1.125 2.5 2.5z"></path> </symbol> <symbol id="ut-close" viewBox="0 0 22 28"> <title>close icon</title> <path d="M20.281 20.656c0 0.391-0.156 0.781-0.438 1.062l-2.125 2.125c-0.281 0.281-0.672 0.438-1.062 0.438s-0.781-0.156-1.062-0.438l-4.594-4.594-4.594 4.594c-0.281 0.281-0.672 0.438-1.062 0.438s-0.781-0.156-1.062-0.438l-2.125-2.125c-0.281-0.281-0.438-0.672-0.438-1.062s0.156-0.781 0.438-1.062l4.594-4.594-4.594-4.594c-0.281-0.281-0.438-0.672-0.438-1.062s0.156-0.781 0.438-1.062l2.125-2.125c0.281-0.281 0.672-0.438 1.062-0.438s0.781 0.156 1.062 0.438l4.594 4.594 4.594-4.594c0.281-0.281 0.672-0.438 1.062-0.438s0.781 0.156 1.062 0.438l2.125 2.125c0.281 0.281 0.438 0.672 0.438 1.062s-0.156 0.781-0.438 1.062l-4.594 4.594 4.594 4.594c0.281 0.281 0.438 0.672 0.438 1.062z"></path> </symbol> <symbol id="ut-download-cloud" viewBox="0 0 30 28"> <title>download-cloud icon</title> <path d="M20 14.5c0-0.281-0.219-0.5-0.5-0.5h-3.5v-5.5c0-0.266-0.234-0.5-0.5-0.5h-3c-0.266 0-0.5 0.234-0.5 0.5v5.5h-3.5c-0.281 0-0.5 0.234-0.5 0.5 0 0.125 0.047 0.266 0.141 0.359l5.5 5.5c0.094 0.094 0.219 0.141 0.359 0.141 0.125 0 0.266-0.047 0.359-0.141l5.484-5.484c0.094-0.109 0.156-0.234 0.156-0.375zM30 18c0 3.313-2.688 6-6 6h-17c-3.859 0-7-3.141-7-7 0-2.719 1.578-5.187 4.031-6.328-0.016-0.234-0.031-0.453-0.031-0.672 0-4.422 3.578-8 8-8 3.25 0 6.172 1.969 7.406 4.969 0.719-0.625 1.641-0.969 2.594-0.969 2.203 0 4 1.797 4 4 0 0.766-0.219 1.516-0.641 2.156 2.719 0.641 4.641 3.063 4.641 5.844z"></path> </symbol> <symbol id="ut-code" viewBox="0 0 30 28"> <title>code icon</title> <path d="M9.641 21.859l-0.781 0.781c-0.203 0.203-0.516 0.203-0.719 0l-7.281-7.281c-0.203-0.203-0.203-0.516 0-0.719l7.281-7.281c0.203-0.203 0.516-0.203 0.719 0l0.781 0.781c0.203 0.203 0.203 0.516 0 0.719l-6.141 6.141 6.141 6.141c0.203 0.203 0.203 0.516 0 0.719zM18.875 5.187l-5.828 20.172c-0.078 0.266-0.359 0.422-0.609 0.344l-0.969-0.266c-0.266-0.078-0.422-0.359-0.344-0.625l5.828-20.172c0.078-0.266 0.359-0.422 0.609-0.344l0.969 0.266c0.266 0.078 0.422 0.359 0.344 0.625zM29.141 15.359l-7.281 7.281c-0.203 0.203-0.516 0.203-0.719 0l-0.781-0.781c-0.203-0.203-0.203-0.516 0-0.719l6.141-6.141-6.141-6.141c-0.203-0.203-0.203-0.516 0-0.719l0.781-0.781c0.203-0.203 0.516-0.203 0.719 0l7.281 7.281c0.203 0.203 0.203 0.516 0 0.719z"></path> </symbol> <symbol id="ut-download" viewBox="0 0 26 28"> <title>download icon</title> <path d="M20 21c0-0.547-0.453-1-1-1s-1 0.453-1 1 0.453 1 1 1 1-0.453 1-1zM24 21c0-0.547-0.453-1-1-1s-1 0.453-1 1 0.453 1 1 1 1-0.453 1-1zM26 17.5v5c0 0.828-0.672 1.5-1.5 1.5h-23c-0.828 0-1.5-0.672-1.5-1.5v-5c0-0.828 0.672-1.5 1.5-1.5h7.266l2.109 2.125c0.578 0.562 1.328 0.875 2.125 0.875s1.547-0.313 2.125-0.875l2.125-2.125h7.25c0.828 0 1.5 0.672 1.5 1.5zM20.922 8.609c0.156 0.375 0.078 0.812-0.219 1.094l-7 7c-0.187 0.203-0.453 0.297-0.703 0.297s-0.516-0.094-0.703-0.297l-7-7c-0.297-0.281-0.375-0.719-0.219-1.094 0.156-0.359 0.516-0.609 0.922-0.609h4v-7c0-0.547 0.453-1 1-1h4c0.547 0 1 0.453 1 1v7h4c0.406 0 0.766 0.25 0.922 0.609z"></path> </symbol> <symbol id="ut-ellipsis" viewBox="0 0 22 28"> <title>ellipsis icon</title> <path d="M6 11.5v3c0 0.828-0.672 1.5-1.5 1.5h-3c-0.828 0-1.5-0.672-1.5-1.5v-3c0-0.828 0.672-1.5 1.5-1.5h3c0.828 0 1.5 0.672 1.5 1.5zM14 11.5v3c0 0.828-0.672 1.5-1.5 1.5h-3c-0.828 0-1.5-0.672-1.5-1.5v-3c0-0.828 0.672-1.5 1.5-1.5h3c0.828 0 1.5 0.672 1.5 1.5zM22 11.5v3c0 0.828-0.672 1.5-1.5 1.5h-3c-0.828 0-1.5-0.672-1.5-1.5v-3c0-0.828 0.672-1.5 1.5-1.5h3c0.828 0 1.5 0.672 1.5 1.5z"></path> </symbol> <symbol id="ut-envelope" viewBox="0 0 28 28"> <title>envelope icon</title> <path d="M28 11.094v12.406c0 1.375-1.125 2.5-2.5 2.5h-23c-1.375 0-2.5-1.125-2.5-2.5v-12.406c0.469 0.516 1 0.969 1.578 1.359 2.594 1.766 5.219 3.531 7.766 5.391 1.313 0.969 2.938 2.156 4.641 2.156h0.031c1.703 0 3.328-1.188 4.641-2.156 2.547-1.844 5.172-3.625 7.781-5.391 0.562-0.391 1.094-0.844 1.563-1.359zM28 6.5c0 1.75-1.297 3.328-2.672 4.281-2.438 1.687-4.891 3.375-7.313 5.078-1.016 0.703-2.734 2.141-4 2.141h-0.031c-1.266 0-2.984-1.437-4-2.141-2.422-1.703-4.875-3.391-7.297-5.078-1.109-0.75-2.688-2.516-2.688-3.938 0-1.531 0.828-2.844 2.5-2.844h23c1.359 0 2.5 1.125 2.5 2.5z"></path> </symbol> <symbol id="ut-warning" viewBox="0 0 28 28"> <title>warning icon</title> <path d="M16 21.484v-2.969c0-0.281-0.219-0.516-0.5-0.516h-3c-0.281 0-0.5 0.234-0.5 0.516v2.969c0 0.281 0.219 0.516 0.5 0.516h3c0.281 0 0.5-0.234 0.5-0.516zM15.969 15.641l0.281-7.172c0-0.094-0.047-0.219-0.156-0.297-0.094-0.078-0.234-0.172-0.375-0.172h-3.437c-0.141 0-0.281 0.094-0.375 0.172-0.109 0.078-0.156 0.234-0.156 0.328l0.266 7.141c0 0.203 0.234 0.359 0.531 0.359h2.891c0.281 0 0.516-0.156 0.531-0.359zM15.75 1.047l12 22c0.344 0.609 0.328 1.359-0.031 1.969s-1.016 0.984-1.719 0.984h-24c-0.703 0-1.359-0.375-1.719-0.984s-0.375-1.359-0.031-1.969l12-22c0.344-0.641 1.016-1.047 1.75-1.047s1.406 0.406 1.75 1.047z"></path> </symbol> <symbol id="ut-external-link" viewBox="0 0 28 28"> <title>external-link icon</title> <path d="M22 14.5v5c0 2.484-2.016 4.5-4.5 4.5h-13c-2.484 0-4.5-2.016-4.5-4.5v-13c0-2.484 2.016-4.5 4.5-4.5h11c0.281 0 0.5 0.219 0.5 0.5v1c0 0.281-0.219 0.5-0.5 0.5h-11c-1.375 0-2.5 1.125-2.5 2.5v13c0 1.375 1.125 2.5 2.5 2.5h13c1.375 0 2.5-1.125 2.5-2.5v-5c0-0.281 0.219-0.5 0.5-0.5h1c0.281 0 0.5 0.219 0.5 0.5zM28 1v8c0 0.547-0.453 1-1 1-0.266 0-0.516-0.109-0.703-0.297l-2.75-2.75-10.187 10.187c-0.094 0.094-0.234 0.156-0.359 0.156s-0.266-0.063-0.359-0.156l-1.781-1.781c-0.094-0.094-0.156-0.234-0.156-0.359s0.063-0.266 0.156-0.359l10.187-10.187-2.75-2.75c-0.187-0.187-0.297-0.438-0.297-0.703 0-0.547 0.453-1 1-1h8c0.547 0 1 0.453 1 1z"></path> </symbol> <symbol id="ut-eye" viewBox="0 0 28 28"> <title>eye icon</title> <path d="M26 15c-1.484-2.297-3.516-4.266-5.953-5.516 0.625 1.062 0.953 2.281 0.953 3.516 0 3.859-3.141 7-7 7s-7-3.141-7-7c0-1.234 0.328-2.453 0.953-3.516-2.438 1.25-4.469 3.219-5.953 5.516 2.672 4.125 6.984 7 12 7s9.328-2.875 12-7zM14.75 9c0-0.406-0.344-0.75-0.75-0.75-2.609 0-4.75 2.141-4.75 4.75 0 0.406 0.344 0.75 0.75 0.75s0.75-0.344 0.75-0.75c0-1.781 1.469-3.25 3.25-3.25 0.406 0 0.75-0.344 0.75-0.75zM28 15c0 0.391-0.125 0.75-0.313 1.078-2.875 4.734-8.141 7.922-13.687 7.922s-10.813-3.203-13.687-7.922c-0.187-0.328-0.313-0.688-0.313-1.078s0.125-0.75 0.313-1.078c2.875-4.719 8.141-7.922 13.687-7.922s10.813 3.203 13.687 7.922c0.187 0.328 0.313 0.688 0.313 1.078z"></path> </symbol> <symbol id="ut-eye-slash" viewBox="0 0 28 28"> <title>eye-slash icon</title> <path d="M8.672 20.859l1.219-2.203c-1.813-1.313-2.891-3.422-2.891-5.656 0-1.234 0.328-2.453 0.953-3.516-2.438 1.25-4.469 3.219-5.953 5.516 1.625 2.516 3.922 4.625 6.672 5.859zM14.75 9c0-0.406-0.344-0.75-0.75-0.75-2.609 0-4.75 2.141-4.75 4.75 0 0.406 0.344 0.75 0.75 0.75s0.75-0.344 0.75-0.75c0-1.797 1.469-3.25 3.25-3.25 0.406 0 0.75-0.344 0.75-0.75zM20.422 6.016c0 0.031 0 0.109-0.016 0.141-3.297 5.891-6.563 11.813-9.859 17.703l-0.766 1.391c-0.094 0.156-0.266 0.25-0.438 0.25-0.281 0-1.766-0.906-2.094-1.094-0.156-0.094-0.25-0.25-0.25-0.438 0-0.25 0.531-1.094 0.688-1.359-3.031-1.375-5.578-3.719-7.375-6.531-0.203-0.313-0.313-0.688-0.313-1.078 0-0.375 0.109-0.766 0.313-1.078 3.094-4.75 7.922-7.922 13.687-7.922 0.938 0 1.891 0.094 2.812 0.266l0.844-1.516c0.094-0.156 0.25-0.25 0.438-0.25 0.281 0 1.75 0.906 2.078 1.094 0.156 0.094 0.25 0.25 0.25 0.422zM21 13c0 2.906-1.797 5.5-4.5 6.531l4.375-7.844c0.078 0.438 0.125 0.875 0.125 1.313zM28 15c0 0.406-0.109 0.734-0.313 1.078-0.484 0.797-1.094 1.563-1.703 2.266-3.063 3.516-7.281 5.656-11.984 5.656l1.156-2.063c4.547-0.391 8.406-3.156 10.844-6.937-1.156-1.797-2.641-3.375-4.406-4.594l0.984-1.75c1.937 1.297 3.891 3.25 5.109 5.266 0.203 0.344 0.313 0.672 0.313 1.078z"></path> </symbol> <symbol id="ut-facebook" viewBox="0 0 16 28"> <title>facebook icon</title> <path d="M14.984 0.187v4.125h-2.453c-1.922 0-2.281 0.922-2.281 2.25v2.953h4.578l-0.609 4.625h-3.969v11.859h-4.781v-11.859h-3.984v-4.625h3.984v-3.406c0-3.953 2.422-6.109 5.953-6.109 1.687 0 3.141 0.125 3.563 0.187z"></path> </symbol> <symbol id="ut-github" viewBox="0 0 26 28"> <title>github icon</title> <path d="M10 19c0 1.141-0.594 3-2 3s-2-1.859-2-3 0.594-3 2-3 2 1.859 2 3zM20 19c0 1.141-0.594 3-2 3s-2-1.859-2-3 0.594-3 2-3 2 1.859 2 3zM22.5 19c0-2.391-1.453-4.5-4-4.5-1.031 0-2.016 0.187-3.047 0.328-0.812 0.125-1.625 0.172-2.453 0.172s-1.641-0.047-2.453-0.172c-1.016-0.141-2.016-0.328-3.047-0.328-2.547 0-4 2.109-4 4.5 0 4.781 4.375 5.516 8.188 5.516h2.625c3.813 0 8.188-0.734 8.188-5.516zM26 16.25c0 1.734-0.172 3.578-0.953 5.172-2.063 4.172-7.734 4.578-11.797 4.578-4.125 0-10.141-0.359-12.281-4.578-0.797-1.578-0.969-3.437-0.969-5.172 0-2.281 0.625-4.438 2.125-6.188-0.281-0.859-0.422-1.766-0.422-2.656 0-1.172 0.266-2.344 0.797-3.406 2.469 0 4.047 1.078 5.922 2.547 1.578-0.375 3.203-0.547 4.828-0.547 1.469 0 2.953 0.156 4.375 0.5 1.859-1.453 3.437-2.5 5.875-2.5 0.531 1.062 0.797 2.234 0.797 3.406 0 0.891-0.141 1.781-0.422 2.625 1.5 1.766 2.125 3.938 2.125 6.219z"></path> </symbol> <symbol id="ut-google-plus" viewBox="0 0 36 28"> <title>google-plus icon</title> <path d="M22.453 14.266c0 6.547-4.391 11.188-11 11.188-6.328 0-11.453-5.125-11.453-11.453s5.125-11.453 11.453-11.453c3.094 0 5.672 1.125 7.672 3l-3.109 2.984c-0.844-0.812-2.328-1.766-4.562-1.766-3.906 0-7.094 3.234-7.094 7.234s3.187 7.234 7.094 7.234c4.531 0 6.234-3.266 6.5-4.937h-6.5v-3.938h10.813c0.109 0.578 0.187 1.156 0.187 1.906zM36 12.359v3.281h-3.266v3.266h-3.281v-3.266h-3.266v-3.281h3.266v-3.266h3.281v3.266h3.266z"></path> </symbol> <symbol id="ut-heart" viewBox="0 0 28 28"> <title>heart icon</title> <path d="M14 26c-0.25 0-0.5-0.094-0.688-0.281l-9.75-9.406c-0.125-0.109-3.563-3.25-3.563-7 0-4.578 2.797-7.313 7.469-7.313 2.734 0 5.297 2.156 6.531 3.375 1.234-1.219 3.797-3.375 6.531-3.375 4.672 0 7.469 2.734 7.469 7.313 0 3.75-3.437 6.891-3.578 7.031l-9.734 9.375c-0.187 0.187-0.438 0.281-0.688 0.281z"></path> </symbol> <symbol id="ut-heart-o" viewBox="0 0 28 28"> <title>heart-o icon</title> <path d="M26 9.312c0-4.391-2.969-5.313-5.469-5.313-2.328 0-4.953 2.516-5.766 3.484-0.375 0.453-1.156 0.453-1.531 0-0.812-0.969-3.437-3.484-5.766-3.484-2.5 0-5.469 0.922-5.469 5.313 0 2.859 2.891 5.516 2.922 5.547l9.078 8.75 9.063-8.734c0.047-0.047 2.938-2.703 2.938-5.563zM28 9.312c0 3.75-3.437 6.891-3.578 7.031l-9.734 9.375c-0.187 0.187-0.438 0.281-0.688 0.281s-0.5-0.094-0.688-0.281l-9.75-9.406c-0.125-0.109-3.563-3.25-3.563-7 0-4.578 2.797-7.313 7.469-7.313 2.734 0 5.297 2.156 6.531 3.375 1.234-1.219 3.797-3.375 6.531-3.375 4.672 0 7.469 2.734 7.469 7.313z"></path> </symbol> <symbol id="ut-home" viewBox="0 0 26 28"> <title>home icon</title> <path d="M22 15.5v7.5c0 0.547-0.453 1-1 1h-6v-6h-4v6h-6c-0.547 0-1-0.453-1-1v-7.5c0-0.031 0.016-0.063 0.016-0.094l8.984-7.406 8.984 7.406c0.016 0.031 0.016 0.063 0.016 0.094zM25.484 14.422l-0.969 1.156c-0.078 0.094-0.203 0.156-0.328 0.172h-0.047c-0.125 0-0.234-0.031-0.328-0.109l-10.813-9.016-10.813 9.016c-0.109 0.078-0.234 0.125-0.375 0.109-0.125-0.016-0.25-0.078-0.328-0.172l-0.969-1.156c-0.172-0.203-0.141-0.531 0.063-0.703l11.234-9.359c0.656-0.547 1.719-0.547 2.375 0l3.813 3.187v-3.047c0-0.281 0.219-0.5 0.5-0.5h3c0.281 0 0.5 0.219 0.5 0.5v6.375l3.422 2.844c0.203 0.172 0.234 0.5 0.063 0.703z"></path> </symbol> <symbol id="ut-info-circle" viewBox="0 0 24 28"> <title>info-circle icon</title> <path d="M16 21.5v-2.5c0-0.281-0.219-0.5-0.5-0.5h-1.5v-8c0-0.281-0.219-0.5-0.5-0.5h-5c-0.281 0-0.5 0.219-0.5 0.5v2.5c0 0.281 0.219 0.5 0.5 0.5h1.5v5h-1.5c-0.281 0-0.5 0.219-0.5 0.5v2.5c0 0.281 0.219 0.5 0.5 0.5h7c0.281 0 0.5-0.219 0.5-0.5zM14 7.5v-2.5c0-0.281-0.219-0.5-0.5-0.5h-3c-0.281 0-0.5 0.219-0.5 0.5v2.5c0 0.281 0.219 0.5 0.5 0.5h3c0.281 0 0.5-0.219 0.5-0.5zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-instagram" viewBox="0 0 24 28"> <title>instagram icon</title> <path d="M16 14c0-2.203-1.797-4-4-4s-4 1.797-4 4 1.797 4 4 4 4-1.797 4-4zM18.156 14c0 3.406-2.75 6.156-6.156 6.156s-6.156-2.75-6.156-6.156 2.75-6.156 6.156-6.156 6.156 2.75 6.156 6.156zM19.844 7.594c0 0.797-0.641 1.437-1.437 1.437s-1.437-0.641-1.437-1.437 0.641-1.437 1.437-1.437 1.437 0.641 1.437 1.437zM12 4.156c-1.75 0-5.5-0.141-7.078 0.484-0.547 0.219-0.953 0.484-1.375 0.906s-0.688 0.828-0.906 1.375c-0.625 1.578-0.484 5.328-0.484 7.078s-0.141 5.5 0.484 7.078c0.219 0.547 0.484 0.953 0.906 1.375s0.828 0.688 1.375 0.906c1.578 0.625 5.328 0.484 7.078 0.484s5.5 0.141 7.078-0.484c0.547-0.219 0.953-0.484 1.375-0.906s0.688-0.828 0.906-1.375c0.625-1.578 0.484-5.328 0.484-7.078s0.141-5.5-0.484-7.078c-0.219-0.547-0.484-0.953-0.906-1.375s-0.828-0.688-1.375-0.906c-1.578-0.625-5.328-0.484-7.078-0.484zM24 14c0 1.656 0.016 3.297-0.078 4.953-0.094 1.922-0.531 3.625-1.937 5.031s-3.109 1.844-5.031 1.937c-1.656 0.094-3.297 0.078-4.953 0.078s-3.297 0.016-4.953-0.078c-1.922-0.094-3.625-0.531-5.031-1.937s-1.844-3.109-1.937-5.031c-0.094-1.656-0.078-3.297-0.078-4.953s-0.016-3.297 0.078-4.953c0.094-1.922 0.531-3.625 1.937-5.031s3.109-1.844 5.031-1.937c1.656-0.094 3.297-0.078 4.953-0.078s3.297-0.016 4.953 0.078c1.922 0.094 3.625 0.531 5.031 1.937s1.844 3.109 1.937 5.031c0.094 1.656 0.078 3.297 0.078 4.953z"></path> </symbol> <symbol id="ut-linkedin" viewBox="0 0 24 28"> <title>linkedin icon</title> <path d="M5.453 9.766v15.484h-5.156v-15.484h5.156zM5.781 4.984c0.016 1.484-1.109 2.672-2.906 2.672v0h-0.031c-1.734 0-2.844-1.188-2.844-2.672 0-1.516 1.156-2.672 2.906-2.672 1.766 0 2.859 1.156 2.875 2.672zM24 16.375v8.875h-5.141v-8.281c0-2.078-0.75-3.5-2.609-3.5-1.422 0-2.266 0.953-2.641 1.875-0.125 0.344-0.172 0.797-0.172 1.266v8.641h-5.141c0.063-14.031 0-15.484 0-15.484h5.141v2.25h-0.031c0.672-1.062 1.891-2.609 4.672-2.609 3.391 0 5.922 2.219 5.922 6.969z"></path> </symbol> <symbol id="ut-lock" viewBox="0 0 18 28"> <title>lock icon</title> <path d="M5 12h8v-3c0-2.203-1.797-4-4-4s-4 1.797-4 4v3zM18 13.5v9c0 0.828-0.672 1.5-1.5 1.5h-15c-0.828 0-1.5-0.672-1.5-1.5v-9c0-0.828 0.672-1.5 1.5-1.5h0.5v-3c0-3.844 3.156-7 7-7s7 3.156 7 7v3h0.5c0.828 0 1.5 0.672 1.5 1.5z"></path> </symbol> <symbol id="ut-medium" viewBox="0 0 28 28"> <title>medium icon</title> <path d="M9.328 6.578v18.328c0 0.484-0.234 0.938-0.766 0.938-0.187 0-0.359-0.047-0.516-0.125l-7.266-3.641c-0.438-0.219-0.781-0.781-0.781-1.25v-17.813c0-0.391 0.187-0.75 0.609-0.75 0.25 0 0.469 0.125 0.688 0.234l7.984 4c0.016 0.016 0.047 0.063 0.047 0.078zM10.328 8.156l8.344 13.531-8.344-4.156v-9.375zM28 8.437v16.469c0 0.516-0.297 0.875-0.812 0.875-0.266 0-0.516-0.078-0.734-0.203l-6.891-3.437zM27.953 6.563c0 0.063-8.078 13.172-8.703 14.172l-6.094-9.906 5.063-8.234c0.172-0.281 0.484-0.438 0.812-0.438 0.141 0 0.281 0.031 0.406 0.094l8.453 4.219c0.031 0.016 0.063 0.047 0.063 0.094z"></path> </symbol> <symbol id="ut-minus-circle" viewBox="0 0 24 28"> <title>minus-circle icon</title> <path d="M19 15v-2c0-0.547-0.453-1-1-1h-12c-0.547 0-1 0.453-1 1v2c0 0.547 0.453 1 1 1h12c0.547 0 1-0.453 1-1zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-send" viewBox="0 0 28 28"> <title>send icon</title> <path d="M27.563 0.172c0.328 0.234 0.484 0.609 0.422 1l-4 24c-0.047 0.297-0.234 0.547-0.5 0.703-0.141 0.078-0.313 0.125-0.484 0.125-0.125 0-0.25-0.031-0.375-0.078l-7.078-2.891-3.781 4.609c-0.187 0.234-0.469 0.359-0.766 0.359-0.109 0-0.234-0.016-0.344-0.063-0.391-0.141-0.656-0.516-0.656-0.938v-5.453l13.5-16.547-16.703 14.453-6.172-2.531c-0.359-0.141-0.594-0.469-0.625-0.859-0.016-0.375 0.172-0.734 0.5-0.922l26-15c0.156-0.094 0.328-0.141 0.5-0.141 0.203 0 0.406 0.063 0.562 0.172z"></path> </symbol> <symbol id="ut-pause-circle" viewBox="0 0 24 28"> <title>pause-circle icon</title> <path d="M11 18.5v-9c0-0.281-0.219-0.5-0.5-0.5h-4c-0.281 0-0.5 0.219-0.5 0.5v9c0 0.281 0.219 0.5 0.5 0.5h4c0.281 0 0.5-0.219 0.5-0.5zM18 18.5v-9c0-0.281-0.219-0.5-0.5-0.5h-4c-0.281 0-0.5 0.219-0.5 0.5v9c0 0.281 0.219 0.5 0.5 0.5h4c0.281 0 0.5-0.219 0.5-0.5zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-play-circle" viewBox="0 0 24 28"> <title>play-circle icon</title> <path d="M12 2c6.625 0 12 5.375 12 12s-5.375 12-12 12-12-5.375-12-12 5.375-12 12-12zM18 14.859c0.313-0.172 0.5-0.5 0.5-0.859s-0.187-0.688-0.5-0.859l-8.5-5c-0.297-0.187-0.688-0.187-1-0.016-0.313 0.187-0.5 0.516-0.5 0.875v10c0 0.359 0.187 0.688 0.5 0.875 0.156 0.078 0.328 0.125 0.5 0.125s0.344-0.047 0.5-0.141z"></path> </symbol> <symbol id="ut-plus-circle" viewBox="0 0 24 28"> <title>plus-circle icon</title> <path d="M19 15v-2c0-0.547-0.453-1-1-1h-4v-4c0-0.547-0.453-1-1-1h-2c-0.547 0-1 0.453-1 1v4h-4c-0.547 0-1 0.453-1 1v2c0 0.547 0.453 1 1 1h4v4c0 0.547 0.453 1 1 1h2c0.547 0 1-0.453 1-1v-4h4c0.547 0 1-0.453 1-1zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-question-circle" viewBox="0 0 24 28"> <title>question-circle icon</title> <path d="M14 21.5v-3c0-0.281-0.219-0.5-0.5-0.5h-3c-0.281 0-0.5 0.219-0.5 0.5v3c0 0.281 0.219 0.5 0.5 0.5h3c0.281 0 0.5-0.219 0.5-0.5zM18 11c0-2.859-3-5-5.688-5-2.547 0-4.453 1.094-5.797 3.328-0.141 0.219-0.078 0.5 0.125 0.656l2.063 1.563c0.078 0.063 0.187 0.094 0.297 0.094 0.141 0 0.297-0.063 0.391-0.187 0.734-0.938 1.047-1.219 1.344-1.437 0.266-0.187 0.781-0.375 1.344-0.375 1 0 1.922 0.641 1.922 1.328 0 0.812-0.422 1.219-1.375 1.656-1.109 0.5-2.625 1.797-2.625 3.313v0.562c0 0.281 0.219 0.5 0.5 0.5h3c0.281 0 0.5-0.219 0.5-0.5v0c0-0.359 0.453-1.125 1.188-1.547 1.188-0.672 2.812-1.578 2.812-3.953zM24 14c0 6.625-5.375 12-12 12s-12-5.375-12-12 5.375-12 12-12 12 5.375 12 12z"></path> </symbol> <symbol id="ut-quote-left" viewBox="0 0 26 28"> <title>quote-left icon</title> <path d="M12 15v6c0 1.656-1.344 3-3 3h-6c-1.656 0-3-1.344-3-3v-11c0-4.406 3.594-8 8-8h1c0.547 0 1 0.453 1 1v2c0 0.547-0.453 1-1 1h-1c-2.203 0-4 1.797-4 4v0.5c0 0.828 0.672 1.5 1.5 1.5h3.5c1.656 0 3 1.344 3 3zM26 15v6c0 1.656-1.344 3-3 3h-6c-1.656 0-3-1.344-3-3v-11c0-4.406 3.594-8 8-8h1c0.547 0 1 0.453 1 1v2c0 0.547-0.453 1-1 1h-1c-2.203 0-4 1.797-4 4v0.5c0 0.828 0.672 1.5 1.5 1.5h3.5c1.656 0 3 1.344 3 3z"></path> </symbol> <symbol id="ut-quote-right" viewBox="0 0 26 28"> <title>quote-right icon</title> <path d="M12 5v11c0 4.406-3.594 8-8 8h-1c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h1c2.203 0 4-1.797 4-4v-0.5c0-0.828-0.672-1.5-1.5-1.5h-3.5c-1.656 0-3-1.344-3-3v-6c0-1.656 1.344-3 3-3h6c1.656 0 3 1.344 3 3zM26 5v11c0 4.406-3.594 8-8 8h-1c-0.547 0-1-0.453-1-1v-2c0-0.547 0.453-1 1-1h1c2.203 0 4-1.797 4-4v-0.5c0-0.828-0.672-1.5-1.5-1.5h-3.5c-1.656 0-3-1.344-3-3v-6c0-1.656 1.344-3 3-3h6c1.656 0 3 1.344 3 3z"></path> </symbol> <symbol id="ut-rss-square" viewBox="0 0 24 28"> <title>rss-square icon</title> <path d="M8 20c0-1.109-0.891-2-2-2s-2 0.891-2 2 0.891 2 2 2 2-0.891 2-2zM13.484 21.469c-0.266-4.844-4.109-8.687-8.953-8.953-0.141-0.016-0.281 0.047-0.375 0.141s-0.156 0.219-0.156 0.359v2c0 0.266 0.203 0.484 0.469 0.5 3.203 0.234 5.781 2.812 6.016 6.016 0.016 0.266 0.234 0.469 0.5 0.469h2c0.141 0 0.266-0.063 0.359-0.156s0.156-0.234 0.141-0.375zM19.484 21.484c-0.266-8.125-6.844-14.703-14.969-14.969-0.156-0.016-0.266 0.031-0.359 0.141-0.094 0.094-0.156 0.219-0.156 0.359v2c0 0.266 0.219 0.484 0.484 0.5 6.484 0.234 11.766 5.516 12 12 0.016 0.266 0.234 0.484 0.5 0.484h2c0.141 0 0.266-0.063 0.359-0.156 0.109-0.094 0.156-0.219 0.141-0.359zM24 6.5v15c0 2.484-2.016 4.5-4.5 4.5h-15c-2.484 0-4.5-2.016-4.5-4.5v-15c0-2.484 2.016-4.5 4.5-4.5h15c2.484 0 4.5 2.016 4.5 4.5z"></path> </symbol> <symbol id="ut-search" viewBox="0 0 26 28"> <title>search icon</title> <path d="M18 13c0-3.859-3.141-7-7-7s-7 3.141-7 7 3.141 7 7 7 7-3.141 7-7zM26 26c0 1.094-0.906 2-2 2-0.531 0-1.047-0.219-1.406-0.594l-5.359-5.344c-1.828 1.266-4.016 1.937-6.234 1.937-6.078 0-11-4.922-11-11s4.922-11 11-11 11 4.922 11 11c0 2.219-0.672 4.406-1.937 6.234l5.359 5.359c0.359 0.359 0.578 0.875 0.578 1.406z"></path> </symbol> <symbol id="ut-share-alt" viewBox="0 0 24 28"> <title>share-alt icon</title> <path d="M19 16c2.766 0 5 2.234 5 5s-2.234 5-5 5-5-2.234-5-5c0-0.172 0.016-0.359 0.031-0.531l-5.625-2.812c-0.891 0.828-2.094 1.344-3.406 1.344-2.766 0-5-2.234-5-5s2.234-5 5-5c1.313 0 2.516 0.516 3.406 1.344l5.625-2.812c-0.016-0.172-0.031-0.359-0.031-0.531 0-2.766 2.234-5 5-5s5 2.234 5 5-2.234 5-5 5c-1.313 0-2.516-0.516-3.406-1.344l-5.625 2.812c0.016 0.172 0.031 0.359 0.031 0.531s-0.016 0.359-0.031 0.531l5.625 2.812c0.891-0.828 2.094-1.344 3.406-1.344z"></path> </symbol> <symbol id="ut-slack" viewBox="0 0 26 28"> <title>slack icon</title> <path d="M23.734 12.125c1.281 0 2.266 0.938 2.266 2.219 0 1-0.516 1.703-1.453 2.031l-2.688 0.922 0.875 2.609c0.078 0.234 0.109 0.484 0.109 0.734 0 1.234-1 2.266-2.234 2.266-0.984 0-1.859-0.609-2.172-1.547l-0.859-2.578-4.844 1.656 0.859 2.562c0.078 0.234 0.125 0.484 0.125 0.734 0 1.219-1 2.266-2.25 2.266-0.984 0-1.844-0.609-2.156-1.547l-0.859-2.547-2.391 0.828c-0.25 0.078-0.516 0.141-0.781 0.141-1.266 0-2.219-0.938-2.219-2.203 0-0.969 0.625-1.844 1.547-2.156l2.438-0.828-1.641-4.891-2.438 0.844c-0.25 0.078-0.5 0.125-0.75 0.125-1.25 0-2.219-0.953-2.219-2.203 0-0.969 0.625-1.844 1.547-2.156l2.453-0.828-0.828-2.484c-0.078-0.234-0.125-0.484-0.125-0.734 0-1.234 1-2.266 2.25-2.266 0.984 0 1.844 0.609 2.156 1.547l0.844 2.5 4.844-1.641-0.844-2.5c-0.078-0.234-0.125-0.484-0.125-0.734 0-1.234 1.016-2.266 2.25-2.266 0.984 0 1.859 0.625 2.172 1.547l0.828 2.516 2.531-0.859c0.219-0.063 0.438-0.094 0.672-0.094 1.219 0 2.266 0.906 2.266 2.156 0 0.969-0.75 1.781-1.625 2.078l-2.453 0.844 1.641 4.937 2.562-0.875c0.234-0.078 0.484-0.125 0.719-0.125zM11.328 16.219l4.844-1.641-1.641-4.922-4.844 1.672z"></path> </symbol> <symbol id="ut-snapchat" viewBox="0 0 26 28"> <title>snapchat icon</title> <path d="M13.25 2c2.812-0.031 5.141 1.547 6.312 4.078 0.359 0.766 0.422 1.953 0.422 2.797 0 1-0.078 1.984-0.141 2.984 0.125 0.063 0.297 0.109 0.438 0.109 0.562 0 1.031-0.422 1.594-0.422 0.531 0 1.297 0.375 1.297 1 0 1.5-3.141 1.219-3.141 2.531 0 0.234 0.094 0.453 0.187 0.672 0.75 1.641 2.172 3.219 3.859 3.922 0.406 0.172 0.812 0.266 1.25 0.359 0.281 0.063 0.438 0.266 0.438 0.547 0 1.062-2.703 1.5-3.422 1.609-0.313 0.484-0.078 1.625-0.906 1.625-0.641 0-1.281-0.203-1.969-0.203-0.328 0-0.656 0.016-0.969 0.078-1.859 0.313-2.484 2.312-5.531 2.312-2.938 0-3.641-2-5.453-2.312-0.328-0.063-0.656-0.078-0.984-0.078-0.703 0-1.375 0.234-1.937 0.234-0.875 0-0.609-1.156-0.938-1.656-0.719-0.109-3.422-0.547-3.422-1.609 0-0.281 0.156-0.484 0.438-0.547 0.438-0.094 0.844-0.187 1.25-0.359 1.672-0.688 3.125-2.281 3.859-3.922 0.094-0.219 0.187-0.438 0.187-0.672 0-1.313-3.156-1.062-3.156-2.516 0-0.609 0.719-1 1.266-1 0.484 0 0.969 0.406 1.578 0.406 0.172 0 0.344-0.031 0.5-0.109-0.063-0.984-0.141-1.969-0.141-2.969 0-0.844 0.063-2.047 0.422-2.812 1.375-2.969 3.703-4.047 6.813-4.078z"></path> </symbol> <symbol id="ut-ticket" viewBox="0 0 28 28"> <title>ticket icon</title> <path d="M16 7.063l4.937 4.937-8.937 8.937-4.937-4.937zM12.703 22.359l9.656-9.656c0.391-0.391 0.391-1.016 0-1.406l-5.656-5.656c-0.375-0.375-1.031-0.375-1.406 0l-9.656 9.656c-0.391 0.391-0.391 1.016 0 1.406l5.656 5.656c0.187 0.187 0.438 0.281 0.703 0.281s0.516-0.094 0.703-0.281zM26.594 12.406l-14.172 14.187c-0.781 0.766-2.063 0.766-2.828 0l-1.969-1.969c1.172-1.172 1.172-3.078 0-4.25s-3.078-1.172-4.25 0l-1.953-1.969c-0.781-0.766-0.781-2.047 0-2.828l14.172-14.156c0.766-0.781 2.047-0.781 2.828 0l1.953 1.953c-1.172 1.172-1.172 3.078 0 4.25s3.078 1.172 4.25 0l1.969 1.953c0.766 0.781 0.766 2.063 0 2.828z"></path> </symbol> <symbol id="ut-twitter" viewBox="0 0 26 28"> <title>twitter icon</title> <path d="M25.312 6.375c-0.688 1-1.547 1.891-2.531 2.609 0.016 0.219 0.016 0.438 0.016 0.656 0 6.672-5.078 14.359-14.359 14.359-2.859 0-5.516-0.828-7.75-2.266 0.406 0.047 0.797 0.063 1.219 0.063 2.359 0 4.531-0.797 6.266-2.156-2.219-0.047-4.078-1.5-4.719-3.5 0.313 0.047 0.625 0.078 0.953 0.078 0.453 0 0.906-0.063 1.328-0.172-2.312-0.469-4.047-2.5-4.047-4.953v-0.063c0.672 0.375 1.453 0.609 2.281 0.641-1.359-0.906-2.25-2.453-2.25-4.203 0-0.938 0.25-1.797 0.688-2.547 2.484 3.062 6.219 5.063 10.406 5.281-0.078-0.375-0.125-0.766-0.125-1.156 0-2.781 2.25-5.047 5.047-5.047 1.453 0 2.766 0.609 3.687 1.594 1.141-0.219 2.234-0.641 3.203-1.219-0.375 1.172-1.172 2.156-2.219 2.781 1.016-0.109 2-0.391 2.906-0.781z"></path> </symbol> <symbol id="ut-wheelchair" viewBox="0 0 24 28"> <title>wheelchair icon</title> <path d="M22.469 12.703c0.328 0.344 0.5 0.812 0.453 1.281l-0.688 8.609c-0.078 0.875-0.797 1.531-1.656 1.531-0.047 0-0.094 0-0.141-0.016-0.922-0.063-1.594-0.875-1.531-1.781l0.547-6.703-2.234 0.125c0.547 1.125 0.859 2.406 0.859 3.75 0 2.25-0.875 4.297-2.312 5.812l-2.141-2.141c0.875-0.969 1.422-2.266 1.422-3.672 0-3.031-2.453-5.484-5.469-5.484-1.422 0-2.703 0.547-3.687 1.437l-2.141-2.156c1.203-1.141 2.734-1.922 4.438-2.203l4.125-4.688-2.328-1.359-2.828 2.516c-0.688 0.625-1.734 0.562-2.344-0.125s-0.547-1.734 0.125-2.344l3.734-3.328c0.531-0.484 1.313-0.562 1.937-0.187 7.609 4.422 7.625 4.422 7.625 4.422 0.406 0.234 0.641 0.641 0.75 1.062 0.156 0.609 0.047 1.297-0.406 1.828l-3.203 3.625 5.797-0.313c0.484-0.031 0.953 0.141 1.297 0.5zM19.375 5.563c-1.531 0-2.781-1.234-2.781-2.781 0-1.531 1.25-2.781 2.781-2.781 1.547 0 2.797 1.25 2.797 2.781 0 1.547-1.25 2.781-2.797 2.781zM9.578 24.969c1.125 0 2.188-0.359 3.063-0.953l2.172 2.172c-1.437 1.141-3.266 1.813-5.234 1.813-4.703 0-8.516-3.813-8.516-8.5 0-1.984 0.672-3.797 1.813-5.25l2.172 2.172c-0.594 0.875-0.938 1.937-0.938 3.078 0 3.016 2.453 5.469 5.469 5.469z"></path> </symbol> <symbol id="ut-youtube" viewBox="0 0 28 28"> <title>youtube icon</title> <path d="M11.109 17.625l7.562-3.906-7.562-3.953v7.859zM14 4.156c5.891 0 9.797 0.281 9.797 0.281 0.547 0.063 1.75 0.063 2.812 1.188 0 0 0.859 0.844 1.109 2.781 0.297 2.266 0.281 4.531 0.281 4.531v2.125s0.016 2.266-0.281 4.531c-0.25 1.922-1.109 2.781-1.109 2.781-1.062 1.109-2.266 1.109-2.812 1.172 0 0-3.906 0.297-9.797 0.297v0c-7.281-0.063-9.516-0.281-9.516-0.281-0.625-0.109-2.031-0.078-3.094-1.188 0 0-0.859-0.859-1.109-2.781-0.297-2.266-0.281-4.531-0.281-4.531v-2.125s-0.016-2.266 0.281-4.531c0.25-1.937 1.109-2.781 1.109-2.781 1.062-1.125 2.266-1.125 2.812-1.188 0 0 3.906-0.281 9.797-0.281v0z"></path> </symbol> </defs> </svg> <a href="#main-content" class="visually-hidden focusable"> Skip to main content </a> <div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas> <section role="region" aria-label="University Brand Bar" class="ut-brandbar"> <div class="container-md"> <div class="row"> <div class="ut-logo--wrapper col order-md-2"> <a href="https://www.utexas.edu" class="ut-logo--shieldtexas"> <span class="img-fluid logo--formal"> <img src="/themes/custom/forty_acres/images/utexas-brandbar-shield.svg" alt="University of Texas at Austin - home"/> </span> </a> </div> </div> </div> </section> <header class="ut-header short_logo" role="banner" style=""> <div class="container-fluid"> <div class="row"> <div class="col-12"> <div class="ut-header-wrapper"> <button role="button" class="ut-btn--toggle" aria-haspopup="true" aria-controls="ut-main_menu-wrapper" aria-expanded="false" id="js-nav-toggle" href="#ut-main_menu-wrapper">MENU</button> </div> <div id="ut-main_menu-wrapper"> <div class="header-flex-wrapper"> <div class="region region-header-tertiary"> <div class="search-block-form block block-search block-search-form-block ut-search-form" data-drupal-selector="search-block-form" id="block-iso-search-form" role="search"> <form data-block="block-iso-search-form" action="/search/pages" method="get" id="search-block-form" accept-charset="UTF-8"> <div class="js-form-item form-item form-type-search js-form-type-search form-item-keys js-form-item-keys form-no-label"> <label for="edit-keys" class="visually-hidden">Search</label> <input title="Enter the terms you wish to search for." placeholder="Search the site..." data-drupal-selector="edit-keys" type="search" id="edit-keys" name="keys" value="" size="15" maxlength="128" class="form-search" /> </div> <div id="edit-search-actions" data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper"><input data-drupal-selector="edit-submit" type="submit" id="edit-submit" value="Search" class="button js-form-submit form-submit" /> <svg class="svg search"><use xlink:href="#ut-search"></use></svg> </div> </form> </div> </div> </div> <div class="region region-primary-menu"> <nav role="navigation" aria-label="Main Menu" id="block-accessible-main-menu"> <ul data-block="block-iso-main" class="main-menu__list iso-main-menu"> <a href="/"><img class="img-fluid ut-logo--main pl-4 p-2" src="/themes/iso/iso/images/logomain.png" alt="Home"/></a> <li class="main-menu__list-item"> <a href="/" class="main-menu__link" data-drupal-link-system-path="&lt;front&gt;">Home</a> </li> <li class="menu-item-has-children main-menu__list-item"> <a href="" tabindex="0" class="main-menu__link">Quick Links</a> <i class="icon subnav-trigger" aria-hidden="true" tabindex="0"> <svg class="svg angle-down"> <use xlink:href="#ut-angle-down"></use> </svg> </i> <div class="sub-nav-wrapper sub-nav"> <ul class='main-menu__list--subnav'> <li class="main-menu__list-item--subnav"> <a href="http://www.utexas.edu/cio" class="main-menu__link--subnav">Office of the CIO</a> </li> <li class="main-menu__list-item--subnav"> <a href="http://www.utexas.edu/cio/policies/" class="main-menu__link--subnav">University IT Policies</a> </li> <li class="main-menu__list-item--subnav"> <a href="https://utexas.kuali.co/ready/plans" class="main-menu__link--subnav">UT Austin Disaster Recovery Planning (UT Ready)</a> </li> <li class="main-menu__list-item--subnav"> <a href="https://forms.security.utexas.edu/acceptable_use/about" class="main-menu__link--subnav">Acceptable Use Acknowledgement Form (for staff/faculty)</a> </li> <li class="main-menu__list-item--subnav"> <a href="https://forms.security.utexas.edu/misc/exception" class="main-menu__link--subnav">Security Exception Request</a> </li> <li class="main-menu__list-item--subnav"> <a href="https://forms.security.utexas.edu/misc/theft" class="main-menu__link--subnav">Stolen Equipment Report Form</a> </li> <li class="main-menu__list-item--subnav"> <a href="https://forms.security.utexas.edu/engagement_requests/engagement" class="main-menu__link--subnav">Engagement Request Form</a> </li> <li class="main-menu__list-item--subnav"> <a href="/education-outreach/anti-virus" class="main-menu__link--subnav">Anti-Virus Software</a> </li> <li class="main-menu__list-item--subnav"> <a href="/hall-of-fame" class="main-menu__link--subnav">Hall of Fame</a> </li> <li class="main-menu__list-item--subnav"> <a href="/future-cybersecurity-opportunities" class="main-menu__link--subnav">Why You Should Work In Cybersecurity</a> </li> </ul> </div> </li> <li class="menu-item-has-children main-menu__list-item"> <a href="/policies" class="main-menu__link">Policies</a> <i class="icon subnav-trigger" aria-hidden="true" tabindex="0"> <svg class="svg angle-down"> <use xlink:href="#ut-angle-down"></use> </svg> </i> <div class="sub-nav-wrapper sub-nav"> <ul class='main-menu__list--subnav'> <li class="main-menu__list-item--subnav"> <a href="/policies/irusp" class="main-menu__link--subnav">Information Resources Use and Security Policy</a> </li> <li class="main-menu__list-item--subnav"> <a href="/policies/irusp#standard2" class="main-menu__link--subnav">Acceptable Use Policy for University Employees</a> </li> <li class="main-menu__list-item--subnav"> <a href="/policies/aup" class="main-menu__link--subnav">Acceptable Use Policy for University Students</a> </li> <li class="main-menu__list-item--subnav"> <a href="/policies/DMCA" class="main-menu__link--subnav">Digital Millennium Copyright Act</a> </li> <li class="main-menu__list-item--subnav"> <a href="/policies" class="main-menu__link--subnav">Policies, Standards, and Guidelines Continued</a> </li> <li class="main-menu__list-item--subnav"> <a href="/content/min-security-standards" class="main-menu__link--subnav">Minimum Security Standards</a> </li> </ul> </div> </li> <li class="menu-item-has-children main-menu__list-item"> <a href="" tabindex="0" class="main-menu__link">Support Topics</a> <i class="icon subnav-trigger" aria-hidden="true" tabindex="0"> <svg class="svg angle-down"> <use xlink:href="#ut-angle-down"></use> </svg> </i> <div class="sub-nav-wrapper sub-nav"> <ul class='main-menu__list--subnav'> <li class="main-menu__list-item--subnav"> <a href="/Protect-Your-Privacy" class="main-menu__link--subnav">Security Awareness</a> </li> <li class="main-menu__list-item--subnav"> <a href="/personal/credentials" class="main-menu__link--subnav">Compromised Credentials</a> </li> <li class="main-menu__list-item--subnav"> <a href="/education-outreach" class="main-menu__link--subnav">EDUCATION &amp; OUTREACH</a> </li> <li class="main-menu__list-item--subnav"> <a href="/education-outreach/anti-virus" class="main-menu__link--subnav">GETTING ANTI-VIRUS</a> </li> <li class="main-menu__list-item--subnav"> <a href="/education-outreach/isora" class="main-menu__link--subnav">ISORA</a> </li> <li class="main-menu__list-item--subnav"> <a href="/procedures" class="main-menu__link--subnav">PROCEDURAL DOCUMENTATION</a> </li> <li class="main-menu__list-item--subnav"> <a href="/education-outreach/stache-basics" class="main-menu__link--subnav">Stache Basics</a> </li> <li class="main-menu__list-item--subnav"> <a href="/vmp" class="main-menu__link--subnav">VULNERABILITY MANAGEMENT PROGRAM</a> </li> <li class="main-menu__list-item--subnav"> <a href="/improve-security-posture" class="main-menu__link--subnav">WAYS TO IMPROVE YOUR SECURITY POSTURE - IT SUPPORT COMMUNITY</a> </li> </ul> </div> </li> <li class="main-menu__list-item"> <a href="/violation" class="main-menu__link">Report Violation</a> </li> <li class="main-menu__list-item"> <a href="/contact" class="main-menu__link">Contact</a> </li> </ul> </nav> <div id="block-iso-page-title" class="block block-core block-page-title-block clearfix"> <h1><span>Acceptable Use Policy for University Students</span> </h1> </div> </div> </div> </div> </div> </div> </header> <div class="region region-page-title"> <div id="block-pagetitle" class="block block-core block-page-title-block clearfix"> <h1><span>Acceptable Use Policy for University Students</span> </h1> </div> </div> <div class="container"> <div class="row"> <div class="col-sm-12"> <div class="region region-breadcrumb"> <div id="block-iso-breadcrumbs" class="block block-system block-system-breadcrumb-block clearfix"> <nav role="navigation" aria-labelledby="system-breadcrumb"> <h2 id="system-breadcrumb" class="visually-hidden">Breadcrumb</h2> <ul> <li> <a href="/">Home</a> </li> <li> <a href="/policies">ISO Policies, Standards, and Guidelines</a> </li> <li> Acceptable Use Policy for University Students </li> </ul> </nav> </div> </div> </div> </div> </div> <div class="container"> <div class="row"> <div class="col-sm-12"> <div class="region region-highlighted"> </div> </div> </div> </div> <main role="main" class="layout-content col"> <a id="main-content" tabindex="-1"></a> <div class="region region-content"> <div id="block-iso-main-page-content" class="block block-system block-system-main-block clearfix"> <article class="node node--type-iso-page node--view-mode-full"> <div class="node__content"> <div class="container layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="container block block-layout-builder block-extra-field-blocknodeiso-pagelinks clearfix"> </div> <div class="container block block-layout-builder block-field-blocknodeiso-pagebody clearfix"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="container "> <div class="col col-md-offset-2 col-sm-offset-2"> <div class="nd-title "><h3>Table of Contents</h3> </div> <div class="html-container "><div><ul> <li> <div><u><a href="#section1" target="_self">Purpose</a></u></div> </li> <li> <div><u><a href="#section2" target="_self">Audience</a></u></div> </li> <li> <div><u><a href="#section3" target="_self">Privacy Expectations</a></u></div> </li> <li> <div><u><a href="#section4" target="_self">Responsibilities</a></u></div> </li> <li> <div><u><a href="#section5" target="_self">Requirements</a></u></div> </li> <li> <div><u><a href="https://security.utexas.edu/policies/aup#section7" target="_self">Disciplinary</a><a href="https://security.utexas.edu/policies/aup#section7" target="_self"> </a><a href="https://security.utexas.edu/policies/aup#section7" target="_self">Actions</a></u></div> </li> <li> <div><u><a href="https://security.utexas.edu/policies/aup#section8" target="_self">Authoritative</a><a href="https://security.utexas.edu/policies/aup#section8" target="_self"> </a><a href="https://security.utexas.edu/policies/aup#section8" target="_self">Source</a></u></div> </li> <li> <div><u><a href="https://security.utexas.edu/policies/aup#section9" target="_self">Revision</a><a href="https://security.utexas.edu/policies/aup#section9" target="_self"> </a><a href="https://security.utexas.edu/policies/aup#section9" target="_self">History</a></u></div> </li> <li> <div><u><a href="https://security.utexas.edu/policies/aup#section10" target="_self">Approvals</a></u></div> </li></ul></div></div> </div> <div class="col col-md-offset-2 col-sm-offset-2"> <div class="nd-title " id="section1"><h3>1. Purpose</h3> </div> <div class="html-container "><div>The UT Austin Acceptable Use Policy serves as a supplement to the UT Austin <u><a href="https://security.utexas.edu/policies/irusp">Information Resources Use and Security Policy</a></u>. University <a href="https://www.utexas.edu/its/glossary/#GL_Information_Technology_Resources"><u>information resources</u></a> consist of the computer devices, data, applications, and the supporting networking infrastructure. These technologies are critical to the multifaceted mission of the university, a mission that includes teaching, research, and public service.</div><div>&nbsp;</div><div>While these resources help the university function, they also require responsible use from every user. Your actions can affect people all around the world. You must use these technologies responsibly and with respect.</div><div>&nbsp;</div><div>This policy establishes guidelines and best practices for acceptable use of information resources. It includes examples of what you can do and cannot do, and what rights you have. All of these guidelines are based on the following underlying principles:</div><div>&nbsp;</div><ul> <li>Information resources are provided to support the essential mission of UT Austin.</li> <li>UT Austin policies, UT System rules, state and federal law govern your use of information resources.</li> <li>The information resources infrastructure is provided for the entire campus. This infrastructure is finite and requires millions of dollars to maintain, and all users are expected to use it responsibly.</li></ul><div>&nbsp;</div><div>All guidelines in this document are based on these important principles. In many cases, they are similar to guidelines governing other forms of communication at the university.</div><p><strong>Definitions</strong>:</p><ul> <li><u>University</u>: The University of Texas at Austin.</li> <li><u>System</u>: The University of Texas System.</li> <li><u>University Information Resources</u>: All computer and telecommunications equipment, software, data, and media, owned or controlled by University or maintained on its behalf.</li> <li><u>University Data</u>: All data or information held on behalf of University, created as result and/or in support of University business, or residing on University Information Resources, including paper records.</li> <li><u>Confidential Data or Confidential Information</u>: All University Data that is required to be maintained as private or confidential by applicable law.</li> <li><u>User</u>: Any individual granted access to University Information Resources.&nbsp;</li></ul><div>&nbsp;</div><p>&nbsp;</p></div> <div class="nd-title " id="section2"><h3>2. Audience</h3> </div> <div class="html-container "><p>All university students granted access to or use of university Information Resources must be aware of and agree to abide by the following acceptable use requirements:</p><p>&nbsp;</p></div> <div class="nd-title " id="section3"><h3>3. Privacy Expectations</h3> </div> <div class="html-container "><div>As a user of information resources at the university, there are certain things you can expect.</div><div>&nbsp;</div><div>&nbsp;</div><div><a name="section3.1"></a><strong>3.1. Are my e-mails private?</strong></div><div>&nbsp;</div><div>In general, electronic communications transmitted across a network should never be considered private or confidential. When you are considering the safety and security of a communication, it is best to think of e-mail and instant messages like postcards—viewable by anyone with access.</div><div>&nbsp;</div><div>E-mails sent or received by Users in the course of conducting University business are University Data that are subject to state records retention and security requirements.</div><div><br>Users who are University employees are to use University provided e-mail accounts, rather than personal e-mail accounts, for conducting University business.&nbsp;</div><div>&nbsp;</div><div><a name="section3.2"></a><strong>3.2. Are my files private?</strong></div><div>&nbsp;</div><div>The University respects the contents of your files and monitors the University network in accordance with the UT Austin <a href="https://security.utexas.edu/policies/monitoring"><u>Network Monitoring Standards</u></a>. Additionally, Information Technology (IT) administrators may become aware of file content while dealing with specific operational problems. Usage logs are frequently kept to diagnose such problems. Furthermore, the University will comply with the lawful orders of courts, such as subpoenas and search warrants. This compliance has included providing, when required, copies of system files, e-mail content, or other information ordered by the court.</div><div>&nbsp;</div><div>The University does not monitor personal Web pages for the purpose of determining content. However, when credible evidence of illegal or otherwise impermissible activity is reported, appropriate action will be taken.</div><div>&nbsp;</div><div>The University does not review electronic communication for the purpose of determining whether impermissible activity is occurring. However, in the course of assuring the viability of the University's network, IT administrators may become aware of activity that poses a risk to the network's proper operation. In such cases, IT administrators may need to disable or block access to the services or systems involved if they are deemed to pose a risk to the network's&nbsp;optimal performance. Also, during the process of diagnosing potential problems involving the proper function of the network, any information obtained that indicates possible unauthorized distribution of copyrighted materials may be referred to the UT <a href="https://security.utexas.edu/"><u>Information Security Office</u></a> for further investigation.</div><div>&nbsp;</div><div>University Information Resources are provided to users for the purpose of conducting the business of University and/or System. However, users are permitted to use University Information Resources for use that is incidental to the their official duties to the University as permitted by this policy.&nbsp; Users who are University employees, including student employees, or who are otherwise serving as an agent or are working on behalf of the University have no expectation of privacy regarding any University Data they create, send, receive, or store on University owned computers, servers, or other information resources owned by, or held on behalf, of University. University may access and monitor its Information Resources for any purpose consistent with University’s duties and/or mission without notice.&nbsp; Users who are faculty and staff have no expectation of privacy regarding any University Data residing on personally owned devices, regardless of why the Data was placed on the personal device.<br>&nbsp;</div><div>&nbsp;</div><div><a name="section3.3"></a><strong>3.3. What rules govern speech made using University information resources?</strong></div><div>&nbsp;</div><div>The University’s policy on Speech, Expression, and Assembly is set forth in <u><a href="https://catalog.utexas.edu/general-information/appendices/appendix-c/speech-expression-and-assembly/">Chapter 13 of the University’s Institutional Rules</a></u>, including the University’s regulations on prohibited expression.&nbsp; Chapter 13 applies to all speech on campus, including speech made using University information resources.&nbsp; Although this IT policy describes additional best practices concerning certain speech and expressive activities, such practices are aspirational.&nbsp; Chapter 13 determines what will constitute a violation of University standards for speech, expression, and assembly and when such violations will subject a student to discipline.</div><div>&nbsp;</div></div> <div class="nd-title " id="section4"><h3>4. Responsibilities</h3> </div> <div class="html-container "><div><div>Just as everyone in the university community is expected to use physical resources at UT Austin responsibly, we are all expected to help protect information resources at UT Austin. Protecting information resources is not the sole responsibility of IT administrators, any more than taking care of books is singularly the responsibility of librarians.</div><div>&nbsp;</div><div>&nbsp;</div><div><a name="section4.1"></a><strong>4.1. Protecting IT Resources from Physical &amp; Electronic Access</strong></div><div>&nbsp;</div><div>You are responsible for the use of the University information resources you have been provided.</div><div>&nbsp;</div><div>You must control unauthorized use of your University information resources by preventing others from obtaining access to your computer, or to the access port assigned for your exclusive use.</div><div>&nbsp;</div><div>Likewise, you are responsible for protecting your information resources from unauthorized electronic access by using effective passwords (or other access controls) and by safeguarding those passwords.</div><div>&nbsp;</div><div>Although you may believe that the data you store on a UT Austin computer system need no protection from access, remember that an insecure account may provide an access point for the entire computer system. Persons attempting to gain unauthorized access to a system do so through user accounts, and your password may be the only safeguard against such access.</div><div>&nbsp;</div><div><a id="section4.2" name="section4.2"></a><strong>4.2. Using Electronic Communications Responsibly</strong></div><div>&nbsp;</div><div>All members of the University community are encouraged to use electronic communications for university-related activities and to facilitate the efficient exchange of useful information. However, access to the University's electronic communications services is a privilege, and certain responsibilities accompany that privilege. People who use University communication services (such as e-mail) are expected to use them in an ethical and responsible manner, following general guidelines based on ethics and responsibility applied to the networked computing environment.</div><div>&nbsp;</div><div>Electronic communications should meet the same standards for distribution or display as if they were tangible documents or instruments. Identify yourself clearly and accurately in all electronic communications. Concealing or misrepresenting your name or affiliation to dissociate yourself from responsibility for your actions is never excusable.</div><div>&nbsp;</div><div>All stored electronic correspondence belongs to somebody. It should be assumed to be private and confidential unless the owner has explicitly made it available to others.</div><div>&nbsp;</div><div><a id="section4.3" name="section4.3"></a><strong>4.3. Using Limited Resources Responsibly, Efficiently, and Fairly</strong></div><div>&nbsp;</div><div>You are expected to promote efficient use of network resources, consistent with the instructional, research, public service, and administrative goals of the University. Show consideration for others and refrain from engaging in any use that would interfere with their work or disrupt the intended use of network resources.</div><div>&nbsp;</div><div>It is not responsible to use disproportionate amounts of information resources. Examples of disproportionate uses generally include activities such as the misuse of peer-to-peer (P2P) applications, streaming media at high bit rates, or serving a multi-user game.</div><div>&nbsp;</div><div>&nbsp;</div><div><a id="section4.4" name="section4.4"></a><strong>4.4. Complying with the Terms of the Acceptable Use Policy</strong></div><div>&nbsp;</div><div>As a member of the University, you are expected to read, understand, and comply with the terms of the Acceptable Use Policy. If you have questions, ask for clarification from your local IT support contact or from the Information Security Office.</div><div>&nbsp;</div><div>&nbsp;</div><div><a id="section4.5" name="section4.5"></a><strong>4.5. Complying with University Rules and Federal Laws</strong></div><div>&nbsp;</div><div>As a member of the University, you are expected to comply with all applicable University regulations and federal and state laws. The University of Texas at Austin reserves the right to terminate computing services of users who repeatedly violate university rules or infringe upon the rights of copyright holders. If you have questions about whether you may be infringing on another's copyright, please review <a href="http://www.lib.utsystem.edu/copyright/"><u>Crash Course in Copyright from UT System</u></a>.</div><div>&nbsp;</div></div></div> <div class="nd-title " id="section5"><h3>5. Requirements </h3> </div> <div class="html-container "><div><div><div><p><a id="5.1" name="5.1"></a><strong>5.1</strong> You are the only person who can use an information resource (such as an electronic identifier or an electronic mail account) that the University has provided for your exclusive use.<br><br><a id="5.2" name="5.2"></a><strong>5.2</strong> <strong>NEVER GIVE YOUR PASSWORD TO ANYONE ELSE</strong>, even people you trust, such as your friends or relatives or someone who has offered to help you fix a problem. If you suspect someone may have discovered or guessed your password, <a href="https://idmanager.its.utexas.edu/eid_self_help/"><u>change it immediately</u></a>.</p><ol> <li> <p>&nbsp;University issued or required passwords, including digital certificate passwords, Personal Identification Numbers (PIN), Digital Certificates, Identification Cards, Security Tokens (i.e. Smartcard), or similar information or devices used for identification and authorization purposes shall be maintained securely and shall not be shared or disclosed to anyone.</p> </li> <li> <p>Users must not give others access to University Information Resources unless they are authorized and authenticated for such access. Users may not extend access to University information resources to others without permission (e.g., proxy services, accounts for non-university personnel, etc).</p> </li> <li> <p>Each User will be held responsible for all activities conducted using the User’s password or other credentials.</p> </li></ol><p><a id="5.3" name="5.3"></a><strong>5.3</strong> Do not give others access to University information resources unless they are authorized and authenticated to do so. You may not extend access to University information resources to others without permission (e.g., proxy services, accounts for non-university personnel, etc).</p><p><a id="5.4" name="5.4"></a><strong>5.4</strong> Incidental Use of University Information Resources is permitted, but must not interfere with User’s performance of official University business, result in direct costs to the University, expose the University to unnecessary risks, or violate applicable laws or other University or System policy.</p><ol> <li> <p>Users must understand that they have no expectation of privacy in any personal information stored by a User on a System Information Resource, including University e-mail accounts.</p> </li> <li> <p>A User’s incidental personal use of Information Resources does not extend to the User’s family members or others regardless of where the Information Resource is physically located.</p> </li> <li> <p>Incidental Use to conduct or promote the User’s outside employment, including self-employment, is prohibited.</p> </li> <li> <p>Users may not be paid, or otherwise profit, from the use of any university-provided information resource or from any output produced using it. Users may not promote any commercial activity using university information resources. Examples include, attempting to sell football tickets or used text books via the UT course management service or advertising a "Make Money Fast" scheme via a newsgroup. Such promotions are considered unsolicited commercial spam and may be illegal as well.</p> </li> <li> <p>Incidental Use for purposes of political lobbying or campaigning is prohibited.</p> </li> <li> <p>Storage of any e-mail messages, voice messages, files, or documents created as Incidental Use by a User must be nominal.</p> </li></ol><p><a id="5.5" name="5.5"></a><strong>5.5</strong> Never use any university-provided information resource to do something illegal or deliberately destructive—not even as a joke. The Information Security Office will investigate all complaints. The Office of the Dean of Students handles complaints about students; the Office of the Executive Vice President and Provost handles complaints about UT Austin faculty and staff. Violations can result in disciplinary action, criminal charges, or both. Law enforcement agencies will investigate violations of state or federal law.</p><ol> <li>Ignorance is no excuse. Read the <a href="https://security.utexas.edu/policies/computercrimes">Computer Crimes Law</a>.</li> <li>Never deliberately install any unauthorized or malicious software on any system.</li> <li>You cannot be exempt from the law because you are "just a student," "you were conducting research," or you were "just playing around."</li> <li>If you are a student with a part-time job at the university, you may be disciplined both as an employee and as a student, resulting in both professional and educational consequences.</li></ol><p><a id="5.6" name="5.6"></a><strong>5.6</strong> <u><a href="https://catalog.utexas.edu/general-information/appendices/appendix-c/speech-expression-and-assembly/">Chapter 13 of the University’s <em>Institutional Rules</em></a></u> applies to communication using university-provided IT resources..</p><ol> <li>If someone asks you to stop communicating with them, you should. If you fail to do so, the person can file a complaint and you can be disciplined.</li> <li>If you believe that communication you receive violates the University’s <em>Institutional Rules</em>, and you wish to make a complaint, you may request a University staff member assist you in filing a complaint. Please report the problem to Student Judicial Services at 471-2841, or contact the Information Security Office at <a href="mailto:abuse@utexas.edu">security@utexas.edu</a>. If you are concerned for your safety or feel that you are in danger, call the UT police department at 471-4441, or call the Austin police if you are off-campus.</li></ol><p><a id="5.7" name="5.7"></a><strong>5.7</strong> Use resources appropriately. Do not interfere with the activities of others or use a disproportionate share of information resources. Examples of inappropriate use of resources are shown below. These actions frequently result in complaints and subsequent disciplinary action.</p><ol> <li>Sending an unsolicited message(s) to a large number of recipients (known as "spamming the network").</li> <li>Consuming an unauthorized disproportionate share of networking resources (e.g., misuse of peer-to-peer applications).</li> <li>Deliberately causing any denial of service, including flooding, ICMP attacks, or the unauthorized automated use of a service intended solely for human interaction.</li></ol><p><a id="5.8" name="5.8"></a><strong>5.8</strong> Never falsify your identity or enable others to falsify identity using University information resources. This type of forgery can result in serious criminal penalties and disciplinary action by the Office of the Dean of Students or the Office of the Executive Vice President and Provost.</p><ol> <li>All electronic correspondence must correctly identify the sender.</li> <li>All electronic correspondence belongs to someone and should be treated as private communications unless the author has explicitly made them available to others.</li> <li>The following email activities are prohibited when using a University provided email account: <ol> <li>Sending an email under another individual’s name or email address, except when authorized to do so by the owner of the email account for a work related purpose.</li> <li>Accessing the content of another User's email account except: 1) as part of an authorized investigation; 2) as part of an approved monitoring process; or 3) for other purposes specifically associated with the User’s official duties on behalf of University.</li> <li>Sending or forwarding any email that is suspected by the User to contain computer viruses.</li> <li>Any Incidental Use prohibited by this policy.</li> <li>Any use prohibited by applicable University or System policy.</li> </ol> </li></ol><p><a id="5.9" name="5.9"></a><strong>5.9</strong> Never infringe upon someone else's copyright. It is a violation of University policy and federal law to participate in copyright infringement.&nbsp;<strong>The University complies with all legal requests (e.g., subpoenas) for information and will report your use in response to a lawful request</strong>. Copyrighted materials include, but are not limited to, computer software, audio and video recordings, photographs, electronic books, and written material. If you share movies or music that you did not create, you may be infringing on another's copyright. Consequences of copyright infringement can include disciplinary actions by the University. In addition, copyright owners or their representatives may sue persons who infringe on another's copyright in federal courts.Such lawsuits average $750 per allegedly violated song in penalties or fines, for example. See the <a href="https://www.utexas.edu/its/secure/articles/keep_it_legal.php"><u>Keep it Legal: Finding Legal Online Music, Movies, and Other Content</u></a> and the <a href="http://copyright.lib.utexas.edu/copypol2.html"><u>Fair Use of Copyrighted Materials</u></a> for more information.</p><p><a id="5.10" name="5.10"></a><strong>5.10</strong> Never try to circumvent login procedures on any computer system or otherwise attempt to gain access where you are not allowed. Never deliberately scan or probe any information resource without prior authorization. Such activities are not acceptable under any circumstances and can result in serious consequences, including disciplinary action by the Office of the Dean of Students or the Office of the Executive Vice President and Provost.</p><p><a id="5.11" name="5.11"></a><strong>5.11</strong> Additional Requirements for Portable and Remote Computing.</p><ol> <li>All electronic devices including personal computers, smart phones or other devices used to access, create or store University Information Resources, including e-mail, must be password protected in accordance with University requirements, and passwords must be changed whenever there is suspicion that the password has been compromised.</li> <li>University Data created or stored on a User’s personal computers, smart phones or other devices, or in databases that are not part of University’s Information Resources are subject to Public Information Requests, subpoenas, court orders, litigation holds, discovery requests and other requirements applicable to University Information Resources.</li> <li>University issued mobile computing devices must be encrypted.</li> <li>Any personally owned computing devices on which Confidential University Data is stored or created must be encrypted.</li> <li>University Data created and/or stored on personal computers, other devices and/or non-University databases should be transferred to University Information Resources as soon as feasible.</li> <li>Unattended portable computers, smart phones and other computing devices must be physically secured.</li> <li>All remote access to networks owned or managed by University or System must be accomplished using a remote access method approved by the University or System, as applicable.</li></ol><p><a id="5.12" name="5.12"></a><strong>5.12</strong> Never use or disclose <u><a href="https://www.utexas.edu/its/glossary/#GL_CategoryI_Data">Confidential</a></u> data, or data that is otherwise confidential or restricted, without appropriate authorization. Examples of groups that can provide appropriate authorization include, but are not limited to <u><a href="https://www.utexas.edu/student/admissions/">Office of Admissions</a></u>, <a href="http://www.utexas.edu/hr/index.php"><u>Human Resource Services</u></a>, <u><a href="http://www.utexas.edu/vp/irla/">Office of the VP for Institutional Relations and Legal Affairs</a></u>, <a href="https://security.utexas.edu/"><u>Information Security Office</u></a>, and the University's <a href="http://www.utexas.edu/business/vp/open_records.html"><u>Public Information Officer</u></a>.</p><ol> <li>Make sure any individual with whom you share Confidential data is authorized to receive the information.</li> <li>Do not share Confidential data with friends or family members.</li> <li>Do not share University business data that may be classified as Confidential data, such as the status of negotiations, terms of contracts, and new research or products or relationships under development.</li> <li>Comply with the University's agreements to protect vendor information such as software code, proprietary methodologies, and contract pricing.</li> <li>If your office routinely receives requests for Confidential data, work with an appropriate group within the University to develop formal processes for documenting, reviewing, and responding to these requests.</li> <li>If you receive a non-routine request for Confidential data from a third party outside of the University, check with an appropriate group within the university to make sure the release of the data is permitted.</li> <li>Whenever feasible, Users shall store Confidential Information or other information essential to the mission of University on centrally managed services, rather than local hard drives or portable devices.</li> <li>Confidential or essential University Data stored on a local hard drive or a portable device such as a laptop computer, tablet computer, or, smart phone, must be encrypted in accordance with University, System’s, and any other applicable requirements.</li> <li>All Confidential University Data must be encrypted during transmission over a network.</li> <li>Users who store University Data using commercial cloud services must use services <u><a href="https://security.utexas.edu/iso-policies/cloud-services/decision-matrix">provided or sanctioned by the University</a></u>, rather than personally obtained cloud services.</li> <li>Users must not try to circumvent login procedures on any University Information Resource or otherwise attempt to gain access where they are not allowed. Users may not deliberately scan or probe any University Information Resource without prior authorization. Such activities are not acceptable under any circumstances and can result in serious consequences.</li> <li>All computers connecting to a University’s network must run security software prescribed by the Information Security Officer as necessary to properly secure University Information Resources.</li> <li>Devices determined by University to lack required security software or to otherwise pose a threat to University Information Resources may be immediately disconnected by the University from a University network without notice.&nbsp;</li> <li>Report violations of University policies regarding use and/or disclosure of confidential or restricted information to the Information Security Office (<a href="mailto:security@utexas.edu">security@utexas.edu</a>, 512-475-9242).</li></ol><div class="rteindent1">&nbsp;</div></div></div></div><div>&nbsp;</div></div> <div class="nd-title " id="section7"><h3>6. Disciplinary Actions</h3> </div> <div class="html-container "><div><div><div><div><div><a name="section6.1"><strong>6.1. What are the consequences for violating the rules listed in Section V of this document?</strong></a></div><div>&nbsp;</div><div>Consequences for infractions include, but are not limited to:</div><div>&nbsp;</div><div>Verbal warnings</div><div>Disciplinary action under Chapter 11 of the Institutional Rules, as set out in Section 13—1202 of those rules</div><div>Revocation of access privileges</div><div>Disciplinary probation</div><div>Suspension from the University</div><div>Criminal prosecution<br>&nbsp;</div><div>If your activity breaks the law, you can be prosecuted. Even if you are not charged criminally, you can still be suspended from the University. Such suspensions happen to several people each semester.</div><div>&nbsp;</div><div>The University reserves the right to protect its electronic resources from threats of immediate harm. This may include activities such as disconnecting an offending computer system from the campus network, terminating a running job on a computer system, or taking other action.</div><div>&nbsp;</div><div>If you are unsure whether an action you are considering is an acceptable use of electronic resources, write to the Information Security Office at <a href="mailto:security@utexas.edu"><u>security@utexas.edu</u></a>, or contact Student Judicial Services before you act. Representatives from either department will be glad to work with you to prevent problems later on.</div><div>&nbsp;</div><div><a name="section6.2.2"><strong>6.2. "Spam," unsolicited and unwanted e-mail, and other junk mail from a source outside UT Austin</strong></a></div><div>&nbsp;</div><div>Many people are annoyed by junk mail such as "spam" and other kinds of unsolicited or unwanted e-mail. If the offending e-mail is against UT Austin rules, the Information Security Office investigates the report and takes appropriate action.</div><div>&nbsp;</div><div>It is not unusual, though, for junk mail to originate from a source outside the University. In most such cases, the University has little control. You, however, as the recipient have a great deal of control.</div><div>&nbsp;</div><div>You can ignore or delete the junk mail. Read <a href="https://security.utexas.edu/outreach/phishing"><u>Don't Get Hooked: Protect Yourself Against Phishing Scams</u></a> for more tips on dealing with unsolicited mail.</div><div>&nbsp;</div><div>You can write the administrator of the Internet service provider from which the e-mail was sent, as described later in this section. Responsibly administered mailing lists will remove your name from their subscriber list if you ask them to do so. Not all lists, however, will honor your request.</div><div>&nbsp;</div><div>ITS uses robust hardware and software to control spam on all e-mail services provided centrally by ITS. Specific questions about spam can be addressed to the <a href="https://www.utexas.edu/its/helpdesk/forms/emailform.php?url=forms/mailform.html"><u>ITS Help Desk</u></a>.</div><div>&nbsp;</div><div>Repeated incidents involving offensive e-mail may become harassment. If you feel this is occurring, write <a href="http://security@utexas.edu"><u>security@utexas.edu</u></a>. If you feel threatened, call UT Police, 471-4441.</div><div>&nbsp;</div><div><a name="section6.3"><strong>6.3. How do I report an incident?</strong></a></div><div>&nbsp;</div><div>Note: Before you report an incident involving what you believe to be a misuse of information resources, review Section VII of this document. This section lists commonly complained-of activities that do not violate laws or rules.</div><div>&nbsp;</div><div>How you report an incident involving the misuse of IT resources depends upon the nature of the incident:</div><div>&nbsp;</div><ul> <li>If you believe that your personal safety is threatened, call UT Police, 471-4441.</li> <li>For others incidents, contact the Information Security Office at <a href="mailto:abuse@utexas.edu"><u>security@utexas.edu</u></a> or the UT Austin compliance hotline (via <u><a href="mailto:helpline@compliance.utexas.edu">helpline@compliance.utexas.edu</a></u> or 1-877-507-7321). You will receive an acknowledgment, and the incident will be handled by staff at the appropriate university office, such as Student Judicial Services or the Office of the Provost.&nbsp; Alternatively, you may also use the following form to report matters to University Compliance Services (<a href="https://www.reportlineweb.com/utaustin">https://www.reportlineweb.com/utaustin</a>).</li> <li>For reporting problems with "spam" or unsolicited mail, you may want to notify the Internet service provider (ISP) from which the mail was sent. Send a simple, polite note to the ISP, including a complete, unaltered copy of the spam (including the <a href="https://www.spamcop.net/fom-serve/cache/19.html"><u>e-mail headers</u></a>) for them to analyze. Don't expect a personal reply, because the ISP will probably be awash in complaints just like yours.</li></ul><div>​</div></div></div></div></div><p>&nbsp;</p></div> <div class="nd-title " id="section8"><h3>7. Authoritative Source</h3> </div> <div class="html-container "><div> <div> <div> <div> <div> <div> The authoritative source on this policy and responsibility for its implementation rests with the Office of the Associate Vice President and <a href="https://www.utexas.edu/cio/">Chief Information Officer</a>.</div> <div> &nbsp;</div> </div> </div> </div> </div></div></div> <div class="nd-title " id="section9"><h3>8. Revision History</h3> </div> <div class="html-container "><div><div><div><div><div><div><table cellspacing="1" cellpadding="1" border="1" class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption>Revision History</caption> <thead> <tr> <th scope="col" role="columnheader" data-tablesaw-priority="persist"><strong>Version</strong></th> <th scope="col" role="columnheader"><strong>Date</strong></th> <th scope="col" role="columnheader"><strong>New</strong></th> <th scope="col" role="columnheader"><strong>Original</strong></th> </tr> </thead> <tbody> <tr> <td>&nbsp;</td> <td>8/28/2019</td> <td>Aligned with Insitutional Rules on Student Services and Activities</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>8/24/2015</td> <td>Aligned with AUP changes to IRUSP</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>06/24/2013</td> <td>Reviewed and fixed broken links.</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>5/28/2013</td> <td>Converted back to HTML</td> <td>No change</td> </tr> <tr> <td>&nbsp;</td> <td>2/24/2011</td> <td>Created PDF of web version</td> <td>No change</td> </tr> <tr> <td>&nbsp;</td> <td>2/23/2009</td> <td>Updated example in Section V.4 to read, "Examples include, attempting to sell football tickets or used text books via the UT course management service or advertising a "Make Money Fast" scheme via a newsgroup. Such promotions are considered unsolicited commercial spam and may be illegal as well."</td> <td>For example, you cannot advertise a "Make Money Fast" scheme. Such promotions are called "chain letters" and are explicitly illegal.</td> </tr> <tr> <td>&nbsp;</td> <td>11/10/2007</td> <td> <div>During the annual review of this document, a number of wording changes were made to align the language with the expectations outlined in the Information Resources Use and Security Policy. In addition, the following changes were made:</div> <div>1. Policy moved from Information Technology Services site to Vice President for Information Technology site.</div> <div>2. Formatted document to conform to other policy documents. Added section II. Audience.</div> <div>3. From "What can I expect?":</div> <div>&nbsp;</div> <ul> <li>Changed heading to "III. Privacy Expectations."</li> <li>Consolidated "What can I do about being harassed?" into section VI. Disciplinary Actions.</li> <li>Removed "What happens if someone complains about me?"</li> </ul> <div>&nbsp;</div> <div>4. Updated Privacy Expectations (<strong>Sec III</strong>) to make mention of the U. T. Austin Network Monitoring Standards (<a href="https://security.utexas.edu/policies/monitoring.html">http://security.utexas.edu/policies/monitoring.html</a>).</div> <div>&nbsp;</div> <div>5. Updated Requirements (<strong>Sec V</strong>) to more directly cover copyright violations associated with peer-to-peer misuse (<strong>Rule #7, Rule #9</strong>)</div> </td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>4/9/2007</td> <td> <div>Section II, change requested by Compliance Office and Legal Affairs:</div> <div>"Furthermore, the university will comply with the lawful orders of courts, such as subpoenas and search warrants. This compliance has included providing, when required, copies of discussions on university operated mailing list servers, discussion threads on university operated news servers, e-mail content stored on university IT resources, or other information ordered by the court."</div> </td> <td> <div>"Furthermore, the university will comply with the lawful orders&nbsp;</div> <div>of courts, such as subpoenas and search warrants. This compliance has included providing, when required, copies of discussions on university operated mailing list servers, discussion threads on university news servers, or other information ordered by the court."</div> </td> </tr> <tr> <td>&nbsp;</td> <td>4/9/2007</td> <td>Removed language about Brightmail and IronPort technologies from section VI, "Spam" #3. Replaced with "ITS uses robust hardware and software to control spam on all e-mail services provided by ITS. Specific questions about spam can be addressed to the ITS Help Desk."</td> <td>"ITS uses a combination of Ironport appliances and Brightmail software to control spam on all e-mail services provided by ITS. Specific questions about spam can be addressed to the ITS Help Desk."<br> &nbsp;</td> </tr> </tbody></table></div></div></div></div></div></div><div>&nbsp;</div></div> <div class="nd-title " id="section10"><h3>10. Approvals</h3> </div> <div class="html-container "><div><div><div><div><div><div>&nbsp;</div></div></div></div></div></div><table cellspacing="1" cellpadding="1" border="1" class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption>Approvals</caption> <thead> <tr> <th scope="col" role="columnheader" data-tablesaw-priority="persist"><strong>Name</strong></th> <th scope="col" role="columnheader"><strong>Role</strong></th> <th scope="col" role="columnheader"><strong>Members</strong></th> <th scope="col" role="columnheader"><strong>Date</strong></th> </tr> </thead> <tbody> <tr> <td>Chief Information Security Officer &nbsp;</td> <td>Approval</td> <td>Cam Beasley</td> <td>September 24, 2015</td> </tr> </tbody></table><div>&nbsp;</div></div> </div> </div> </div> </div> </div> </div> </div> </article> </div> </div> </main> <footer class="ut-footer short_logo iso-footer" role="contentinfo"> <div id="looking-eye-container" class="looking-eye-container footer-element footer-image"> <img class="iso-footer-image" src="/themes/iso/iso/images/iso-eye1.png" alt="ISO eye" /> </div> <div class="footer-element footer-social"> <span class="footer-social-links"> <a class="social-diamonds" href="https://www.facebook.com/utaustiniso" target="_blank" class="" aria-label="Facebook"> <i class=" fa-brands fa-facebook-f"></i> </a> </span> <span class="footer-social-links"> <a class="social-diamonds" href="https://twitter.com/UT_ISO" target="_blank" class="" aria-label="Twitter"> <i class=" fa-brands fa-twitter"></i> </a> </span> <span class="footer-social-links"> <a class="social-diamonds" href="https://www.instagram.com/ut_iso/" target="_blank" class="" aria-label="Instagram"> <i class=" fa-brands fa-instagram"></i> </a> </span> </div> <div class=""> <h4 class="">Information Security Office </h4> <div class=""> <span>Copyright © 2006-2024, Information Security Office. All rights reserved.</span> </div> </div> <div class="footer-element footer-links"> <div> <span> <a href="https://www.utexas.edu/web-privacy-policy" target="_blank"> <u> <strong>Privacy Policy</strong> </u> </a> &nbsp;| &nbsp;<a href="https://www.utexas.edu/web-accessibility-policy" target="_blank"> <strong> <u>Accessibility Policy</u> </strong> </a> </span> </div> </div> <div class="footer-element footer-ut-logo"><img class="iso-utexas-logo" src="/themes/iso/iso/images/UTLOGO.png" alt="UT Austin logo" /> </div> </footer> </div> <script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","pathPrefix":"","currentPath":"node\/101","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxTrustedUrl":{"\/search\/pages":true},"user":{"uid":0,"permissionsHash":"898abbc508e7d7f35307a321a9ebd0b1e38223b3c9487a7bc18223d2e6358b39"}}</script> <script src="/sites/default/files/js/js_o9ISmrlJfcOKRAb6UpJqzyq6qNwzaK22UvT7C9g6YR4.js?scope=footer&amp;delta=0&amp;language=en&amp;theme=iso&amp;include=eJw1i0EKwzAMBD_k1E8S61huDcIKktzWv28hyWlnFga1hmKsjAsezXREamqxCLux56dogaTueuMM_sIzZuiGsb_U_P6KangYjvRPDx3e30yBIuzUugRbPg2f7fSrJMHSGZ7PpTK7VDaa_QfRXUFD"></script> <script src="https://static.addtoany.com/menu/page.js" async></script> <script src="/sites/default/files/js/js_A4X-qdQnYymUnkQsUKIXhk8ZB0GO7rxT4olWe-1N-2U.js?scope=footer&amp;delta=2&amp;language=en&amp;theme=iso&amp;include=eJw1i0EKwzAMBD_k1E8S61huDcIKktzWv28hyWlnFga1hmKsjAsezXREamqxCLux56dogaTueuMM_sIzZuiGsb_U_P6KangYjvRPDx3e30yBIuzUugRbPg2f7fSrJMHSGZ7PpTK7VDaa_QfRXUFD"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10