{"id":2461,"date":"2025-06-25T14:22:03","date_gmt":"2025-06-25T18:22:03","guid":{"rendered":"https:\/\/blogarchive.utc.edu\/itstatus\/?p=2461"},"modified":"2025-08-26T13:39:31","modified_gmt":"2025-08-26T17:39:31","slug":"annual-review-of-acceptable-use-policy","status":"publish","type":"post","link":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/","title":{"rendered":"Annual Review of Acceptable Use Policy"},"content":{"rendered":"\n<p><strong>Beginning on July 15, 2025<\/strong>, you will be prompted to review and accept the&nbsp;<strong><a href=\"https:\/\/policy.tennessee.edu\/policy\/it0002-acceptable-use-of-information-technology-resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">University\u2019s Acceptable Use Policy (AUP)<\/a><\/strong><strong>&nbsp;<\/strong>annually&nbsp;to maintain access to UT technology services such as Microsoft 365.<\/p>\n\n\n\n<p><strong>What You\u2019ll Experience<\/strong><\/p>\n\n\n\n<p>Starting on Tuesday, July 15, the next time you access a Microsoft service (Outlook, Teams, Excel, Word, etc.) you will be prompted to re-authenticate. Once prompted:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You\u2019ll be redirected to a Microsoft-hosted page displaying the UT Acceptable Use Policy.<\/li>\n\n\n\n<li>You will need to review the policy in its entirety and choose\u00a0<em>Accept<\/em>\u00a0at the bottom of the webpage.<\/li>\n\n\n\n<li>After accepting, you may need to relaunch the application and sign in again to access your UTC Microsoft account.<\/li>\n<\/ul>\n\n\n\n<p>This new annual review process ensures that all users understand, acknowledge, and comply with the University\u2019s standards for responsible technology use, while also helping to protect institutional data and systems against unauthorized access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beginning on July 15, 2025, you will be prompted to review and accept the&nbsp;University\u2019s Acceptable Use Policy (AUP)&nbsp;annually&nbsp;to maintain access to UT technology services such as Microsoft 365. What You\u2019ll Experience Starting on Tuesday, July 15, the next time you access a Microsoft service (Outlook, Teams, Excel, Word, etc.) you will be prompted to re-authenticate.&hellip;<\/p>\n","protected":false},"author":1718,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[121717],"tags":[],"class_list":["post-2461","post","type-post","status-publish","format-standard","hentry","category-resolved"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive\" \/>\n<meta property=\"og:description\" content=\"Beginning on July 15, 2025, you will be prompted to review and accept the&nbsp;University\u2019s Acceptable Use Policy (AUP)&nbsp;annually&nbsp;to maintain access to UT technology services such as Microsoft 365. What You\u2019ll Experience Starting on Tuesday, July 15, the next time you access a Microsoft service (Outlook, Teams, Excel, Word, etc.) you will be prompted to re-authenticate.&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology Systems Status Archive\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T18:22:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T17:39:31+00:00\" \/>\n<meta name=\"author\" content=\"Jamie L Walden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie L Walden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/\",\"url\":\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/\",\"name\":\"Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive\",\"isPartOf\":{\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/#website\"},\"datePublished\":\"2025-06-25T18:22:03+00:00\",\"dateModified\":\"2025-08-26T17:39:31+00:00\",\"author\":{\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/9ef35421ff38ef12d7ee6177c02f60ba\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogarchive.utc.edu\/itstatus\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Annual Review of Acceptable Use Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/#website\",\"url\":\"https:\/\/blogarchive.utc.edu\/itstatus\/\",\"name\":\"Information Technology Systems Status Archive\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogarchive.utc.edu\/itstatus\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/9ef35421ff38ef12d7ee6177c02f60ba\",\"name\":\"Jamie L Walden\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b795df8c17e6af0fa919d514b05cacc990be89d0a9ee36fdbdbe97eb3c497009?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b795df8c17e6af0fa919d514b05cacc990be89d0a9ee36fdbdbe97eb3c497009?s=96&d=mm&r=g\",\"caption\":\"Jamie L Walden\"},\"url\":\"https:\/\/blogarchive.utc.edu\/itstatus\/author\/tkf366\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/","og_locale":"en_US","og_type":"article","og_title":"Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive","og_description":"Beginning on July 15, 2025, you will be prompted to review and accept the&nbsp;University\u2019s Acceptable Use Policy (AUP)&nbsp;annually&nbsp;to maintain access to UT technology services such as Microsoft 365. What You\u2019ll Experience Starting on Tuesday, July 15, the next time you access a Microsoft service (Outlook, Teams, Excel, Word, etc.) you will be prompted to re-authenticate.&hellip;","og_url":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/","og_site_name":"Information Technology Systems Status Archive","article_published_time":"2025-06-25T18:22:03+00:00","article_modified_time":"2025-08-26T17:39:31+00:00","author":"Jamie L Walden","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamie L Walden","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/","url":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/","name":"Annual Review of Acceptable Use Policy - Information Technology Systems Status Archive","isPartOf":{"@id":"https:\/\/blogarchive.utc.edu\/itstatus\/#website"},"datePublished":"2025-06-25T18:22:03+00:00","dateModified":"2025-08-26T17:39:31+00:00","author":{"@id":"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/9ef35421ff38ef12d7ee6177c02f60ba"},"breadcrumb":{"@id":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogarchive.utc.edu\/itstatus\/annual-review-of-acceptable-use-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogarchive.utc.edu\/itstatus\/"},{"@type":"ListItem","position":2,"name":"Annual Review of Acceptable Use Policy"}]},{"@type":"WebSite","@id":"https:\/\/blogarchive.utc.edu\/itstatus\/#website","url":"https:\/\/blogarchive.utc.edu\/itstatus\/","name":"Information Technology Systems Status Archive","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogarchive.utc.edu\/itstatus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/9ef35421ff38ef12d7ee6177c02f60ba","name":"Jamie L Walden","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogarchive.utc.edu\/itstatus\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b795df8c17e6af0fa919d514b05cacc990be89d0a9ee36fdbdbe97eb3c497009?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b795df8c17e6af0fa919d514b05cacc990be89d0a9ee36fdbdbe97eb3c497009?s=96&d=mm&r=g","caption":"Jamie L Walden"},"url":"https:\/\/blogarchive.utc.edu\/itstatus\/author\/tkf366\/"}]}},"_links":{"self":[{"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/posts\/2461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/users\/1718"}],"replies":[{"embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/comments?post=2461"}],"version-history":[{"count":2,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/posts\/2461\/revisions"}],"predecessor-version":[{"id":2477,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/posts\/2461\/revisions\/2477"}],"wp:attachment":[{"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/media?parent=2461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/categories?post=2461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/itstatus\/wp-json\/wp\/v2\/tags?post=2461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}