Computing Policies and Procedures


These are policy statements regarding the management of computer resources at Indiana State University. They reflect general privileges and responsibilities within the computing environment. Members of the University community will be provided central computing access to appropriate central and campus computing resources and their attached networks. Fees are charged for some services. The University will make its central and campus computing resources and networks available to users with the fewest interruptions possible. Anyone who uses the computing services of the University agrees by such use to comply with the expectations outlined here.

Security

Indiana State University will help its users protect their stored information from accidental loss, tampering, or unauthorized search or other access. The University regrets any inadvertent or non malicious actions resulting in the loss of or damage to that information, but the ultimate responsibility for prevention and resolution of such problems rests with the user.

Confidentiality

In general, information stored on computers is considered confidential, unless the owner intentionally makes that information available to other groups or individuals. Requests for disclosure of confidential information will be honored only when approved by University officials or when required by state or federal law. Except when inappropriate, computer users will receive prior notice of such disclosures.

Responsibilities of the User

Access to computing resources is a privilege to which all University faculty, staff and students are entitled, much like the privilege of using the ISU library system. Use of ISU computing resources is limited to purposes related to the University's mission of education, research, and public service. Certain responsibilities accompany that privilege and understanding them is important for all computer users. For example: Computer accounts, passwords and other types of authorization are assigned to users and should not be shared with others. The user should select an obscure account password and change it frequently.

Censorship

Free expression of ideas is central to the academic process. ISU computer system administrators will not remove any information from active individual accounts or from electronic bulletin boards maintained on them unless the appropriate system administrator determines that:

Illegal Usage

Computing resources may not be used for illegal purposes. Examples include:

The accidental or intentional introduction of a destructive program, such as a "virus", can have serious consequences. Users should be aware of the threat of viruses on networks and in public labs and use adequate protection against spreading them to their own machines. Both freeware and commercial antiviral programs are available from various sources. Any attempt to compromise the University computer security systems will not be tolerated.

Ethical Usage

Computing resources shall be used in accordance with the high ethical standards of the University community. Examples of unethical use, which also may involve illegality, include:

Reasonable Usage

Proper use follows the same standards of common sense, courtesy and restraint in the consumption of shared resources that govern use of other public facilities. It includes:

Activities like network games are lower priority and as such may be limited by Computing Services Personnel. Faculty, staff and non class-related student computer accounts are annually renewable. Unrenewed accounts are subject to deletion by the University. Class-related student computer accounts are deleted at the end of each term. Accounts assigned to students who are not enrolled for the current semester will also be deleted. The University reserves the right to delay, restart or cancel any job or program in order to improve system performance.

Sanctions

Violation of these policies will be dealt with seriously and will be subject to the disciplinary procedures of the University; in addition, the loss of some or all computing privileges may result. Illegal acts involving ISU computing resources may also be subject to prosecution by state or federal authorities. These University computing policies have been endorsed by ISU Information Technology, Academic Computing Advisory Committee, Administrative Software Coordinators, and the Faculty Affairs Committee of the ISU Faculty Senate.

Please report violations of ISU computing policies to the OIT Help Desk.