[an error occurred while processing this directive]

CSULB Computer Use Policy, Sect 2

Last Modified: 02 Jul 96

Paper copies of this document are available from the Academic Senate office.


2. POLICY GOVERNING ACCESS TO AND USE OF CSULB COMPUTING RESOURCES

2.1. THREE BASIC RIGHTS

The right of access to University computing resources is analogous to, and in many ways an extension of, the right of access to the University library and other instructional facilities. Access to these resources is granted to an individual by California State University, Long Beach solely for the grantee's own use. Every user of CSULB computing resources has three basic rights regarding computing:

  • Privacy
  • Freedom of speech
  • A fair share of resources

It is unethical and a violation of this policy for any person to violate these rights.

All users, in turn, are expected to exercise common sense and decency (due regard for the rights of others) with respect to the public computing resources, thereby reflecting the spirit of community and intellectual inquiry at the University. Access is a right that may be limited or revoked if an individual misuses the right or violates applicable University policies or state or federal laws.

  • 2.1.1. Privacy

    Although not legally required to do so, CSULB computer and information services departments respect the privacy of all users. System administrators and their staff may not log onto a user's account or view a user's files without explicit permission from the user (for example by setting file access privileges). Exceptions arise when the user's account is suspected either of disrupting or endangering the security or integrity of any network systems or services or of violations of applicable University policies or federal or state law. Even then, the system administrator must normally obtain prior approval of the appropriate departmental administrator unless grave danger to the continued operation of the systems requires or reasonably appears to require emergency action.

    This does not preclude system administrators from maintaining and monitoring system logs of user activity. Moreover, automated searches for files that endanger system security or integrity are performed regularly to protect all our users. System administrators may take appropriate actions in response to detection of such files (typically removal of those files, and possibly suspension of the user's account until the matter can be resolved).

    Nonetheless, with hackers constantly probing for weaknesses in network security tools, it is unrealistic to consider anything placed on a computer that provides any services over the Internet to be truly private. Any message that you send over the network may, if you accidentally use an erroneous address, be routed to an unintended recipient. Moreover, the intended recipient may choose to forward your message to anyone without prior notice.

  • 2.1.2. Freedom of Speech

    CSULB respects the principle of academic freedom and does not attempt to censor authorized user's electronic messages or publications. If there is any doubt, users must include caveats to make it clear that they speak only for themselves, and not the University. Threats to or harassment of other users or groups whether on or off campus does not fall within the bounds of this protection and will not be tolerated. Also banned are flagrant actions which invite responses that could undermine CSULB's ability to operate on the Internet. Freedom of speech does not include the right to speak freely in an inappropriate forum nor does it provide the right to disrupt the activities of others.

  • 2.1.3. A Fair Share of Resources

    All users are entitled to their fair and appropriate share of the limited available resources such as disk space, computer time and remote access connect time. The University will provide access to digital information resources as appropriate, e.g. office computers, classroom and individual access to computer laboratories as well as access to Internet, email, World Wide Web, usenet, data sets, appropriate software and training in the use of these resources.

    Members of the University Community may be expected to provide for themselves off-site computing resources, e.g. personal computer, modem, dial-up services, etc.

2.2. PRINCIPLES GOVERNING USE OF COMPUTING RESOURCES

2.2.1. User access is granted to an individual and may not be transferred to or shared with another without explicit written authorization by the appropriate system administrator or designee.

This principle is intended to protect the integrity, security, and privacy of your account. Sharing access with another individual undermines the security of your account, leaving it vulnerable to abuse by others. By not sharing your account, you protect against unauthorized activities on your account, for which you would be responsible. You may be charged with a violation if someone uses your account with your permission and violates policy. Just as important, sharing or transferring access jeopardizes the security of the entire computing system.

2.2.2. User access to computing resources is contingent upon prudent and responsible use.

Imprudent use of computing resources can lead to consequences affecting many other users, not just yourself. For example, account sharing or spreading computer viruses could undermine the systems potentially destroying the work of many other users. Prudent and responsible use begins with common sense and includes respect for the rights and privacy of other users. For example, prudent and responsible users will protect their passwords by choosing them wisely, keeping them secure, and changing them regularly; will always remember to log off when leaving a terminal; will download backups of their most important files; and will always use virus protection software.

2.2.3. You may not use computing resources for any illegal or proscribed act.

In particular, the user may not use computing resources to violate any state or federal laws or any of the regulations specified in the Governing Regulations, the Administrative Regulations, the CSULB Regulations for Campus Activities, Organizations, and the University Community, the Rules of the University Senate, the Faculty Code, the University System Faculty Handbook, or the Staff Handbook, as applicable.

2.2.4. You may not use computing resources for any commercial purpose without prior written authorization from the appropriate Vice President.

Work under approved University contracts and grants is covered under the usual internal approval processes, which serve as the requisite "prior written authorization."

2.2.5. Computing resources must be shared among users in an equitable manner. The user may not participate in any behavior that unreasonably interferes with the fair use of computing resources by another.

Computing resources are finite and must be shared. During periods of peak demand, administrators may enforce guidelines to require sharing resources for the benefit of everyone. Some facilities may adopt stricter guidelines such as no game playing, no "chat rooms," and so on, if their systems cannot support these activities in addition to academic use.

Table of Contents | Next


CSULB Academic Senate, Educational Resources Committee
Subcommittee on Computer Policy, policy@csulb.edu