University Policies

Image Caption
  • Policy Title: Acceptable Use of Technology
  • Policy Number: ESU-FA-2011-032
  • Effective: Date Not Provided
  • Adopted: April 11, 2012
  • Last Reviewed: N/A
  • Amended: N/A
  • Related Policies: Wireless Communications Stipend

Policy Statement:

Use of East Stroudsburg University (ESU) technology resources is a privilege and signifies agreement to comply with this policy.

Users are expected to act responsibly, and follow the policies and any applicable laws related to the use of technology resources.

The university reserves the right to limit, restrict, or extend technology privileges.

Technology resources are intended to support the university's instructional, research and administrative operations

    1. Acceptable Use Policy Defined
      1. An acceptable use of technology policy defines the capabilities and limitations of the use of information technology resources to insure that resources are available to all approved users and that the use of technology complies with state and federal laws.
      2. Technology resources include, but are not limited to, university owned or operated hardware, software, computing equipment, systems, networks, programs, personal data assistants, cellular phones, fax, telephone, storage devices, cable television, input/output, connective devices via either a physical or wireless connection regardless of the ownership of the device connected to the network, and any electronic device issued by the university.
    2. Privacy
      1. Users should have no expectation of privacy of information stored on or sent through the university-owned technology resources, except as required by law.
    3. Data Network Connectivity (Hard-Wired Connection)
      1. All equipment, devices and computers connected to the data network are the responsibility of the university's Computing Services division. Computing Services reserves the right, at its discretion, to limit, restrict or terminate the use of equipment or services, unauthorized or authorized, that Computing Services perceives to be an impediment or compromise to its ability to securely deliver the services for which it is responsible. Any devise that needs to connect to the data network must be authorized and configured by Computing Services. Personally owned equipment, except for equipment owned by residence hall students, is not permitted to connect to the data network without written permission from Computing Services.
    4. Wireless Network Connectivity
      1. A wireless network, where available, is provided as a convenience to any ESU authorized user. Personally owned devices may connect to the wireless network and, upon doing so, are subject to this acceptable use policy. Technology connecting to the wireless network is subject to a security scan to protect technology resources.
    5. Telephone Use (including FAX)
      1. The university recognizes there may be occasional times when personal calls must be made or received during business hours. Such calls are to be held to a minimum and must not interfere with the employee's work. When a long distance charge is required for a personal call the call must be billed to the caller's home phone number or the charge must be reimbursed to the university.
    6. Responsible Use of Technology
      1. Respect the intellectual property rights of authors, contributors and publishers in all media.
      2. Protect user identification, password, information and systems from unauthorized use.
      3. Report lost or stolen devices immediately upon loss.
      4. Use technology in compliance of state and federal laws.
      5. Adhere to the terms of software licenses.
      6. Notify Computing Services of possible misuse of technology or potential security holes.
    7. Prohibited Use of Technology
      1. Providing false or misleading information to obtain or use university technology resources.
      2. Unauthorized use of another user's account or attempting to gain access to another user's account.
      3. Sharing of accounts.
      4. Interfering with the normal operation, proper functioning, security mechanisms or integrity of technology resources.
      5. Use of technology resources to transmit abusive, threatening or harassing material, chain letters, spam, phishing scams or other communications prohibited by law.
      6. Copyright infringement including, but not limited to, illegal sharing of video, audio, software or data.
      7. Excessive use that overburdens the technology resources. Computing Services reserves the right to set limits on excessive use.
      8. Installing a server or running server software without written permission from Computing Services.
      9. Intentionally or knowingly installing or executing a program or file that could result in damage to university technology.

Reason for Policy:

To require and establish acceptable use of technology for all persons or entities who have access to the technological resources of East Stroudsburg University.

Definitions:

Appeal Statement:

N/A

Definitions:

N/A

Other Relevant Information:

Acceptable Use of Technology Procedures