Acceptable Network and Technology Use Policy

This policy covers the acceptable use of the Clarks Summit University computer systems, network, classroom technology, smartphones, and all other resources under the direction of the IT Department. These are collectively referred to as "technology resources" throughout this document.

This document outlines your expected behavior and the IT Department's expected responsibility for Students, Employees, Guests, and any user of any CSU technology.

Acceptable Network Usage Policy

Clarks Summit University (CSU) provides network access to the campus computing facilities, including electronic mail and the Internet. All uses of this network must conform to the CSU IT Policies. By connecting your computer, tablet, mobile phone or any device to CSU’s network, you agree to adhere to some additional standards. Violation of any of the following standards may result in your immediate disconnection from network service.

Legal issues and commercial use:

  • Do not use the system to place unlawful information on the Internet, to commit a crime or considered unethical.
  • Do not make copyrighted musical performances, movies, or images available to others with your connection.
  • Using any node on the network to break into another system is illegal and prohibited, regardless of whether the targeted system is on or off campus.
  • Commercial use is not allowed. This includes, but is not limited to, offering advertising on a web page and providing accounts on your machine to others.
  • You may not provide accounts, disk storage, or web pages to others, even if they are BBC&S students, regardless of whether you charge a fee or not.
  • It is unlawful to copy CSU owned or licensed software.
  • We reserve the right to refuse service to anyone who does not have a valid software license. This includes upgrades to new operating systems.
  • You may not use the network for purposes other than those intended by the BBC&S. Specifically, using it for personal financial gain or allowing access to unauthorized persons is expressly prohibited.

Shared Drives and directories:

  • Use of shared drives or network resources (printers, faxes, modems, scanners) is prohibited without the express permission of the owner of the resource.
  • No copyrighted software may be provided on a shared drive.
  • Be aware that if you share your drives or resources that others may be able to use them without your knowledge or permission. We strongly recommend that you not enable file or print sharing.

Traffic:

  • Activities that interfere with the ability of others to use the network are prohibited.
  • Excessive traffic levels that interfere with others ability to work will result in warnings and/or disabling of the offending network connection.
  • Both incoming and outgoing traffic are considered when traffic levels are analyzed. Traffic levels will be restricted when those levels interfere with others’ use of the network.
  • Streaming audio or video servers that are not owned and operated by BBC&S are not allowed.
  • We reserve the right to disconnect users without warning to protect the integrity and/or usability of the network.

Workstation Configuration and Network Administration:

  • Individuals may not set up Windows NT/2000/2003/2008 networks. All networks must be operated by the CSU. The campus regularly uses Windows 2003/2016 networks, and personal networks could severely impact the CSU network. The IP number assigned through our DHCP server must be used. Use of hard-coded or non-approved IP number is prohibited. IP numbers are subject to change without notice. Machines (servers) requiring consistent IP addresses and name services must coordinate these requirements with IT staff.
  • Non-CSU protocol servers, routers, or other related services or devices are not permitted. This includes, but is not limited to, DNS servers, DHCP servers, WINS servers, Macintosh seed router services, and hardware-based routers. No proxy servers of any type are allowed on non-CSU owned and operated machines.
  • No SMTP (mail) relaying is allowed. Relaying of mail must be disabled on all machines.
  • Non-CSU owned and operated FTP servers are not permitted.
  • Use of network administration tools are limited to CSU network technicians. This includes, but is not limited to, network monitors, sniffers, protocol analyzers, protocol decoders, printer administration tools, port scanners of any type, and SNMP tools.
  • The CSU reserves the right to monitor traffic levels and patterns and to investigate all anomalies to insure continued and reliable network performance. Use of the network provides implied consent to this activity.

Network Hardware:

  • No tampering with CSU computing equipment, computer stations, including the in-room jacks is allowed.
  • Wiring may not be split, re-wired, or otherwise re-configured or changed in any way.
  • Routers and wireless access points are not aloud to be used and if found will may result in the disabling of the port(s) and accounts using the device.

General:

  • Information Resources and Technology makes every effort to maintain network service to all areas of campus. However, we are not able to guarantee that no problems will occur. Please report all problems to the Help Desk and be patient when unplanned service interruptions occur.

Harassment

Harassment through electronic means is still harassment. Anyone using the network to harass others (as defined in CSU policy) will be subject to termination of connection as well as any other sanction deemed necessary by the CSU. Use of or connection to the CSU network constitutes acceptance of these policies. Any violations can result in disciplinary actions as described in the relevant Handbook, as well as the immediate loss of network access, including Internet and file server privileges.