AboutAcademicsAdmissionsAlumni and FriendsAthleticsCampus Life
page tools :

Connecticut State University Policy on Student Use of University Computer Systems and Networks

1.    University computer systems and networks are provided for student use as a part of the University            academic program. Students are encouraged to become proficient in the use of computers as a
       means of enhancing their educational experience. However, widespread student use also                             necessitates certain rules of computer conduct. Computer misconduct can result in restrictions on or        revocation of computer access privileges.

2.    University computer systems and networks constitute an expensive and valuable resource. The                capacity of this resource to fulfill all the legitimate academic and administrative needs of students,                faculty, and staff is limited.

3.    Student users have a responsibility to use University computer resources in an efficient, ethical, and            lawful manner.

4.    The University has a right and a duty to protect its valuable computer resources and to restrict student        access to uses that are strictly related to the students' academic programs as well as reasonably                limited in time.  The University reserves the right to define what are unauthorized student uses.

5.    The Chief Computer Administrator or designee(s) at each University in the CSU System and at the            System Office may monitor student user accounts, files, and/or log-in sessions for appropriate                    management purposes. Such purposes include but are not limited to performing archival and
       recovery procedures, evaluating system performance, and ensuring system integrity and security.

6.    Upon identifying a violation of this policy which constitutes an immediate, clear danger to the
       University computer systems or networks the Chief Computer Administrator or designee(s) at each             University and in the System Office may immediately limit or suspend a student's access to University        computer resources with immediate notification of charges and actions to the appropriate Chief
       Student Affairs Administrator or designee(s). This emergency suspension of computer use will then         follow the student judicial procedures for "Interim Suspension" as provided in the CSU Student Rights        and Responsibilities and Judicial Procedures document.

7.    Violations of University computer policy which do not constitute an immediate, clear danger to the                University computer systems or computer networks will be referred to the regular student disciplinary        process.

8.    Student computer offenses, which are included as number 25 in the Appendix of Punishable Offenses        in the CSU Student Rights and Responsibilities and Judicial Procedures document are as follows:

a.    Unauthorized use of University computers and/or peripheral systems and networks;
b.    Unauthorized access to University computer programs or files;
c.    Unauthorized alteration or duplication of University computer programs or files;
d.    Any deliberate action to disrupt the operation of University computer systems which            serve other members of the University community, including all networks to which            University computers are connected;
e.    Use of University computer systems and networks for committing crimes, violating civil        laws, or violating University rules.
9.    UNAUTHORIZED USES for students include but are not limited to the following:
a.    Computer games which are not assigned course work;
b.    Development or transmitting of chain letters;
c.    Entering or transmitting of commercial advertisements or solicitations;
d.    Entering or transmitting of political campaign material relating to elections to be held        outside the University;
e.    Entering or transmitting of obscene material;
f.     Sexual harassment or other forms of harassment aimed at others or otherwise                    threatening others;
g.    Sharing ones own computer account with others or using another person's accounts;
h.    Violation of copyright laws or using or copying software in ways that violate the terms        of the license;
i.     Entering or transmitting computer viruses or any form of intentionally destructive                programs;
j.     Intentional disruption of network services;
k.    Connecting any device to the network without permission;
l.     Copying, modifying, replacing, or deleting any other user's account or any software            used for system management;
m.   Harming University computer equipment;
n.    Uses which violate rules developed at each University which are necessitated by                facilities limitations or other circumstances unique to each University.
Approved: November 8, 1995

Need Technical Support?


Contact the IT Help Desk

Monday - Thursday 7:30am - 8pm
Friday 7:30am - 5pm
Walk-in Technology Support
Click here for support information.


Report Abuse: To report any kind of improper usage of our systems or any campus technology, please click here to send us a notification.


Like us on

Follow us on


email page print page small type large type large type
powered by finalsite