Connecticut State University Policy on Student Use of University Computer Systems and Networks
1. University computer systems and networks are provided for student use as a part of the University academic program. Students are encouraged to become proficient in the use of computers as a
means of enhancing their educational experience. However, widespread student use also necessitates certain rules of computer conduct. Computer misconduct can result in restrictions on or revocation of computer access privileges.
2. University computer systems and networks constitute an expensive and valuable resource. The capacity of this resource to fulfill all the legitimate academic and administrative needs of students, faculty, and staff is limited.
3. Student users have a responsibility to use University computer resources in an efficient, ethical, and lawful manner.
4. The University has a right and a duty to protect its valuable computer resources and to restrict student access to uses that are strictly related to the students' academic programs as well as reasonably limited in time. The University reserves the right to define what are unauthorized student uses.
5. The Chief Computer Administrator or designee(s) at each University in the CSU System and at the System Office may monitor student user accounts, files, and/or log-in sessions for appropriate management purposes. Such purposes include but are not limited to performing archival and
recovery procedures, evaluating system performance, and ensuring system integrity and security.
6. Upon identifying a violation of this policy which constitutes an immediate, clear danger to the
University computer systems or networks the Chief Computer Administrator or designee(s) at each University and in the System Office may immediately limit or suspend a student's access to University computer resources with immediate notification of charges and actions to the appropriate Chief
Student Affairs Administrator or designee(s). This emergency suspension of computer use will then follow the student judicial procedures for "Interim Suspension" as provided in the CSU Student Rights and Responsibilities and Judicial Procedures document.
7. Violations of University computer policy which do not constitute an immediate, clear danger to the University computer systems or computer networks will be referred to the regular student disciplinary process.
8. Student computer offenses, which are included as number 25 in the Appendix of Punishable Offenses in the CSU Student Rights and Responsibilities and Judicial Procedures document are as follows:
a. Unauthorized use of University computers and/or peripheral systems and networks;
b. Unauthorized access to University computer programs or files;
c. Unauthorized alteration or duplication of University computer programs or files;
d. Any deliberate action to disrupt the operation of University computer systems which serve other members of the University community, including all networks to which University computers are connected;
e. Use of University computer systems and networks for committing crimes, violating civil laws, or violating University rules.
9. UNAUTHORIZED USES for students include but are not limited to the following:
a. Computer games which are not assigned course work;Approved:
b. Development or transmitting of chain letters;
c. Entering or transmitting of commercial advertisements or solicitations;
d. Entering or transmitting of political campaign material relating to elections to be held outside the University;
e. Entering or transmitting of obscene material;
f. Sexual harassment or other forms of harassment aimed at others or otherwise threatening others;
g. Sharing ones own computer account with others or using another person's accounts;
h. Violation of copyright laws or using or copying software in ways that violate the terms of the license;
i. Entering or transmitting computer viruses or any form of intentionally destructive programs;
j. Intentional disruption of network services;
k. Connecting any device to the network without permission;
l. Copying, modifying, replacing, or deleting any other user's account or any software used for system management;
m. Harming University computer equipment;
n. Uses which violate rules developed at each University which are necessitated by facilities limitations or other circumstances unique to each University.
November 8, 1995