Computer Equipment Access - Student
||Policy governing use of campus computer equipment by students.
||CSU Executive Order Number 628
||Instructional & Information Technologies
||View Signatures for Computer Equipment Access - Student Policy
I. APPROVAL AND ENFORCEMENT
Student access to CSUSM computing facilities and equipment is subject to approval
by the Director of Academic Computing Services.
"Access" shall be considered physical use of a computer workstation or terminal, or
remote access to a computer via a network or telephone line. "Computing facilities"
are considered to be any CSUSM facility where a computer exists. "Computing equipment"
is considered to be all computer hardware and software, network computer hardware,
media and software.
Access to campus computer equipment may be suspended during the course of an investigation,
but shall not be revoked without formal review with campus administration.
Violation of this policy may result in loss of access to CSUSM computing facilities
and equipment. Such loss may result in failure to complete classes required for graduation.
Enforcement of student disciplinary action is in accordance with CSU Executive Order
Individuals who violate U.S. copyright law and software licensing agreements may be
subject to criminal or civil action by the copyright or license owners.
Activities that are illegal or against University policy will be referred to the appropriate
officials regardless of whether or not a computer was involved in their commission.
Use of CSUSM computing facilities is granted to students for the following purposes:
- Completion of course work as assigned by faculty
- Assigned research
- Course registration and other communications with campus faculty and staff
- Participation in campus community activities
Use of campus computer equipment, including electronic mail, modem lines, web browsers
and other common applications and functions should be limited to legitimate campus
business purposes and should not be regarded as tools for personal or private communication.
Use of computing facilities for purpose above may be restricted or rescinded at the
discretion of the Director of Academic Computing Services for violation of this policy.
III. STUDENT RESPONSIBILITIES
Individuals granted access to campus computing equipment shall adhere to the following
rules and responsibilities:
Transmittal of messages
Students shall not transmit unsolicited information which contains obscene, threatening,
offensive or discriminatory material to another individual, a mailing list, a news
group or a public area on a CSUSM computer. Although mailing list subscribers and/or
news group readers are considered to have solicited all postings, students shall not
submit entries to news groups and/or mailing lists which are considered inappropriate
by the recipients. Repeated transmission of material to a person who finds such transmission
offensive, obscene or discriminatory will be treated as harassment and will subject
the sender to disciplinary proceedings.
Electronic publication of material
Students shall not publish web pages containing obscene information (pictures, movies,
sounds, text). Students shall not use copyrighted graphics or text on their web pages.
Students shall not publish web pages containing obscene, threatening, offensive or
discriminatory material. Students may not create "open forum" mailing lists, news
groups and/or other discussion area. Requests to create such an area must be directed
to the Dean of Information and Instructional Technology.
Use of copyrighted software
Students shall not copy, misuse, destroy or otherwise use campus licensed software
or data for a purpose other than it was intended. Students shall not violate the license
agreement on any software application installed on a CSUSM computer by creating and/or
installing and/or distributing copies of licensed software unless directed to do so
as part of their duties while employed at CSUSM.
Use of computer in the commission of a crime
Students shall not use CSUSM computer equipment or facilities in the commission of
a crime or any other unlawful purpose according to the federal, state, county and
university rules. (See California State Penal Code Section 502.)
Students shall not attempt to gain improper access to any user account, stored information,
network or computer system, on or off campus. Anonymous ftp and guest telnet access
to remote hosts both on and off campus are considered proper when used strictly for
the purposes for which they were intended. Intentional interception of any electronic
communication or knowledge of information obtained through interception of electronic
communication is considered improper access and may also be in violation of the Electronic
Communications Privacy Act chapter 119.
Disruption of service
Students shall not disrupt network or computer response by deliberately placing a
burden on the system or by using electronic resources in a manner inconsistent with
their stated purpose. Users shall not distribute "mass mailings" to multiple Usenet
groups, mailing lists or large numbers of individuals. Such mailings typically provoke
a response which would overburden our computing resources. In addition students are
required to comply with Usenet News and mailing list etiquette practices so that they
do not cause complaints from other members of the Internet. The receipt of multiple
complaints by system administrators for conduct and/or etiquette violations is considered
to place an undue burden on the system support staff.
Reporting a policy violation
Students shall report any violation of this policy to the Director of Academic Computing
Services, who shall in turn, report the incident to the Dean of Student Services as
needed. In the event that an individual health or safety is concerned, the incident
should be immediately reported to Public Safety.
Improper use of computer facilities
Students shall use the CSUSM computing system only for valid purposes as set forth
in section 2.1 of this document. Use of CSUSM computing facilities, including desktop
systems, for the purposes of private business activities or other non-educational
functions often violates the software license agreements extended to educational and
non-profit institutions and is not permitted.
Personal use of computer facilities
Use of computer lab facilities for "personal" activities such as Usenet News, IRC
chat, interaction with MOOs/MUDs and playing of games is not permitted except as assigned
by faculty or as part of an authorized activity of a campus club or other organization.
Altering campus computer equipment
Students may not install their personal software applications or hardware peripherals
on campus computer equipment without the express permission of the Director of Academic
Computing Services. Neither may they delete applications, remove peripherals or in
any other way alter the configuration of campus computer equipment including data
contained on campus computer equipment with the exception of activities directed by
faculty or staff.
Use of the student account
Students shall not disclose their password to an individual other than a member of
the system support staff. Students may not allow an individual other than system support
staff to use their account.
IV. PRIVACY AND OWNERSHIP OF ELECTRONIC COMMUNICATIONS & MEDIA
The campus will attempt to protect the privacy of an individual´s mail and data files
from inadvertent exposure to others. Except when such files are involved in a security
issue, policy violation or system maintenance problem, system support personnel will
not access nor disclose the content of an individual's email and/or data files. In
appropriate circumstances (e.g. where there is evidence suggesting a member of the
campus has engaged in wrongdoing), electronic communications may become subject to
Tracking and monitoring
The University may track user activities and access any files or information in the
course of performing normal system and network maintenance or while investigating
violations of policy or statute. Anyone using CSU San Marcos resources expressly consents
to such tracking and is advised if such tracking reveals possible evidence of criminal
activity, or violation of statute or policy, the University will provide the evidence
to appropriate officials.
Disclosure of information
Information stored or transmitted electronically, such as electronic mail, system
access logs, and network records, may be considered public records and therefore be
subject to disclosure or discovery in litigation.