|

Employee Use of University Information Systems

Network Access & Acceptable Usage Policy
It is the intent of CSP to provide a quality technological environment for the university community in which certain standards are observed. All CSP students, faculty and staff authorized to use CSP computing facilities are responsible for reading, understanding and complying with all technology policies. Individual access to technology equipment and services (including those provided by third-party partners) remains at the discretion of the University and may be restricted or revoked at any time. In addition, the University reserves the right to restrict, monitor, and access all electronic and telephone systems upon the recommendation of the Provost & Chief Operating Office or the Director of Human Resources. Employees who are taking classes may not engage in activities which may call into question the integrity of the institution.  In situations where an employee’s access to technology may represent a conflict of interest, access may be restricted or responsibilities realigned to remove the potential for such conflict.

View Policy
Access to Technology Resources
CSP technology resources are available to the following learning communities:
  • Current students, faculty and staff
  • Persons associated with official programs of CSP
  • Visitors and guests associated with official university activities
  • Emeriti faculty (university email account support)


View Policy
Requirements for Use of University Technology Resources
  • Comply with the following Acceptable Use Policy
  • Understand and agree that use of CSP technology resources indicates acceptance of the policy
  • Obtain necessary accounts and passwords and be responsible for maintaining the security of all accounts
  • Disclose passwords and codes to access various systems when there is a business need-to-know as requested by the Director of Computer Services
  • Realize public computer facilities and electronic classrooms are established for educational purposes and those purposes must take priority


View Policy
Concordia University Acceptable Use Policy
The purpose of the CSP network is to support education, communication and research by providing access to unique resources and the opportunity for interaction and collaborative work on the Internet and through email and other applications. The following operations are acceptable uses of the computer network at CSP:
  • Instructional use in CSP classes
  • Faculty research
  • Student research
  • Class assignments
  • Official work of students, faculty, administration and staff, recognized student and campus organizations, and agencies of CSP
  • Electronic communication that supports instruction, research, or official work of students, faculty, administration and staff
  • Personal use by authorized users that does not interrupt or diminish access to resources for other users
 

Violations of Acceptable Use Policy

It is contrary to the CSP Acceptable Use Policy to engage in any of the following behavior:
  • Violate the “Statement of Software and Intellectual Rights.” Computer software must be used in accordance with license agreements, whether it is licensed to CSP or to them.
  • Violate the Federal Copyright Law by downloading copyrighted audio, video, graphics or text materials from the Internet without proof of proper licensing arrangements.
  • Use another person’s account or PIN or give your password, PIN or identification to another person for the purpose of gaining access to a university-owned computer, network or database resource. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended or use of another person’s email address. Changing another person’s password may be considered harassment.
  • Access a file on a university-owned computer or network without the permission of the owner to copy, rename, modify, examine or change file protection or visibility. Lack of protection on a file does not imply right of access.
  • Interrupt or inhibit the access of CSP technology resources by actions such as distributing computer viruses, worms, or bulk email — this includes any other procedures that interfere in any way with the information technology resources available to a user. Virus-scanning software is supplied and it is required for all student, faculty and staff to continually update their computers.
  • Understand text and graphic files available over the Internet may be considered offensive by some members of the CSP community. As potential consumers of these materials, users are expected to exercise proper judgment and sensitivity as to how and where these materials are displayed.
  • Operate a University-owned computer in a manner that is otherwise wasteful of any computing or network resource (for example, setting up file sharing servers/applications on the University network is not allowed).
  • Employ a computer to annoy or harass other users (for example, to send obscene, abusive, or threatening mail).
  • Use a computer to violate the principles of academic honesty
  • Misuse information accessed while performing work as a CSP employee. Information stored on administrative computers is confidential; use or distribution of such information other than as assigned is prohibited by University policy and state and federal laws.
  • Use or distribute any parts of CSP’s administrative records that are accessed unintentionally. These include, but are not limited to, information stored on disk, tape, hardcopy, microfilm as well as information on terminal screens.
  • Use University-owned computer resources for commercial work except as permitted by faculty and staff handbooks and licensing agreements.
  • Tamper with terminals, printers or any other associated University-owned equipment, or remove computer equipment, disks, paper or documentation from a computing facility. Equipment and software failures should be reported to the Office of Information Technology.
  • Gain access to CSP technology resources when one is no longer eligible.
 

Results of Failing to Follow Acceptable Use Policy

Failure to follow the policies set forth in this document constitutes an offense. As with all matters of law and ethics, ignorance of the rules does not excuse violations. Authorized users learning of any policy violations should notify their immediate supervisor, who will notify the CIO and the appropriate division Vice President. Student violations will also be reported to the Dean of the student’s college.
  • Ethical policy abuses may result with immediate denial of service and penalties that range from the loss of computing privileges to suspension or expulsion from CSP (students) or termination of employment (Faculty & Staff).
  • Ethical policy abusers are liable for monetary payment and may also be liable for civil or criminal prosecution under state and federal statutes.
  • The Office of Information Technology will not provide support to users who fail to follow the Acceptable Use Policy.
 

View Policy
Use of Computer Software & Copyright

CSP does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive rights, including the right to make and distribute copies. Title 17 of the U.S. Code states that “it is illegal to make or distribute copies of copyrighted material without authorization” (Section 106). The only exception is the user’s right to make a backup copy for archival purposes (Section 117).



View Policy
Information Access and Ownership*
Files and Records

All files and communication, whether hard copy or electronically machine-readable, remain the exclusive property of CSP. CSP policy alone determines who has access to any file. Employees are not to share the contents of confidential files with others except within a department’s information dissemination policy.

The employee is warned that CSP, students, other employees, and third parties may be protected by federal or state law in addition to institutional policy. Non-compliance with this policy of the institution may place the individual at personal risk, as well as becoming subject to immediate dismissal.



View Policy
Communication Media

CSP considers all media containing official institutional information as owned and accessible by the institution. This includes “campus” mail, U.S. mail, email, voice mail, FAX documents, “overnight” and “express” documents and the like. As such, appropriate administrative employees are granted the right to search for, look at, and otherwise utilize these documents in the course of performing institutional duties. Employees should minimize personal communications in these media, and use of campus facilities for utilizing these media. Also, any employee having access to such information in the primary custody of another employee is expected to use such information only in the performance of their duties, and not share any personal information they may have come upon in the course of the performance of their services to the institution.



View Policy
Copyrighted Materials

CSP in no way condones the unlicensed exchange of proprietary products. All CSP employees, in the performance of their duties, will refrain from aiding others in such efforts and will advise other members of the University’s community not to participate in such endeavors. Should an activity be undertaken, the responsibility for the consequences of such activity shall remain the sole fiscal and legal responsibility of the offender.



View Policy
Use of University Telephones

Occasional use of University telephones for local calls for personal reasons is permissible, but calls should be limited in number and length. Personal long distance calls are not permitted on University phones.



View Policy
Library Technology Center

Employees are encouraged to utilize the library with its numerous services.



View Policy
Concordia Bookstore

Employees are encouraged to utilize the Concordia Bookstore. CSP employees receive a 10% discount on all items purchased in the bookstore.



View Policy