ITS (Information Technology Services) is responsible for securing the University's network and computing systems in a reasonable and economically feasible manner against unauthorized access and/or abuse, while making them accessible for authorized and legitimate users. This responsibility includes informing users of expected standards of conduct. Any attempt to violate the provisions of this policy will result in immediate disciplinary action, regardless of the success or failure of the attempt. The disciplinary action may include permanent loss of all computer accounts, suspension (for students), dismissal (for employees), and/or legal prosecution. This disciplinary action may be administered by University Police (consistent with University policies) and/or the FBI.
The users of the network are responsible for respecting and adhering to local, state, federal and international laws. Users who violate any such laws will be subject to prosecution and/or litigation. If such an event should occur, the University will fully comply with any complainants to provide any information necessary for prosecution and/or litigation. Activities on the University network may be recorded and may be turned over to the appropriate legal authority.
SECTION 1: GENERAL COMPUTING POLICY
1.1 All computer systems that are the property of the State of South Carolina should only be used for work related business.
1.2 Any unauthorized, deliberate action which violates posted policy, damages or disrupts a computing system, alters its normal performance, or causes it to malfunction is prohibited regardless of system location or time duration.
1.3 Only software relevant to the users work related duties should be installed on a computer system. A list of software supported by ITS is available on request.
1.4 The copying or sharing of copyrighted materials, software, video and audio files (including MPEG files) without the express written permission of the owner or the proper licensing authority is prohibited.
1.5 Due to the increased risk of electronically transmitted viruses, it is suggested that software upgrades, installation files, and other executable files (*.exe files) should only be downloaded and installed from the Internet after consultation with ITS staff. This includes executable files (*.exe) attached to Electronic Mail messages, but does not include document files such as Word (*.doc) and Excel (*.xls). Individual users who do not confirm with this policy must take responsibility for all problems and issues that may subsequently arise.
1.6 Students must have Antivirus software such as Norton or McAfee on their computers. (An antivirus application is provided at no additional cost).
1.7 Students must update Antivirus program definitions regularly.
1.8 Students must update and patch their operating system regularly to ensure system integrity and security.
1.9 Use of computer systems, facilities and/or services for commercial purposes is prohibited.
1.10 The installation of non-university Routers, Bridges, and similar equipment is prohibited.
1.11 The installation of university Routers, Bridges, and similar equipment without the expressed consent of ITS is prohibited.
SECTION 2: NETWORK ACCOUNTS AND SECURITY
Once a user receives an id to access network and computer systems, the user is responsible for all actions taken while using that id. As a user of the network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Therefore:
2.1 Applying for a user id under false pretenses is prohibited.
2.2 Sharing your user id with any other person is prohibited. If someone else uses your user id, you will be responsible for the actions that other person appropriated. Sharing of user ids will result in the loss of all computer accounts through the University.
2.3 Using your machine as a server on the network (or any directory or file on your machine) is prohibited unless access is password protected. Any files considered public should be copied to an appropriate directory that is accessible from the network.
2.4 Deletion, examination, copying, or modification of files and/or data belonging to other users without their prior consent is prohibited.
2.5 Attempts to evade or change resource quotas are prohibited.
2.6 Continued impedance of other users through mass consumption of system resources, after receipt of a request to cease such activity, is prohibited.
2.7 Use of systems and/or networks to gain unauthorized access to remote systems is prohibited.
2.8 Use of systems and/or networks to connect to other systems, in evasion of the physical limitations of the remote/local system, is prohibited.
2.9 Use of systems and/or networks to copy or share copyrighted materials, software, audio and video files (including MPEG files) is prohibited.
2.10 Decryption of system or user passwords is prohibited.
2.11 The copying and/or modification of system files is prohibited.
2.12 Any intentional attempt to "crash" network systems or programs is prohibited.
2.13 Any attempt to secure a higher level of privilege on network systems is prohibited.
2.14 The willful introduction of computer "viruses" or other disruptive/destructive programs into the organization network or into external networks is prohibited.
2.15 Any attempt to intercept and/or monitor network traffic is prohibited.
SECTION 3: ELECTRONIC MAIL
3.1 The Use of E-mail on the network system is conditional upon the following:
3.2 The E-mail system is University property and should only be used for work related purposes.
3.3 The University reserves the right to monitor E-mail and Internet usage. (For students, please refer to the FERPA regulation at http://www.coastal.edu/registrar/ferpa.html)
3.4 There are no privacy rights in the creation, sending, or receipt of E-mail.
3.5 In response to system restrictions and space limitations, no pictures, graphics, movies, or any other E-mail file attachments should be in the system without a valid business reason.
Whenever you send electronic mail, your name and user id are included in each mail message. You are responsible for all electronic mail originating from your user id. Therefore:
3.6 Forgery (or attempted forgery) of electronic mail messages is prohibited.
3.7 Attempts to read, delete, copy, or modify the electronic mail of other users are prohibited.
3.8 Attempts at sending harassing, obscene or threatening email to another user is prohibited.
3.9 Attempts at sending junk mail, "for-profit" or chain email is prohibited.
SECTION 4: WIRELESS TECHNOLOGY
4.1 The office of Information Technology Services is responsible for managing the infrastructure of Coastal Carolina University Data Network, including wireless network access. Wireless Access Points (intended for colleges and departments) must be approved and registered prior to installation. Unapproved Wireless Access Points will not be allowed to connect to the campus network.
4.2 The installation of non-university Wireless Access Points, Routers, Bridges, and similar equipment without the consent of ITS is prohibited.
SECTION 5: NEW AND EMERGING TECHNOLOGIES
All technologies that are not currently in use and operated through ITS (or covered in this document) must be proposed and accepted by the appropriate committee (e.g. technology committees) and approved by ITS before they can be used on University resources. This includes all forms of video conferencing, reflector software, newsgroups, bulletin boards, and mailing lists.
SECTION 6: HARDWARE SANITIZATION
The Division of State Information Technology (DSIT) mandates that all equipment (e.g. computers and electronic media) that may contain intellectual property or personal information must be sanitized prior to transfer for other uses or for disposal. Departments should consult with their designated Information Resource Consultants (IRCs) prior to disposing of any computer equipment.