Appropriate Technology Use

USE OF COMPUTING AND NETWORK RESOURCES

PURPOSE

SUSLA computing and network facilities service a large number of faculty, students, staff, and others. In light of the legal responsibilities inherent in operation of such a system, the university has a number of areas of potential liabilities. This policy addresses the responsibilities of the users and the University.

POLICY

All users have the responsibility to use the University computing systems in an effective, efficient, ethical, and lawful manner. Use of SUSLA computer resources and computer network is not a matter of right, nor is it provided as a public forum, but rather all use of SUSLA computer resources and network must be consistent with the mission of the University in support of public education, research, and public service.

GUIDELINES

Security: The user is responsible for correct and sufficient use of the tools each computer system provides for maintaining the security of stored information. A summary of the security procedures relevant to the end users of computing resources is given below:

  • Computer accounts, passwords, and other types of authorization are assigned to individual users and should not be shared with others.
  • The user should select an obscure password and change it frequently.
  • The user should understand the level of protection each computer system automatically applies to files and supplement that protection, if necessary, for sensitive information.
  • The computer user should be aware of computer viruses and other destructive computer programs, and take steps to avoid being either their victim or propagator. 

Academic Freedom
Inappropriate Usage

SANCTIONS

Violation of the policies described herein for use of computing and network resources are dealt with seriously. Violators who are University faculty, students, or staff are subject to the disciplinary procedures of the University and, in addition, may lose computing privileges, including Student Residential Apartment and computer lab access, if applicable. Illegal acts involving SUSLA computing and networking facilities may also be subject to prosecution by state and federal officials. If applicable, violators may be prosecuted to the fullest extent of State and Federal laws.

REVIEW

This policy and procedure will be reviewed as needed by SUSLA Information Technology Center with recommendations for revisions presented to the Chancellor.

Effective Date:
July 31, 2002. Reissued October 1, 2003 (revised policy format) Reissued May 1, 2005 (revised scope statement) Reissued October 3, 2011 (revised title, policy, purpose, guidelines, sanctions, and review)

This website uses cookies to ensure site visitors get the best experience on our website. By continuing to use this site, you accept our use of cookies and Privacy Statement. To find out more, please visit Southern University's Privacy Statement.