Use of IT Resources: Students

  Document Title

Acceptable Use Policy for Students

Executive Summary

Computing is an integral part of the academic, business, and personal experience of University life of college students as we know them today. The on-campus resident student will almost certainly use the campus computing infrastructure while in class and in their residential campus home. The commuting student will also use the facilities while attending class or conducting class related activities. While enjoying the many benefits of the advanced nature of the campus computing facilities and network infrastructure, there comes some basic expectations of use.

This document outlines the basic expectations of Clemson University on how the student will interact with the campus computing systems. Each student is expected to conduct his/her computing needs in a manner that in no way jeopardizes the availability of the campus system or any connected system whether owned by the university or some other entity. The computing resources at Clemson University are the property of Clemson University. Clemson University reserves the right to take all necessary measures either proactively or in reaction to an event or the possibility of an event to protect those computing resources.

Additionally Clemson University strictly prohibits the use of its computing facilities to engage in, participate in, or be party to any illegal activity. The university will monitor its systems in order to protect against such.

Any violation of this policy will result in corresponding disciplinary action by the university. Students suspected to be in violation of this policy will be reported to the appropriate investigative and/or disciplinary unit, including but not limited to, the Office of Student Conduct or the University Police Department.

All student users of the computing facilities of Clemson University are expected to be familiar with this policy and agree to adhere to it prior to using any computing related facilities.  Acceptance will be required before registering any personal computer on the campus network.

Purpose

Clemson University is dedicated to providing a safe, reliable and robust information technology infrastructure for faculty, staff and students. In doing so, there are some general expectations of acceptable use of the computing systems located or connected to Clemson University to ensure that the computing systems maintain their highest level of efficiency and reliability. Many university functions rely heavily on the accessibility of computing systems and the university must take every reasonable action to protect them.

Policy

Use of university computing resources, including network facilities, account numbers, data storage media, printers, plotters, microcomputer systems, and software for computing activities other than those authorized by the university is strictly prohibited. Unauthorized use of such resources is regarded as a criminal act in the nature of theft and violators are subject to suspension, expulsion, and civil and criminal prosecution.

The following are examples of misuse of computing resources:

  1. Unauthorized duplication, distribution or alteration of any licensed software. This includes software licensed by the university and licensed software accessed using the computing networks.
  2. Attempting to gain unauthorized access to any computing resource or data, or attempting to disrupt the normal operation of any computing resource or network — at Clemson or anywhere on the Internet,
  3. Attempting to use another student’s or employee’s computer account or data, without their permission.
  4. Using the university electronic mail system to attack other computer systems, falsify the identity of the source of electronic mail messages. Sending harassing, obscene or other threatening electronic mail. Attempting to read, delete, copy or modify the electronic mail of others without their authorization. Sending, without official university authorization, “for-profit” messages, chain letters or other unsolicited “junk” mail.
  5. Knowingly infecting any computing resource with a software virus.
  6. Tampering with the university computer network or building wiring or installing any type of electronic equipment or software that could be used to capture or change information intended for someone else.
  7. Participating in a “denial of service” attack on any other computer, whether on or off campus.
  8. Using university computing or network resources for personal gain or illegal activities such as theft, fraud, copyright infringement, piracy (e.g., sound or video recording), or distribution of child pornography or obscenities.

Communications

  • President
  • Provost
  • Vice Presidents
  • Vice Provosts
  • Deans
  • Directors/Department Heads
  • All Faculty, Staff, and Students

General Guidelines

Clemson University computing resources are the property of Clemson University, to be used for university-related business. Students have no expectation of privacy when utilizing university computing resources, even if the use is for personal purposes. The university reserves the right to inspect, without notice, the contents of computer files regardless of medium, the contents of electronic mailboxes and computer conferencing systems, systems output such as printouts, and to monitor network communication when:

  1. It is considered reasonably necessary to maintain or protect the integrity, security or functionality of university or other computer resources or to protect the university from liability;
  2. There is reasonable cause to believe that the users have violated this policy or otherwise misused computing resources;
  3. An account appears to be engaged in unusual or unusually excessive activity;
  4. It is otherwise required or permitted by law.

Any suspected violations of this policy or any other misuse of computer resources by students normally should be referred to the Office of Student Conduct. That office will investigate the allegations and take appropriate disciplinary action. Violations of law related to misuse of computing resources may be referred to the appropriate law enforcement agency.

Notwithstanding the above, Clemson Computing and Information Technology may temporarily suspend, block or restrict access to an account, independent of university disciplinary procedures, when it appears reasonably necessary to do so in order to protect the integrity, security or functionality of university or other computer resources, to protect the university from liability, or where the emotional or physical well-being of any person is immediately threatened. When CCIT unilaterally takes such action, it will immediately notify the account holder of its actions and the reason for them in writing. The account holder may appeal the action taken by CCIT in writing to the Chief Information Officer.

Access will be restored to the account holder whenever the appropriate investigatory unit of the university determines that the protection of the integrity, security or functionality of university or other computing resources has been restored and the safety and well being of all individuals can reasonably be assured, unless access is to remain suspended as a result of formal disciplinary action imposed through the Office of Student Conduct or as a result of legal action.

References and Related Documents

Username and Password Policy

Revisions

January 2009

Approvals

IT Council

Information Security &
Privacy at Clemson

The Office of Information Security and Privacy is part of CCIT's Customer Services & Information and Privacy department, led by Hal Stone.

In addition to overseeing CCIT information policies and standards, the group serves to inform users and support personnel of possible threats to Clemson University computing resources and to disseminate recovery information quickly so that minimum downtime is experienced.

Information Security &
Privacy at Clemson

The Office of Information Security and Privacy is part of CCIT's Customer Services & Information and Privacy department, led by Hal Stone.

In addition to overseeing CCIT information policies and standards, the group serves to inform users and support personnel of possible threats to Clemson University computing resources and to disseminate recovery information quickly so that minimum downtime is experienced.