Faculty Handbook

CSU Computer Policy

Connecticut State University System

Policy Statement on Student Use of University Computer Systems and Networks

  1. University computer systems and networks are provided for student use as a part of the University academic program. Students are encouraged to become proficient in the use of computers as a means of enhancing their educational experience. However, widespread student use also necessitates certain rules of computer conduct. Computer misconduct can result in restrictions on or revocation of computer access privileges.
  2. University computer systems and networks constitute an expensive and valuable resource. The capacity of this resource to fulfill all the legitimate academic and administrative needs of students, faculty, and staff is limited.
  3. Student users have a responsibility to use University computer resources in an efficient, ethical, and lawful manner.
  4. The University has a right and a duty to protect its valuable computer resources and to restrict student access to uses that are strictly related to the students' university related programs as well as reasonably limited in time. The University reserves the right to define what are unauthorized student uses.
  5. The Chief Computer Administrator or designee(s) at each University in the CSU System and at the System Office may monitor student user accounts, files and/or log-in sessions for appropriate management purposes. Such purposes include but are not limited to performing archival and recovery procedures, evaluating system performance, and ensuring system integrity and security.
  6. Upon identifying a violation of the policy which constitutes and immediate, clear danger to the University computer systems or networks the Chief Computer Administrator or designee(s) at each University and in the System Office may immediately limit or suspend a student's access to University computer resources with immediate notification of charges and actions to the appropriate Chief Student Affairs Administrator or designee(s). This emergency suspension of computer use will then follow the student judicial procedures for "Interim Suspension" as provided in the CSU Student Rights and Responsibilities and Judicial Procedures document.
  7. Violations of University computer policy which do not constitute an immediate, clear danger to the University computer systems or networks will be referred to the regular student disciplinary process.
  8. Student computer offenses, which are included as number 25 in the Appendix of Punishable Offenses in the CSU Student Rights and Responsibilities and Judicial Procedures document are as follows:

    a.  Unauthorized use of University computers and/or peripheral systems and networks;

    b.  Unauthorized access to University computer programs or files;

    c.  Unauthorized alteration or duplication of University computer programs or files;

    d.  Any deliberate action to disrupt the operation of University computer systems which serve other members of the University community, including all networks to which University computers are connected;

    e.  Use of University computer systems and networks for committing crimes, violating civil laws, or violating University rules

  9. UNAUTHORIZED USES for students include but are not limited to the following:

    a.  Computer games which are not assigned course work;

    b.  Development or transmitting of chain letters;

    c.  Entering or transmitting of commercial advertisements or solicitations;

    d.  Entering or transmitting of political campaign material relating to elections to be held outside the University;

    e.  Entering or transmitting of obscene material;

    f.  Sexual harassment or other forms of harassment aimed at others or otherwise threatening others;

    g.  Sharing ones own computer account with others or using another person's accounts;

    h.  Violation of copyright laws or using or copying software in ways that violate the terms of the license;

    i.  Entering or transmitting computer viruses or any form of intentionally destructive programs;

    j.  Intentional disruption of network services;

    k.  Connecting any device to the network without permission;

    l.  Copying, modifying, replacing, or deleting any other user's account or any software used for system management;

    m.  Harming University computer equipment;

    n.  Uses which violate rules developed at each University which are necessitated by facilities limitations or other circumstances unique to each University.

CSU ELECTRONIC MONITORING POLICY

http://www.wcsu.edu/hr/policies-procedures/Electronic_Monitoring_Notice_0300.pdf

The Connecticut State University System deems it necessary and advisable and in the best interest of the university communities of Eastern, Central, Southern and Western Connecticut State Universities and the System Office, to again raise awareness and re-emphasize legal considerations concerning information technology devices in use throughout the system.

There are several information technology devices in use in the CSU System. These devices are the property of the State of Connecticut and use thereof by the user is restricted to the performance of official State business or activities approved through the collective bargaining process. Information related to usage and utilization of these devices and the overall CSU technological environment is constantly being collected.

The Connecticut State University System information technology infrastructure includes a telephone system, a communications network, Internet access, computer servers and computer workstations. Information related to the usage of this infrastructure is collected and logged. All users of these devices are hereby advised and notified that these devices produce data and reports related to information stored, sent and retrieved for the purposes of recording usage and utilization. While system personnel do not review the contents of this material except when necessary in the course of the discharge of official duties and as permitted by law, each user should know and is hereby notified that all such information is subject to subpoena, discovery, the Connecticut Freedom of Information Act and such other disclosure processes as may be authorized by law.

This notice is issued pursuant to the provisions of Public Act 98-142.

 


Related Links: