Skip to Main Content
Navigated to Acceptable Use of Technology Policy.

PRP 2550 - ACCEPTABLE USE OF TECHNOLOGY POLICY

Issued by: Dr. Richard H. Rugen, Vice President for Administration and Finance
Effective Date: April 21, 2010

Purpose:

This policy addresses the use of university issued/owned information technology resources.

Bloomsburg University provides numerous information technology resources for use by the university’s students, faculty and staff. The term Information technology resources includes, but is not limited to, all university computing equipment, personal data assistants, cellular phones, storage devices and any electronic device issued by the university and intended for business purposes, as well as software, systems and networks. These resources are provided to support the university’s mission and institutional goals. The use of these systems is a privilege and all users are expected to act responsibly and to follow the university’s policies and any applicable local, state and federal laws (e.g. copyright, criminal use of communication device, harassment, etc.) related to the use of these resources.

Scope:

This policy applies to all users including faculty, staff, students, contractors and guest users of the Bloomsburg University computer network resources, equipment, or connecting resources. Use of the university’s information technology resources signifies agreement to comply with this policy.

While the university recognizes the role of privacy in an institution of higher learning and every attempt will be made to honor that ideal, there should be no expectation of privacy of information stored on or sent through university-owned information technology, except as required by state or federal law. For example, the university may be required to provide information stored in its information technology resources to someone other than the user as a result of court order, investigatory process, or in response to a request authorized under Pennsylvania’s Right-to-Know statute (65 P.S. §67.101 et seq.). Information stored by the University may also be viewed by technical staff working to resolve technical issues.

This policy is subject to the terms and conditions of the various collective bargaining agreements that apply to faculty and staff.

Policy:

A. Acceptable Use Of Information Technology Resources

Responsibilities of User of University Information Technology Resources:

  1. Respect the intellectual property rights of authors, contributors and publishers in all media;

  2. Protect user identification, password, information and system from unauthorized use;

  3. Report lost or stolen devices, including devices that contain private or university information to IT within 24 hours of discovery of the loss;

  4. Adhere to the terms of software licenses and other contracts. Persons loading software on any University computer must adhere to all licensing requirements for the software. Except where allowed by the university site licenses, copying software licensed for university use for personal use is a violation of this policy;

    Adherence to all other applicable university policies and/or terms of any collective bargaining agreement;

    To use the university information technology resources in a manner that complies with State and Federal law.

B. Prohibited Uses of University Information Technology Resources:

  1. Providing false or misleading information to obtain a university computing account, or hiding or disguising one’s identity to avoid responsibility for behavior in the use of information technologies;

    Unauthorized use of another user’s account;

    Attempting to gain or gaining unauthorized access to university information technology resources, or to the files of another;

    Performing any act(s) that impede the normal operation of or interfere with the proper functioning of university information technology resources;

    Interfering with the security mechanisms or integrity of the university’s information technology resources;

    Use of the university information technology resources to transmit abusive, threatening, or harassing material, chain letters, spam, or other communications prohibited by state or federal law;

    Copyright infringement, including illegal file sharing of video, audio, software of data;

    Excessive use that overburdens the information technology resources to the exclusion of other users;

    Excessive or prohibited personal use by employees;

    Use of the university information technology resources for personal profit, commercial reasons, non-university fundraising, political campaigns or any illegal purpose;

    The prohibition against using university information technology resources for personal profit does not apply to:
    i. Scholarly activities, including the writing of textbooks or preparation of other teaching material by faculty members; or
    ii. Other activities that relate to the faculty member’s professional development.
    iii. Other activities as approved by the University President

    Non-authorized solicitations on behalf of individuals, groups, or organizations are prohibited;

    Intentionally or knowingly installing, executing, providing to another, a program or file, on any of the university’s information technology resources that could result in the damage to any file, system, or network. This includes, but is not limited to computer viruses, Trojan horses, worms, spyware or other malicious program(s) or file(s).

Enforcement:

A university employee or student who violates this policy risks a range of sanctions imposed by relevant university disciplinary processes, ranging from denial of access to any or all information technology resources up to and including termination (for an employee) or dismissal (for a student). He or she also risks referral for prosecution under applicable local, state or federal laws.