12.07.2015 Views

Download printable catalog - CSU Channel Islands

Download printable catalog - CSU Channel Islands

Download printable catalog - CSU Channel Islands

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• With the exception of publicly accessible campus academicand information technology resources, users must not transferor extend access to University academic and informationtechnology resources to outside individuals or groups withoutprior approval of authorized University personnel. Suchaccess must be limited in nature and fall within the scope ofthe educational mission of the University.Responsible Use• Users must not use campus information systems, data,or network resources for purposes that are inconsistent,incompatible, violate, or are in conflict with the University’smission, federal/state law, applicable regulations,contractual agreements, or University regulations andpolicies.• Users must not use a University owned/leased computersystem without permission or authorization.• Users must not add, delete, alter, or destroy data or softwarewithout authorization.• Users may not make software available for copying on acomputer without authorization or unauthorized copies ofcomputer data or documentation.• Harassment of others via University information systemsor network resources is prohibited under California StatePenal Code Section 653m, other applicable laws, andUniversity policies. It is a violation of this policy to useelectronic means to harass, threaten, defame, or otherwisecause harm to a specific individual or threaten groups ofindividuals, whether by direct or indirect reference, or bycreating a hostile environment. Campus information systemsor network resources must not be used to print, send, or storefraudulent or harassing messages and/or materials. Noe-mail, messages (voice or electronic), or web pages maybe created or sent that may constitute intimidating, hostile,or offensive materials based on gender, race, color, religion,national origin, sexual orientation, or disability.• University information systems or network resources must notbe used to store, distribute, or transmit obscene or offensivematerial. These restrictions may not prohibit such accessor retention if such materials are being used for a specificacademic purpose. Access, storage, and transmission ofchild pornography using <strong>CSU</strong> or campus resources AREstrictly prohibited at all times.• Certain University facilities that provide informationtechnology (e.g., computer labs, laboratories, offices, andlibraries) do not provide a private environment for accessingelectronic communications or other data. Therefore, users areadvised to be aware of their responsibilities for appropriatebehavior in public places. Some materials, which maybe appropriate for scholarly inquiry in various disciplines,may have a strong possibility of creating an uncomfortableenvironment for other users. When an uncomfortableenvironment has been created, parties are encouraged tocontact appropriate campus officials to seek assistance inresolving the conflict.• Users must promptly report the loss or theft of any devicewhich grants physical access to a University facility (e.g.,keys, access cards or tokens).• Users of campus information systems, data, or networkresources must not purposefully misrepresent their identity,either directly or by implication, while communicatingelectronically. This provision is not intended to limitanonymity, where appropriate, but rather to addresspurposeful and deliberate use of false identities.• Campus information systems, data, or network resourcesmust not be used to imply University endorsement, includingthe support or opposition of the University with regardsto any religious or political activity or issue. While usingUniversity information systems or network resources, usersmust not imply University endorsement of products or servicesof a non-University entity, without appropriate approval.Users must not give the impression that they are representing,giving opinions, or otherwise making statements on behalf ofthe University unless authorized to do so.• Effective information security is a team effort involving theparticipation and support of every user. A user who hasknowledge (or reasonable suspicion) of a violation of thispolicy must follow the applicable procedures for reportingthe violation to the appropriate personnel at his or hercampus. A user must not prevent or obstruct another userfrom reporting a security incident or policy violation.Network and Systems Integrity• Individuals must not use University-owned/leased orprivately-owned/leased technology resources in a mannerthat purposefully causes damage to or impairs campusinformation systems, data, or network resources. Suchbehaviors (e.g., disrupting services, or causing a denialof service to a computer system or network withoutauthorization) are prohibited on both University-owned/leased and privately-owned/leased equipment operated onor through campus resources.• In accordance with California State Penal Code Section502 and other policies and laws, activities and behaviorsthat threaten the confidentiality, availability, and integrity ofcampus data, networks or information systems are prohibitedon both University-owned/leased and privately-owned/leased equipment operated on or through Universityresources. These activities and behaviors include but are notlimited to:o Failure to comply with authorized requests fromUniversity personnel to discontinue activities thatthreaten the operation or integrity of informationsystems, data, or network resources.o Providing unauthorized services or accounts onUniversity information systems. University-authorizedbusiness and other activities directly related to theacademic mission of the University are allowed;however, any information systems running services thatmay negatively impact management, reliability, orintegrity of the University network or other Universityresources may be disconnected from the network.• Users must appropriately protect their devices and credentialsthat provide access to University protected data against loss,theft, or unauthorized access. Users must take reasonableprecautions to ensure that their devices (e.g., computers,PDAs, smart phones, etc.,) are secure before connectingremotely to the <strong>CSU</strong> information systems, data, or networkresources. Users must close connections (including re-moteconnections) to University information systems, data, andnetwork resources once they have completed Universityrelatedactivities.Incidental UseUniversity information systems and network resources are ownedand operated by the University and are to be used for Universityrelatedactivities and may be used for occasional incidental use.Such resources are provided to facilitate a person’s essentialwork as an employee, student, or other role within the University.Individuals may use campus information resources for occasionalwww.csuci.edu • California State University <strong>Channel</strong> <strong>Islands</strong> • 2011 - 2012 Catalog55Policies and Regulations2011 – 2012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!