ISU Policies and Procedures ISU Home | A to Z Listing of Web Sites | Search
Home | Table of Content | A-Z Index | Search Handbook

Part 3. Services, Functions and Facilities Use

Section VIII. Information Technology (5-05)

C. Acceptable Use Policy

1. Mission Statement

The Idaho State University (ISU) Acceptable Use Policy establishes the standards for fair, responsible, and acceptable use of information technology systems while maintaining access for all authorized users.

2. Incorporated by Reference:

a. The definitions for IT policies, available at http://www.isu.edu/fs-handbook/part3/3_8/3_8a.html .
b. The General IT Policy (http://www.isu.edu/fs-handbook/part3/3_8/3_8b.html)
c. Faculty/Staff Handbook (http://www.isu.edu/fs-handbook/)
d. Student Code of Conduct (http://www.isu.edu/references/st.handbook/)

3. Policy Scope

The acceptable use policy applies to:

a. ISU's information technology (IT) systems, which may include, but are not limited to, information systems, networking and telecommunications systems, data processing hardware and software, data transmission equipment and transmission media, and data storage devices.

b. Information or data processed, stored, or transmitted across ISU's IT systems.

c. Authorized users and/or organizations that access ISU's IT systems.

4. Authority

The author of this policy is the Technology Oversight Council. The Technology Oversight Council (TOC) and the Academic Vice President review all changes and updates. Final approval and execution rests with the President of ISU in consultation with university counsel.

5. Policy

Idaho State University information systems exist to support the instructional, research, and administrative needs of the university. As such, these systems are critical to the institution and are part of the wider global Internet. As good citizens of the institution, the state, the country, and the world, users of these information systems must exhibit behavior that protects the resources for use by all.

a. The information systems of Idaho State University are to be used for activities in keeping with the university's mission and may include, but are not limited to

(1) Instruction, including classroom support;
(2) Research and creative activities;
(3) Administration;
(4) Exploration;
(5) Personal use that neither conflicts with state requirements nor impedes the previous four uses.

b. It is the intent of ISU to provide access to all authorized users. Given the critical nature of information systems, however, network and Internet use may be revoked as necessary, and in accordance with due process procedures, to protect the access of everyone. Therefore, users of the information systems must abide by the following policies:

(1)Users will comply with all ISU policies, and applicable federal or state laws and executive orders.

(2)Users will be responsible for their individual account(s) and will take all reasonable precautions to prevent others from being able to use their account.

(3) Computers and/or terminals will be secured when not in use by locking the screen or keyboard, logging off and/or shutting down the system.

(4)Users will be aware of the shared nature of network resources and perform their work accordingly, protecting the resources for all.

c. In addition to the above conduct that is required, the following conduct is not acceptable:

(1) Violation of federal law:

(a) Using ISU's IT system for illegal purposes.

(b) Attempting to harm other systems.

(c) Intentionally propagating computer viruses.

(d) Destruction or theft of private information.

(e) Using computers or networks to post or transmit libelous, harassing, or threatening messages to others.

(f) Any use of ISU's IT system to perform activities that illegally infringe on copyrighted material, including, but not limited to, software, text, images, audio, and video.

(i)Only software legal for use on ISU computers may be installed on ISU's computer systems.

(g) Sharing logons and passwords with others or providing access to unauthorized personnel.

(2) Violation of state laws or executive orders:

(a) Engaging in unauthorized commercial actions including, but not limited to, running a business off an ISU-based homepage or running advertisements of businesses.

(b) Using ISU's IT Systems for political lobbying as defined under federal or state law; however, users may use the system to communicate with elected representatives and to express their opinion on political issues.

(3) Violation of Idaho State University IT Policies:

(a) Engaging in any action that may cause harm to others or to ISU's IT system.

(b) Changing a device's IP address or MAC if not part of the individual's regular job responsibilities and/or such change causes conflict on the network.

(c) Attempting to access resources or data that are not authorized by one's role or job responsibilities.

(d) Attempting to alter ISU's computers or networks unless part of one's regular job responsibilities.

6. Electronic Mail Considerations:

a. Email is a critical tool for accomplishing university business. To maintain optimum use of this resource, certain forms of mass email must be managed:

(1) Using an ISU address as a basis for launching SPAM is not allowed.

(2) Sending mail to more than 100 addresses must be coordinated with the ITA or designee to assure effective network resource use.

(3) Those who regularly send messages to groups of ten or more are encouraged to use the mailman mailing list utility (http://help.isu.edu/index.php?action=knowledgebase&catid=13&subcatid=259&docid=490).

b. Mail to classes through Faculty/Staff Tools meets these requirements.


[ Table of Contents ] [ Back to Part 3 ]