IT Appropriate Technology Use(Inappropriate Usage)

Inappropriate Usage

Computing and networking resources should be used only in accord with the guidelines defined in this policy and procedure. Examples of inappropriate and unacceptable use of computing and networking resources include, but are not limited to:
  • Harassment of other users. 
  • Destruction of or damage to equipment, software, or data belonging to SUSLA or other users. 
  • Disruption or unauthorized monitoring of electronic communications. 
  • Violations of computer system security. 
  • Unauthorized use of computer accounts, access codes, passwords, or other network identification words or numbers assigned to others. 
  • Use of computer and/or network facilities in ways that impede the computing activities of others, including randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, overuse of network accessible bulletin boards or conferences, and the "off topic" posting of materials to bulletin boards or conferences.
  • Use of computing facilities for business purposes of the user. 
  • Use of Student Apartments network access to conduct business for any purpose is strictly prohibited. Violators will be subject to loss of network services to their residence while a student at SUSLA. 
  • Violations of trademarks, patents, or copyrights and violation of software license agreements. (Refer to policies of the university.) 
  • Violation of the usage policies and regulations of the network that SUSLA is a member of or has authority to use. 
  • Violation of another user's privacy. 
  • Academic dishonesty (e.g., plagiarism or cheating). 
  • Commercial advertising or political campaigning. 
  • Violation of applicable laws, regulations, or policies. 
  • Persons may not obtain or use or attempt to obtain or use passwords, IP addresses or other network codes that have not been assigned to them as individuals or authorized for their use as University employees. Persons may not obtain or attempt to obtain unauthorized access to computer accounts, software, files, or any other University technology resources. 
  • Persons may not alter or intentionally damage software or data belonging to someone else or interfere with another person's authorized access to technology resources. Users may not intentionally disrupt or damage University computers or networks in any way. 
  • Users of University technology resources may not send electronic messages with the sender's identity forged or send anonymous messages unless the recipient has agreed to receive anonymous messages. 
  • Persons may not use University technology resources to sell or solicit sales for any goods, services or contributions unless such use conforms to SUSLA rules and regulations governing the use of University resources and has been approved, in writing, by the Chancellor. 
  • University employees and students may not use these resources to support the nomination of any person for political office or to influence a vote in any election or referendum. No one may use University technology resources to represent the interests of any non-University group or organization unless authorized by an appropriate University department, and approved by the Chancellor.

This website uses cookies to ensure site visitors get the best experience on our website. By continuing to use this site, you accept our use of cookies and Privacy Statement. To find out more, please visit Southern University's Privacy Statement.

I agree