Draft. Policies of Colorado State University University Policy. Category: Information Technology

Similar documents
Guest Wireless Policy

Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy

II.C.4. Policy: Southeastern Technical College Computer Use

Acceptable Use Policy (AUP)

Cleveland State University General Policy for University Information and Technology Resources

Acceptable Use Policy

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

region16.net Acceptable Use Policy ( AUP )

Acceptable Use Policy

ACCEPTABLE USE POLICY

PTLGateway Acceptable Use Policy

Acceptable Use Policy Updated 1/16/2018

Acceptable Use Policy

Electronic Network Acceptable Use Policy

Computer Use and File Sharing Policy

Acceptable Use Policy

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Acceptable Use Policy. Effective January 2017

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

IT INSTRUCTIONS. Your Ursuline ID Number is:

Service Specific Terms & Conditions

IT ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Internet, , and Computer Usage Policy

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

WARNER PACIFIC COLLEGE

Acceptable Use Policy

FreedomNet Solutions Acceptable Use Policy ( )

UCL Policy on Electronic Mail ( )

Staff Information System Acceptable Use Policy

Acceptable Use and Publishing Policy

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

: Acceptable Use Policy

Z.com Hosting Service Order

Acceptable Use Policy ("AUP")

Acceptable Use Policy

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

Information technology security and system integrity policy.

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

ICT Acceptable Use Policy for Students

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

Communication and Usage of Internet and Policy

OHSU s Alumni Relations Program (housed at the OHSU Foundation): 1121 SW Salmon Street, Suite #100 Portland, OR

Learning Management System - Privacy Policy

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NebraskaLink Acceptable Use Policy

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

Acceptable Use Policy

Revised 10/15/2014 WEBSITE TERMS OF USE

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

University Policies and Procedures ELECTRONIC MAIL POLICY

Terms and Conditions

RMU-IT-SEC-01 Acceptable Use Policy

NOOTRY TERMS OF SERVICE

Fooji Code of Conduct

Synchrotron Light Source Australia Pty Ltd

Subject: University Information Technology Resource Security Policy: OUTDATED

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

Cyber Security Program

Wave s High-Speed Internet Service Acceptable Use Policy

APPROPRIATE USE OF INFORMATION TECHNOLOGY RESOURCES POLICY

Acceptable Use Policy for EWC HousingNet Internet Service Customers

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Terms of Use. Changes. General Use.

ACCEPTABLE USE AND NETWORK MANAGEMENT POLICY

The University of Tennessee. Information Technology Policy (ITP) Preamble

Sac County Mutual Telephone Company Acceptable Use Policy High Speed Internet Service Page 1 of 5. Sac County Mutual Telephone Company

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

Information Security Management System ISO/IEC 27001:2013

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

POLICY 8200 NETWORK SECURITY

13. Acceptable Use Policy

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

TERMS OF SERVICE AGREEMENT

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Acceptable Use Policy

Memorandum of Understanding for Access Plus Service. 7/1/2014 to 6/30/2017

use resources only for College business and for purposes authorized by the College.

ASSESSMENT CENTER TERMS AND CONDITIONS. Last Updated 1/21/2011

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Western Iowa Telephone Association (dba Wiatel, Western Iowa Telecom) AUP Wiatel Wiatel Company 1. Applicability. User 2. Compliance Required.

GhostFiber Acceptable Use Policy

Open Internet Disclosure For Wireline and Fixed Wireless Network Services

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

The University of Central Florida Alumni Privacy Policy and Terms and Conditions

Acceptable Use Policy

Funding University Inc. Terms of Service

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

OUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy

Transcription:

Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology Policy ID#: 4 1018 001 Contact: Academic Computing and Networking Services Web: http://www.acns.colostate.edu Phone: 970 491 5133 PURPOSE OF THIS POLICY Original Effective Date: 10/7/20095/25/2001 Last Major Revision: 5/264/2016 Computing and data systems, equipment and services at Colorado State University are valuable and limited resources that serve a large number and variety of Users. Misuse of these resources can result in loss of integrity, functionality, speed, bandwidth and reliability of the University s information systems, as well as violations of other laws and policies (such as those concerning conflicts of interest, privacy, etc.). The purpose of this policy is to establish what constitutes acceptable use of these resources in order to assure that they are available to everyone as needed for the University s business needs. APPLICATION OF THIS POLICY This policy applies to all students, faculty and staff, affiliates, and all other persons and organizational units having access to the University s technology and information systems (hereinthis policy applies to all students, faculty and staff, affiliates, and all other persons and organizational units having access to use the University s technology and information systems (hereinafter Users ). DEFINITIONS USED IN THIS POLICY "Resources" include, but are not limited to, University technology devices, servers, networks, storage devices and systems (including cloud storage), data, applications, installed software, and system credentials.

POLICY STATEMENT All Users have the responsibility to make use of the Resources in an efficient, ethical, and legal manner. The Resources are to be used in a manner consistent with the instructional, research, and administrative objectives of the University community in general, and for the purposes such Resources were provided. Access to the Resources is a privilege and imposes upon Users certain responsibilities and obligations, as further described in this policy. POLICY PROVISIONS Access to the Resources is granted subject to CSU System and uuniversity policies and local, state, and federal laws. Acceptable use is always ethical, reflects academic honesty, integrity, and shows restraint in the consumption of shared Resources. It demonstrates respect for intellectual property, protection of sensitive information, ownership of data/informationdata, copyright laws, system security mechanisms, and an individual s rights to privacy and to freedom from intimidation and harassment. Activities inconsistent with these objectives are considered to be inappropriate and may jeopardize continued use of the Resources. The University may take any action it deems necessary to protect the Resources from systems and events that threaten or degrade operations, or that otherwise violate this policy. In consideration of being allowed to use the Resources, each User acknowledges and agrees to the following statements: a. I will not use the Resources for any illegal activity or for any activity prohibited by this policy or the other policies or strictures referenced herein. b. I will not use the Resources to infringe upon any copyright or other intellectual property rights of another. This pertains to all copyrighted material, including, but not limited to, written works, recorded music, photographs, video and software. I understand that I may be held personally liable for copyright infringement. (See References below for more information on copyright laws and policies). c. I understand that I am responsible for my own misuse of the Resources, and misuse by others that I knowingly permit or enable to use the Resources (for example, by sharing my password or sharing my access). I agree to be responsible for all claims arising from my misuse of the Resources and shall indemnify and hold harmless the Board of Governors and the University from any costs, expenses andor liabilities that might be asserted or imposed upon it or any of its officers, agents or affiliates as a result of such misuse. d. I will avoid any action that interferes with the efficient operation of the Resources or impedes the flow of information necessary for academic or administrative operations of the University, and will immediately discontinue such activities once I become aware of its effects. e. I will protect the Resources from unauthorized use and acknowledge that I am responsible for reasonably securing the Resources that have been assigned to me,

including implementing such measures as outlined within the University s IT Security Policy and any related procedures and guidelines, as well as in federal and state regulations that may apply (such as FERPA andor HIPAA). This also includes applying, in a timely manner, operating system and software patches, and implementing malware scanning that protects my computing devices from unauthorized access. (Reference: IT Security Policy). f. I will only use the Resources for their intended purposes. I will only access Resources that have been authorized for my use, or which are publically available. g. I understand that the University retains all ownership rights to all its collective data. I acknowledge that, unless specifically authorized by a University official, copying University data to a personal device, storage location or any other media, /network/ or resource which is beyond the University s direct control is prohibited. h. I understand that incidental personal use of Resources (such as email, Internet access, fax machines, printers, and copiers) is permitted only when it conforms to this policy. Incidental use is use that is infrequent, does not interfere with the normal performance of my duties or the duties of another, does not unduly delay others use,i understand that incidental personal use of Resources (such as email, Internet access, fax machines, printers, and copiers) is permitted only when it conforms to this policy. Incidental use is use that is infrequent, does not interfere with the normal performance of my duties or the duties of another, and does not unduly delay others use or and does not cause the university to incur additional costs. Such use is restricted to approved Users only and does not include use by family members or others not affiliated with the University. i. Storage of personal email messages, voice messages, files and documents on the University s Resources must be nominal so as not to burden the university s servers and other storage devices. Examples of Inappropriate Conduct Using University Resources Conduct which violates this policy includes, but is not limited to: a. Accessing another person's computer, computer account, files, or data without permission. b. Giving my username and password to someone else, or allowing another to access my services, even temporarily. c. Using the Rtesources to gain unauthorized access to any computer system. d. Using any means to decode or otherwise obtain restricted passwords or accesscontrolled information.

e. Attempting to circumvent or subvert system or network security measures. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system. f. Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files or making unauthorized modifications to university data. g. Performing any act, intentionally or otherwise, that will interfere with the normal operation of computers, peripherals, or networks. h. Making or using illegal copies of copyrighted software, storing such copies on university systems, or transmitting them over university networks. i. Harassing or intimidating others via email, social media, news groups or Web pages or any other of the Resources. j. Initiating or propagating electronic chain letters. k. Initiating or facilitating in any way mass unsolicited or unofficial electronic mailing (e.g., "spamming", "flooding", or "bombing"). l. Forging the identity of a User or Resource. m. Saturating a Resource to the exclusion of another's use, for example, overloading the network with traffic such as emails or legitimate (file backup or archive) or malicious (denial of service attack) activities. n. Using the University's systems or networks for personal gain; for example, by selling access to your eid or to university systems or networks, or by performing work for profit with university resources in a manner not authorized by the University. o. Engaging in any other activity that does not comply with the general principles presented above. I acknowledge that the Acceptable Use Policy (AUP) will change from time to time depending upon the needs of the University. I understand that I am responsible for reviewing the official version of the AUP from time to time to be sure I understand what is acceptable. COMPLIANCE WITH THIS POLICY The University considers violations of acceptable use principles or guidelines to be serious offenses. The University will take such action it deems necessary to access copy and examine any files or information resident on university systems allegedly related to unacceptable use, and to protect its network from systems and events which that threaten or degrade operations. Violations may be referred to the appropriate University entity for disciplinary actione. In the case of major infractions, for example those that impair others' ability to use networking and computing resources, or whenever necessary to protect Resources, the University may immediately restrict systems or network access as it deems necessary to mitigate such activities. REFERENCES

Board of Governors Policy 127, Use of Digital Resources CSU Policy on Central Administrative Email, Listservs and Mass Communications CSU Policy on Email Communications to Students CSU Policy on Intellectual Property Copyrights and Patents APPROVALS Version 1.0 approved by ITEC 2001 Version 1.1 approved by ITEC 10/7/2009 Version 1.2 approved by ITEC 6/22/2011 Version 1.3 approved 6/27/2014 by ITEC and Amy Parsons, VPUO Version 1.4 approved 5/24/16 by ITEC and Lynn Johnson, VPUO