General Users Acceptable Use of Information

Technology Resources Security Rules

The primary purpose of the Chicago State University's information technology resources is to enhance and support the educational mission of the University.

Access to the University's technology resources is a privilege granted to current University students, faculty, staff, registered alumni, and approved guests. These resources include hardware, software, computer accounts, local area networks as well as connections to other computers networks via the Internet. Everyone using these resources is responsible for using them in an effective, ethical and lawful manner. The use of the University's resources is a privilege and not a right.

RULES

All users must refrain from the following activities:

  1. Using computing facilities to violate any university policy or regulation, or federal, state or local law.
  2. Entering, without authorization, into any account / server/ system to use, read, transfer or change the contents in any way.
  3. Impersonating/misrepresenting another individual's computer account or e-mail username.
  4. Granting another individual access to your computer account.
  5. Using computing resources to interfere with the work of other students, faculty or University officials.
  6. Using computing facilities to send obscene, abusive, threatening, defamatory, or harassing messages.
  7. Using computing resources to interfere with the normal operation of university computing systems and connected networks including, but not limited to, introducing viruses (intentional or otherwise), flooding the network with messages, sending chain letters, or unfairly monopolizing resources that result in the exclusion of others.
  8. Using University computing resources for personal profit or commercial purposes.

The University reserves the right to view or scan any file or software stored on University systems or transmitted over University networks, and may do so periodically to verify that software and hardware are working correctly, to look for particular kinds of data or software (such as computer viruses), or to audit the use of University resources. Violations of policies that come to the University's attention will be acted upon.

Failure to comply with this policy will result in action which may include suspension of user privileges or other disciplinary action, including suspension or expulsion from the University or termination of University employment. In addition, violations may result in referral for prosecution by local state or federal authorities.