Employee Use of University Information Systems
- Current students, faculty and staff
- Persons associated with official programs of CSP
- Visitors and guests associated with official university activities
- Emeriti faculty (university email account support)
- Comply with the following Acceptable Use Policy
- Understand and agree that use of CSP technology resources indicates acceptance of the policy
- Obtain necessary accounts and passwords and be responsible for maintaining the security of all accounts
- Disclose passwords and codes to access various systems when there is a business need-to-know as requested by the Director of Computer Services
- Realize public computer facilities and electronic classrooms are established for educational purposes and those purposes must take priority
- Instructional use in CSP classes
- Faculty research
- Student research
- Class assignments
- Official work of students, faculty, administration and staff, recognized student and campus organizations, and agencies of CSP
- Electronic communication that supports instruction, research, or official work of students, faculty, administration and staff
- Personal use by authorized users that does not interrupt or diminish access to resources for other users
Violations of Acceptable Use PolicyIt is contrary to the CSP Acceptable Use Policy to engage in any of the following behavior:
- Violate the “Statement of Software and Intellectual Rights.” Computer software must be used in accordance with license agreements, whether it is licensed to CSP or to them.
- Violate the Federal Copyright Law by downloading copyrighted audio, video, graphics or text materials from the Internet without proof of proper licensing arrangements.
- Use another person’s account or PIN or give your password, PIN or identification to another person for the purpose of gaining access to a university-owned computer, network or database resource. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended or use of another person’s email address. Changing another person’s password may be considered harassment.
- Access a file on a university-owned computer or network without the permission of the owner to copy, rename, modify, examine or change file protection or visibility. Lack of protection on a file does not imply right of access.
- Interrupt or inhibit the access of CSP technology resources by actions such as distributing computer viruses, worms, or bulk email — this includes any other procedures that interfere in any way with the information technology resources available to a user. Virus-scanning software is supplied and it is required for all student, faculty and staff to continually update their computers.
- Understand text and graphic files available over the Internet may be considered offensive by some members of the CSP community. As potential consumers of these materials, users are expected to exercise proper judgment and sensitivity as to how and where these materials are displayed.
- Operate a University-owned computer in a manner that is otherwise wasteful of any computing or network resource (for example, setting up file sharing servers/applications on the University network is not allowed).
- Employ a computer to annoy or harass other users (for example, to send obscene, abusive, or threatening mail).
- Use a computer to violate the principles of academic honesty
- Misuse information accessed while performing work as a CSP employee. Information stored on administrative computers is confidential; use or distribution of such information other than as assigned is prohibited by University policy and state and federal laws.
- Use or distribute any parts of CSP’s administrative records that are accessed unintentionally. These include, but are not limited to, information stored on disk, tape, hardcopy, microfilm as well as information on terminal screens.
- Use University-owned computer resources for commercial work except as permitted by faculty and staff handbooks and licensing agreements.
- Tamper with terminals, printers or any other associated University-owned equipment, or remove computer equipment, disks, paper or documentation from a computing facility. Equipment and software failures should be reported to the Office of Information Technology.
- Gain access to CSP technology resources when one is no longer eligible.
Results of Failing to Follow Acceptable Use PolicyFailure to follow the policies set forth in this document constitutes an offense. As with all matters of law and ethics, ignorance of the rules does not excuse violations. Authorized users learning of any policy violations should notify their immediate supervisor, who will notify the CIO and the appropriate division Vice President. Student violations will also be reported to the Dean of the student’s college.
- Ethical policy abuses may result with immediate denial of service and penalties that range from the loss of computing privileges to suspension or expulsion from CSP (students) or termination of employment (Faculty & Staff).
- Ethical policy abusers are liable for monetary payment and may also be liable for civil or criminal prosecution under state and federal statutes.
- The Office of Information Technology will not provide support to users who fail to follow the Acceptable Use Policy.
CSP does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive rights, including the right to make and distribute copies. Title 17 of the U.S. Code states that “it is illegal to make or distribute copies of copyrighted material without authorization” (Section 106). The only exception is the user’s right to make a backup copy for archival purposes (Section 117).
All files and communication, whether hard copy or electronically machine-readable, remain the exclusive property of CSP. CSP policy alone determines who has access to any file. Employees are not to share the contents of confidential files with others except within a department’s information dissemination policy.
The employee is warned that CSP, students, other employees, and third parties may be protected by federal or state law in addition to institutional policy. Non-compliance with this policy of the institution may place the individual at personal risk, as well as becoming subject to immediate dismissal.
CSP considers all media containing official institutional information as owned and accessible by the institution. This includes “campus” mail, U.S. mail, email, voice mail, FAX documents, “overnight” and “express” documents and the like. As such, appropriate administrative employees are granted the right to search for, look at, and otherwise utilize these documents in the course of performing institutional duties. Employees should minimize personal communications in these media, and use of campus facilities for utilizing these media. Also, any employee having access to such information in the primary custody of another employee is expected to use such information only in the performance of their duties, and not share any personal information they may have come upon in the course of the performance of their services to the institution.
CSP in no way condones the unlicensed exchange of proprietary products. All CSP employees, in the performance of their duties, will refrain from aiding others in such efforts and will advise other members of the University’s community not to participate in such endeavors. Should an activity be undertaken, the responsibility for the consequences of such activity shall remain the sole fiscal and legal responsibility of the offender.
Occasional use of University telephones for local calls for personal reasons is permissible, but calls should be limited in number and length. Personal long distance calls are not permitted on University phones.
Employees are encouraged to utilize the library with its numerous services.
Employees are encouraged to utilize the Concordia Bookstore. CSP employees receive a 10% discount on all items purchased in the bookstore.