Information Technology Services

CSC Acceptable Use Policy

The Acceptable Use Policy applies to all individuals accessing or using college technology resources. This includes college students, faculty, staff, and authorized guests

Technology Resources

Technology resources include and are not limited to the following:

Use of Resources


All information processed through technology resources is considered sensitive and/or confidential. Access to this information is based on a legitimate "need to know". It is the responsibility of each college employee to ensure that no unauthorized disclosures occur.


The College provides and supports electronic resources to employees for effective performance of job duties.

Activity on systems and networks may be monitored, logged, and reviewed by system administrators or discovered in legal proceedings. All information created, stored, transmitted or received on college resources may be subject to monitoring by system administrators.

Inspection of an individual’s data on back-up media by college Information Technology personnel in the course of responding to a request from that individual for restoration of data shall not be deemed a violation of the individual's privacy.

College Rights

The college reserves the right to access, monitor, lock and disclose the contents and activity of an individual’s account and to access any college owned resources and any non-college owned resources, on college property, connected to the college wired or wireless network. This action may be taken to maintain the network’s integrity and the rights of others authorized to access the network. This action may be taken if the security of a computer or network system is threatened, other misuse of college resources is suspected, or the college has a legitimate business need to review such files. This action will be taken only after obtaining approval from a Cabinet level officer when there is a compelling need to know (court order, campus safety, policy violation, etc.).

Individual Rights


Each individual is responsible for the security and integrity of data stored on assigned devices and resources to which they have been authorized access, including but not limited to desktops, laptops, tablets, mobile devices. This includes:


Unauthorized actions include but are not restricted to the following:

Non-college use:


The College understands that on rare occasion use of college resources for non-work or non-college related purposes occurs. Such use is to be considered a privilege and not a right. An example is use of the phone for arranging daycare for a child. Such use is to be kept to a minimum, outside of regular working hours, and in no way is to interfere with work responsibilities. It is the supervisor’s right to determine what is appropriate.

Violation of campus policy will result in one or more of the following actions:

Individuals are encouraged to report suspected violations of policies to the Chief Information Officer. Individuals are expected to cooperate with system administrators during investigations of resource abuse and failure to do so may result in disciplinary action.

Discovery of misuse of resources by system administrators is to be formally reported in writing, with compelling evidence, to the Chief Information Officer who will conduct a review and make a recommendation for disciplinary action to the appropriate Cabinet officer.

The college has final authority to determine what constitutes acceptable use and the right to initiate disciplinary action.

Security Violation

In the event of an actual, suspected, or anticipated violation of resource security, designated system administrators may inspect any file on college resources without the individual's knowledge, in an effort to determine the nature and means of the violation and the perpetrator thereof. In order to protect the integrity of the investigation network activity may be monitored, directories and files may be reviewed, and accounts may be disabled until the conclusion of the investigation. Files will be backed up for the purpose of recovery if circumstances warrant.

Only those administrators named by the Chief Information Officer as being directly responsible for the security of college resources may use special privileges which permit the examination, copying or printing of files, programs, electronic mail, or other information in an account, without the individual’s prior permission. This shall apply equally to mail resident on servers which has not been retrieved by the individual.

The designated administrators may only use their special privileges in the event of a violation or reasonable suspicion of violation of computer security. A system administrator may not divulge any information obtained using special privileges to any person other than the Chief Information Officer who will take the appropriate action. If an individual suspects someone has attained access to his/her account, the incident should be reported to the Chief Information Officer immediately in order to initiate appropriate action.

Individuals must adhere to this Acceptable Use Policy in order to retain access to campus resources.

Effective: June 1990
Updated: June 13, 2005
Updated: November 16, 2015

Information Technology Web Page

Policy Reference Locations:
CSC Student Handbook
Employee Account Request Form