U-WEB is an Internet service (the “Service”) provided to the visitors and students (collectively, “You” or “Your”) of Universal Technical Institute, Inc. (UTI).
The U-WEB Acceptable Use Policy (the “Policy”) is intended to help enhance the use of the Internet by preventing unacceptable use. You, as a user of this Service, must comply with this Policy. By using the U-WEB Service, You acknowledge and agree to follow this Policy and the terms of this Policy as stated herein. Your violation of this Policy may result in the suspension or termination of Your access to the Service, criminal and /or civil liability, or other actions by UTI, including but not limited to cooperation with legal authorities and/or third parties involved in the investigation of any suspected or alleged crime or civil wrongdoing. Violation of this policy may also affect Your status as a student at UTI.
The U‑Web Acceptable Use Policy Prohibits the Following:
U-WEB is an Internet service (the “Service”) provided to the visitors and students (collectively, “You” or “Your”) of Universal Technical Institute, Inc. (UTI).
The U-WEB Acceptable Use Policy (the “Policy”) is intended to help enhance the use of the Internet by preventing unacceptable use. You, as a user of this Service, must comply with this Policy. By using the U-WEB Service, You acknowledge and agree to follow this Policy and the terms of this Policy as stated herein. Your violation of this Policy may result in the suspension or termination of Your access to the Service, criminal and /or civil liability, or other actions by UTI, including but not limited to cooperation with legal authorities and/or third parties involved in the investigation of any suspected or alleged crime or civil wrongdoing. Violation of this policy may also affect Your status as a student at UTI.
The U‑Web Acceptable Use Policy Prohibits the Following:
- Illegal or Harmful Activity – You may access and use U-Web Services only for lawful purposes. It is prohibited to transmit, receive, post, store or access any material that violates applicable criminal or civil laws.
- Offensive Content – Download, storage or retransmission of content that is obscene, indecent, lewd, harassing, inflammatory, harmful, libelous, defamatory, threatening and invasive of publicity rights or privacy is prohibited.
- Harmful or Malicious Content – Intentionally downloading, developing or releasing malicious content that is harmful to the U-Web or other users of the UTI network such as viruses, Trojan horses, worms, time bombs, zombies or computer programs that may damage, intercept or capture any personal information, system, program or data is prohibited.
- Infringement – It is prohibited to use the UTI U-Web to download, store or retransmit any content that infringes on the intellectual property rights of others protected by copyright, trademark, patent or trade secrets. This includes unauthorized distribution, copying and/or posting of pictures, software, logos, articles, musical works and videos.
- Fraudulent Activity – Operating fraudulent business operations and practices such as offering of fraudulent services, promotions, goods or schemes (i.e., get rich quick schemes, pyramid schemes) is prohibited.
- U-WEB Network Security – You may not attempt to circumvent, disable or modify the function or configuration of any host network or security device by any means. Examples of network security violations include:
- Hacking – Unauthorized access to UTI systems or networks, including probing, scanning or testing the vulnerability of any UTI network or system in an attempt to breach the access or authentication controls, is strictly prohibited.
- Interception – The use of network packet sniffers, hardware keyloggers, eavesdropping or monitoring of UTI data or traffic on any UTI networks or systems by any means is prohibited.
- Intentional Interference – Intentionally interfering with any UTI network or host with denial-of-service attacks, news bombing, mail bombing, other flooding techniques or deliberate attempts to overload a system, network or user is prohibited
- System Restrictions Avoidance – Intentionally using electronic means or manual methods to avoid any information security policy limitations established by UTI or attempting to circumvent, disable or bypass security devices such as firewalls, web content filters (proxies), remote access systems and intrusion detection systems is prohibited.
- Personal Wi-Fi Wireless – Operation or connection of non-approved wireless access points to the UTI network is prohibited.
- Personal Cellular Device Tethering – Connection of cellular access devices to UTI hosts or networks to bridge Internet access is prohibited.
- Excessive Consumption of Network Resources – Consuming a disproportionate amount of available UTI network resources resulting in disruption or degradation of the U-Web services by others is prohibited.
The restrictions provided above are not exhaustive but are provided as a framework for the types of activities that fall into the category of unacceptable use of the Service.
Indemnification
You agree to indemnify, defend and hold harmless UTI and its affiliates, officers, employees, agents, suppliers, sponsors or other partners from any and all third-party claims, liabilities, costs, and expenses, including reasonable attorneys’ fees, arising from or related to Your access or use of the Service, any content You transmit through the Service, Your violation of this Policy, or Your violation of any rights of another . This means, primarily You agree You are responsible to pay for any costs or damages that result from Your use of this service and You agree to reimburse or pay for any damages or costs that UTI might incur as a result of Your use. Your indemnification obligations under this Policy shall survive any termination or expiration of the Policy.
Filtering and Logging
UTI uses an Internet content filtering and monitoring application that may log Your usage of the Service and prevent access to certain inappropriate websites. These sites may include shopping sites, gambling sites, pornographic sites, hacking sites, etc. Your attempted access to these restricted sites by users may be logged and periodically reviewed by UTI. In appropriate circumstances, UTI at its sole discretion reserves the right to review and/or monitor any transmissions sent or received through the Service.