Conditions for Use of Campus Computing Resources
Users are responsible for understanding and complying with the Conditions for using Shawnee State's systems, resources and networks (see SSU Policy 5.30).
Information security is critical to the interests of the University and the many constituencies it serves. As a result of the University's dependency on electronic information, it is critical that information and information systems be protected from unauthorized access and electronic attacks so the University can operate without interruption. Furthermore, it is paramount the University safeguards institutional data as well as protects personal information from unauthorized access.
Officially protected or confidential information created or maintained by the University or student academic records may only reside on systems or networks operated and maintained by ITS, without prior written authorization by the Director of ITS.
Confidential information is defined as that information which is not releasable to the public under state or federal law, and which could reasonably be used to perpetrate identity theft, constitute a serious and unwarranted invasion of personal privacy, compromise the physical security of university employees or property, or compromise the University's computer systems. Examples of "confidential information" include, but are not limited to, the following:
ITS has overall responsibility for the security of the University's information technologies. Implementation of security policies is the responsibility of all SSU supervisors, employees and students.
The President or the President's designee, upon recommendation by the Director of ITS, may authorize other networks solely for academic purposes which do not come under the supervision of ITS, provided the department understands its responsibility for the security of such networks under its domain of control and responsibility, and may not use the network to host officially protected or confidential information. These responsibilities include but are not limited to responsibility for general security issues, e.g., legal issues, security compliance and reporting, physical security, communications, and IT infrastructure security on wired and wireless networks. Authorization may be revoked if the President or President's designee finds the network is operating contrary to University policy or the law.
All academic and administrative offices within the University have the primary responsibility and authority to ensure their respective departments comply with University requirements for privacy and security of specific types of confidential information (e.g., student educational records, personnel records, health records, and financial transaction data). These units are responsible for general security issues (e.g., legal issues, security compliance, physical security and communications) as well as for completing risks assessments and assisting in the development of University IT security policies, standards and best practices in the areas of their responsibility.
Users who use University or personally-owned mobile devices to access University resources are responsible for the security of their data and are subject to the following:
Reporting Security Violations
Reporting suspected violations of the Conditions for Information Security is the responsibility of all members of the University community.
Examples of prohibited (actual or attempted) behavior include, but are not limited to:
Individuals are required to know and comply with additional Best Practices established by ITS, colleges, departments or other units. Failure to comply with these Practices may result in loss of computing privileges and/or disciplinary action.
Access to computer systems, resources and networks owned or operated by Shawnee State University is a privilege which imposes responsibilities and obligations and is granted subject to University policies as well as local, state, and federal statutes. These Conditions apply to all users who are granted access to the University's computing resources.
Use of the University's computing systems, resources and networks is granted solely to current Shawnee State University faculty, staff, enrolled students, and any others designated in writing by the President or Vice President of Business and Administrative Affairs. Use of these resources is limited to applications and activities appropriate to the user's role in the University. The University reserves the right to limit, restrict, extend or deny computing privileges and access to its resources.
The University reserves the right to test and monitor security, and review any files or information resident on University systems for unacceptable use. It is the expectation that all accounts assigned to authorized individuals will be treated as private by University employees charged with managing University computer systems, resources, and networks.
An account may be accessed without the user's permission upon authorization by the President or the President's designee for any employee placed on temporary or extended leave of absence, in order to secure documents or data. The University reserves the right to deny access to its computer systems, resources and networks until authorization to access the account is provided by the President or President's designee.
Access to some computer programs and network resources may require a written request. Access to information which is private or confidential may be restricted.
Employees who leave the institution shall have their accounts disabled, and then deleted after documents of a departmental nature are identified and archived. Those employees who have been terminated or have received notification of termination will be restricted from access to the system, unless authorized by the President or President's designee.
Access to some on-campus computers and to external networks requires a means to authenticate a user's identity, usually with a password. The user, or account owner, is responsible for all actions originating from an assigned account. Passwords to protected accounts may not be shared or used by anyone other than the assigned user.
Users given access to University computational resources shall be advised of their domain (resources available for their use). Users may not go beyond or attempt to go beyond their respective domain without authorization.
The installation/execution of games and/or recreational programs on Shawnee State systems excluding those required for academic coursework in designated labs intended for gaming is prohibited.
Use of Shawnee State computer systems, resources, networks and/or services for unauthorized commercial activities, including use of Internet facilities for any commercial activities, is prohibited.
ResNet provides a reliable, efficient connection to the Internet, but the drawback of this connection is that it provides an avenue for more people to reach one's computer. ITS provides as much protection as possible, but in order to help you must install Anti-virus and Spyware software and keep both definitions up to date on your computer.
Since ResNet/Wireless Network Access is an "always on connection" similar to commercial broadband, the University has a responsibility to both the ResNet/Wireless Network Participant, and the greater Internet community to protect them from each other. These rules are meant to help educate, inform, and provide an environment free of computer viruses and security attacks. They are meant to help foster a friendly, safe and clean network environment for ResNet/Wireless Network Participants. They are not optional.
Selection of inclusion is entirely at the discretion of the Participant, ITS, and Student Housing (ResNet). ResNet/Wireless Network is provided with the understanding that it serves primarily as an academic tool. The University reserves the right to limit or prohibit activities that might interfere with the primary function of the ResNet/Wireless Network.
ResNet will be periodically scanned to check for malicious activity. If issues are detected on a system, the owner of that computer will be notified of the action taken to resolve the problem and will be advised of the steps that must be taken to be re-connected to ResNet.
In order to reactivate a port after a virus or other malicious software has been removed, an appointment with a ITS Technician may need to be made for the Technician to verify that the hard drive has been cleaned.
All computers accessing or attempting to access the ResNet/Wireless Network must have an anti-virus with the anti-malware component software package installed with current definitions. If the participant's anti-virus software package does not have an anti-malware component then an anti-malware software program must be installed separately.
ITS provides a free copy of Symantec Anti-Virus with an anti-malware component free to all registered students, faculty and staff. This software package is available on the ITS Resource CD which can be picked up in the ITS office or can be downloaded through the network access control interface. Please review the ResNet Conditions prior to installing the software. Computers connected to ResNet via network access control must meet the following software prerequisites before authentication is complete.
Anti-Malware Software (if not a component of Anti-Virus software package)
Microsoft Security Updates (only applies if running Windows)
Shawnee State University utilizes a network access control application, which each Participant must download on his or her personal computer to have access to the ResNet/Wireless Network. This application ensures all requirements are satisfied.
Servers of any kind are not permitted on the ResNet/Wireless Network.
Servers open security holes on the network allowing attackers to gain unauthorized access to your computer and/or the ResNet/Wireless Network. They also may serve files to unauthorized persons without your knowledge or consent. Specific examples of servers are: Web servers, FTP servers, File sharing servers, Print servers, Database or Application servers.
Static IP's will not be permitted on any system connected to the ResNet/Wireless Network. ITS managed software will monitor IP addresses and assign them appropriately.
Network port scans by Participants are not permitted. Port scans may be performed by ITS to maintain the ResNet/Wireless Network. However, no ResNet/Wireless Network Participant is to perform a port scan of any host inside or outside of the ResNet/Wireless Network. This will be considered a network attack and ITS will respond accordingly.
Network attacks of any kind will not be tolerated. Network attacks are serious concerns to the University and ITS, and should be to the ResNet/Wireless Participant involved as well.
Dissemination of libelous or slanderous material on the SSU ResNet/Wireless Network is prohibited, as is the dissemination of material that has the purpose or effect of harassing one or more individuals based on their race, color, religion, sex (including sexual orientation, gender identity and gender expression), national origin, age, or disability. Material is considered harassing when it is sufficiently serious (i.e., severe, pervasive, or persistent) and objectively offensive so as to deny or limit a person's ability to participate in or benefit from the University's programs, services, opportunities, or activities.
Software and hardware devices that are currently prohibited by Shawnee State University and ITS will not be permitted on the ResNet/Wireless Network. Devices include wireless network products (i.e. Apple Airport), thin-clients, game consoles (i.e. Xbox, Playstations, etc), hubs, switches, routers, print servers, and network appliances.
ResNet/Wireless Network services and physical wiring may not be modified or extended for any reason. This applies to all network wiring, hardware, and in-room data jacks.
Participants must have a computer system that satisfies the minimum published requirements of the ResNet/Wireless Network program. For current minimum system requirements, click here.
Participants are reminded that sharing of copyrighted materials over the network such as software, music, images, videos, publications, or any other protected materials is a violation of federal copyright statutes and is strictly prohibited. Students who are cited in infringements notices under the Digital Millennium Copyright Act (DMCA) will have their ResNet/Wireless Network access suspended. Repeat violations will result in a judicial referral.
ITS staff may require access to a Participant's computer to maintain ResNet/Wireless Network operations. Participants agree to provide reasonable access to their system.
Participants agree to abide by the license agreements governing the use and distribution of the software provided by the University.
Participants are ultimately responsible for any and all network use or communication traffic originating from their personally-owned computer, regardless of the actual author of such traffic.
Participants connecting computers to the ResNet/Wireless Network or seeking technical assistance in order to connect computers to the ResNet/Wireless Network understand and agree that Shawnee State University, its contractors, employees, representatives and agents volunteering to help set up the computer assumes no responsibility for a Participant's loss of time, data or other loss due to unavailable network services or network outages. With full knowledge of the risks involved the Participant waives any claim whether in tort or contract, for any damage including but not limited to loss of data, programs, and hardware which may result from work, as well as suggested or required downloads on the Participant's personal computer. Furthermore, the Participant agrees to hold harmless, Shawnee State University, its contractors, employees, and agents from any liability of damages the Participant may incur or cause to others. In addition to this waiver of any claim of damages, the Participant agrees to assume the risks associated with computer assistance. The Participant agrees to this waiver, hold harmless agreement and assumption of risk without reservation and certify that the Participant has had the opportunity to ask any questions concerning the risks that might be involved with this computer assistance. ITS is charged with ensuring that Participants can connect their personally owned computers to ResNet/Wireless Network. Beyond network connectivity, it is at the discretion of the ITS staff the extent to which it will troubleshoot and/or resolve issues related specifically to the equipment. ITS does not provide repair services for personally owned computers, printers, or PDA devices.
To guide the deployment and usage of wireless networking on the SSU campus, to protect the security of SSU's information resources and electronic communications as well as to abate possible interference in the FCC unlicensed 2.4 GHz and 5 GHz radio frequency spectrum, Conditions for Wireless Installation and Usage 2.2 serve as a prerequisite to implementing and using wireless networks on the SSU campus.
The installation of any wireless access device on SSU networks by any individual or group other than University Information Services (ITS) is prohibited without prior authorization by the Director of ITS. Contact University Information Services at 740-351-3538, or via e-mail at email@example.com for wireless access point procurement, survey and installation.
Installation must comply with all health, safety, building, and fire codes.
Students may not install or operate wireless local area network (WLAN) access points in the residence halls or any other areas on campus.
ITS retains the right to enforce cessation of any unapproved access points, and/or disable network ports where unauthorized access points are found.
All IP addresses for the SSU WLAN will be assigned and maintained by ITS.
The Institute of Electrical and Electronic Engineers (IEEE) is responsible for defining and publishing telecommunications and data communications standards. ITS will use these standards as a basis for establishing and keeping current its wireless protocols for the campus.
University Information Services (ITS) will be the sole provider of design, specification, installation, operation, maintenance, and management services for all wireless access points on the SSU network. Departments wanting WLAN capability will schedule with ITS for installation and maintenance.
The use of other electronic data and telecommunication devices that occupy the same frequency as the SSU WLAN is discouraged on campus. In cases of significant problems, users of other devices will be required to cease using those devices.
ITS shall resolve frequency conflicts in a manner which is in the best interest of the University and its academic mission.
It is critical that ITS maintains the necessary security measures consistent with current network practices and procedures. All access points in the SSU WLAN will use a Service Set Identifier (SSID) maintained by University Information Services. All access points in the SSU WLAN will use authentication and security measures maintained by ITS.
The campus electronic communications system is designated as the primary means for distributing critical information to the University community. Unless otherwise provided in Collective Bargaining Agreements, any official communication to University users via campus electronic communications constitutes notice to the recipients.
Electronic mail (e-mail) is intended for communication between individuals and clearly identified groups of interested individuals, not for mass distribution.
Mass distribution is defined as sending an email to a group of University users, who have not otherwise indicated their desire to receive messages not directly related to their University position or University mission. Sending multiple copies of the same message to multiple groups is also mass distribution. Mass distribution of messages is permissible only for University business and official University-sponsored activities. Mass distribution of other non-University business and non-University-sponsored activities may be considered "spamming" and a violation of the Conditions for Use of Campus Computing Resources as determined by the President or President's designee.
A University email account may be accessed without the user's permission upon authorization from the President or President's designee for any employee placed on temporary or extended leave of absence, or otherwise is not reasonably available, in order to secure documents or communications essential to the mission.
Respect for the scholarly work and intellectual property rights of others is essential to the educational mission of any university. Shawnee State University, therefore, endorses the following 1987 EDUCOM/ADAPSO statement on Software and Intellectual Rights:
"Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media and publishers in all media. It encompasses respect for the right to acknowledgement, right to privacy, and right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against the violator."