Skip to Content Skip to Footer

Violations

ITS

 

 

Every user of Clayton State University IT resources has an obligation to report suspected violations of the Appropriate Use Policy and its related policies,standards or guidelines. Reports should be directed to the HUB and/or the data owner responsible for the particular system involved. 

Users understand that any violation of this policy may call for corrective action as deemed necessary by the employee’s supervisor, department head, or Vice President. Policy violation by students will be addressed by Student Judicial Affairs. Violators may be subject to local, state and/or federal prosecution.

 

A violation (breach) or imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices, which may include, but are not limited to:

  • Widespread infections from virus, worms, Trojan horse or other malicious code
  • Unauthorized use of computer accounts and computer systems
  • Unauthorized, intentional or inadvertent disclosure or modification of sensitive/critical data or infrastructure
  • Intentional disruption of critical system functionality
  • Intentional or inadvertent penetration of firewall
  • Compromise of any server, including Web server defacement or database server
  • Exploitation of other weaknesses, known or unknown
  • Child pornography
  • Attempts to obtain information to commit fraud or otherwise prevent critical operations or cause danger to state or system or national security and
  • Violations of state or USG security policies or standards that threaten or compromise the security objectives of state or USG data, technology, or communications systems and,
  • Any violation of the “Appropriate Use Policy”