[an error occurred while processing this directive]

Acceptable Computer and Network Use Policy

Part 1

  1. Introduction
  2. Rights and Responsibilities
  3. Existing Legal Context
  4. Enforcement

Part 2


Part 1

I: Introduction

This acceptable use policy governs the use of computers and networks on the CSUB campus. As a user of these resources, you are responsible for reading and understanding this policy. This document protects the consumers of computing resources and system administrators and the integrity of computing hardware and networks.

Top

II: Rights and Responsibilities

Computers and networks can provide access to resources on and off campus, and allow you to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Since electronic information is volatile and easily reproduced, users must exercise care in acknowledging and respecting the work of others through strict adherence to software licensing agreements and copyright laws.

Top

III. Existing Legal Context

All existing laws (federal and state) and University regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.

Users do not own accounts on University computers, but are granted use privileges. The privilege is accepted with the condition that system administrators and other University employees have the right to access user files when necessary to protect the integrity of computer systems or the rights or property of the University. For example, system administrators may examine or make copies of files that are suspected of misuse or that have been corrupted or damaged. User files may be subject to search by law enforcement agencies under court order if such files contain information which may be used as evidence in a court of law.

Misuse of computing, networking, or information resources may result in the loss of computing and/or network access. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Illegal production of software and other intellectual property protected by U. S. copyright law is subject to civil damages and criminal punishment including fines and imprisonment.

Other organizations operating computing and network facilities that are reachable via the CSUB network may have their own policies governing the use of those resources. When accessing remote resources from CSUB facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.

Top

IV: Enforcement

Minor infractions of this policy, when accidental, such as consuming excessive resources or overloading computer systems, are generally resolved informally by the unit administering the accounts or network. This may be done through electronic mail or in-person discussion and education.

Repeated minor infractions or misconduct which is more serious may result in the temporary or permanent loss of computer access privileges or the modification of those privileges. More serious violations include, but are not limited to unauthorized use of computer resources, attempts to steal passwords or data, unauthorized use or copying of licensed software, repeated harassment, and threatening behavior. In addition, offenders may be referred to the their sponsoring advisor, department, employer, or other appropriate University office for further action. If the individual is a student, the matter may be referred to relevant administrators for disciplinary action.

Any offense which violates local, state, or federal laws may result in the immediate loss of all University computing privileges and will be referred to appropriate University offices and/or law enforcement authorities.

Top

Part II

Conduct which violates this policy includes, but is not limited to the activities in the following list.

Top

[an error occurred while processing this directive]