The purpose of the CSP network is to support education, communication and research by providing access to unique resources and the opportunity for interaction and collaborative work on the Internet and through email and other applications. The following operations are acceptable uses of the computer network at CSP:

  • Instructional use in CSP classes
  • Faculty research
  • Student research
  • Class assignments
  • Official work of students, faculty, administration and staff, recognized student and campus organizations, and agencies of CSP
  • Electronic communication that supports instruction, research, or official work of students, faculty, administration and staff
  • Personal use by authorized users that does not interrupt or diminish access to resources for other users


Violations of Acceptable Use Policy

It is contrary to the CSP Acceptable Use Policy to engage in any of the following behavior:

  • Violate the “Statement of Software and Intellectual Rights.” Computer software must be used in accordance with license agreements, whether it is licensed to CSP or to them.
  • Violate the Federal Copyright Law by downloading copyrighted audio, video, graphics or text materials from the Internet without proof of proper licensing arrangements.
  • Use another person’s account or PIN or give your password, PIN or identification to another person for the purpose of gaining access to a university-owned computer, network or database resource. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended or use of another person’s email address. Changing another person’s password may be considered harassment.
  • Access a file on a university-owned computer or network without the permission of the owner to copy, rename, modify, examine or change file protection or visibility. Lack of protection on a file does not imply right of access.
  • Interrupt or inhibit the access of CSP technology resources by actions such as distributing computer viruses, worms, or bulk email — this includes any other procedures that interfere in any way with the information technology resources available to a user. Virus-scanning software is supplied and it is required for all student, faculty and staff to continually update their computers.
  • Employees should understand that text and graphic files available over the Internet may be considered offensive by some members of the CSP community. As potential consumers of these materials, users are expected to exercise proper judgment and sensitivity as to how and where these materials are displayed. Posting, viewing, downloading, or otherwise transmitting or receiving offensive, defamatory, pornographic, or sexually explicit material is strictly prohibited.
  • Operate a University-owned computer in a manner that is otherwise wasteful of any computing or network resource (for example, setting up file sharing servers/applications on the University network is not allowed).
  • Employ a computer to annoy or harass other users (for example, to send obscene, abusive, or threatening mail).
  • Use a computer to violate the principles of academic honesty
  • Misuse information accessed while performing work as a CSP employee. Information stored on administrative computers is confidential; use or distribution of such information other than as assigned is prohibited by University policy and state and federal laws.
  • Use or distribute any parts of CSP’s administrative records that are accessed unintentionally. These include, but are not limited to, information stored on disk, tape, hardcopy, microfilm as well as information on terminal screens.
  • Use University-owned computer resources for commercial work except as permitted by faculty and staff handbooks and licensing agreements.
  • Tamper with terminals, printers or any other associated University-owned equipment, or remove computer equipment, disks, paper or documentation from a computing facility. Equipment and software failures should be reported to the Office of Information Technology.
  • Gain access to CSP technology resources when one is no longer eligible.


Results of Failing to Follow Acceptable Use Policy

Failure to follow the policies set forth in this document constitutes an offense. As with all matters of law and ethics, ignorance of the rules does not excuse violations.

Authorized users learning of any policy violations should notify their immediate supervisor, who will notify the CIO and the appropriate division Vice President. Student violations will also be reported to the Dean of the student’s college.

  • Ethical policy abuses may result with immediate denial of service and penalties that range from the loss of computing privileges to suspension or expulsion from CSP (students) or termination of employment (Faculty & Staff).
  • Ethical policy abusers are liable for monetary payment and may also be liable for civil or criminal prosecution under state and federal statutes.
  • The Office of Information Technology will not provide support to users who fail to follow the Acceptable Use Policy.


Last modified: February 5, 2019