Computing Resources Acceptable Use
Computing Resources Acceptable Use
The following document outlines guidelines for use of computing systems operated for the GTU-Consortium or for individual member schools by Consortial IT Services (CITS). This includes any computer, printer, server or network supported by CITS. The purpose of these guidelines is to ensure that resources are used in an effective, efficient, ethical and lawful manner. Every network user is required to be familiar with this policy.
Individual network use will not interfere with others’ use and enjoyment of the network and will not violate the policies of any network accessed through the account. Accounts are to be used only for the purpose for which they are authorized and all users are responsible for protecting any information used via their accounts. This includes logins and passwords, as well as data accessed through or stored on the network.
Network use will comply with all Federal and State laws, school policies, and applicable contracts. This includes, but is not limited to, the following:
1. Any use of the network for illegal or unlawful purposes, including copyright infringement, peer to peer file sharing, obscenity, libel, slander, fraud, defamation, plagiarism, harassment, intimidation, forgery, impersonation, gambling, soliciting for pyramid schemes, and computer tampering is strictly prohibited. In addition, users are not allowed to install or run programs which reveal weaknesses in the security of any computer system, whether local or remote.
2. Computing resources may not be used in any way that violates school policies, rules, or administrative orders.
3. While your school may allow limited personal use of the network for communication with family and friends, independent learning, and public service, individuals should limit their personal use of these limited resources and not store personal information (i. e. pictures, movies, or music) on any CITS managed system.
4. Any use for mass unsolicited mailings, access for non-employees, non-work related commercial activity, and the dissemination of chain letters is prohibited.
Users are requested to report any observed weaknesses in computer security or incidents of possible misuse or violation of this agreement to the proper authorities by contacting CITS, or by sending an e-mail to email@example.com.
The network systems and services managed by CITS are owned by the member schools. Because of this, CITS reserves the right to access and review electronic files, messages, mail, and other digital archives, as necessary to ensure that no misuse or violation of any policy or law occurs.
If CITS discovers, or has good reason to suspect, activities that do not comply with applicable laws or policies, email and other records may be retrieved and used to document the activity in accordance with due process.
Use extreme caution when communicating confidential or sensitive information via email. Keep in mind that all email messages sent become the property of the receiver. A good rule of thumb is to not communicate anything that you wouldn’t feel comfortable being made public.
Any allegations of misuse should be reported promptly to CITS. If you receive an offensive email, do not forward, delete, or reply to the message without consulting CITS.
Failure to Comply
Allegations of misconduct will be handled according to established procedures. Sanctions for inappropriate use of the network may include, but are not limited to, one or more of the following:
1. Temporary or permanent revocation of access to some or all computing and networking resources and facilities.
2. Disciplinary action according to applicable school policies.
3. Legal action according to applicable laws and contractual agreements.
It is understood that CITS will update this policy periodically.