This document defines the campus policy for the acceptable use of Clayton State University’s (CSU) computing resources used by faculty, students, staff and guests. Modifications, corrections, exceptions, or changes to this policy may only be made by the Vice President for Information Technology and Services, with approval from the President of the University. The following guidelines are intended to clarify existing laws, agreements, and regulations.
Users will preserve the privacy of information belonging to other individuals that is stored using CSU computing resources. Users agree not to acquire, modify, or distribute any information belonging to another individual without explicit permission. Users recognize that CSU is subject to FERPA (Buckley Amendment) regulations regarding the privacy of student records and that CSU is funded and regulated by the State of Georgia and is therefore subject to the Georgia Open Records Act.
Users agree not to utilize computing resources owned, leased, or maintained by CSU for personal private financial gain.
Users agree not to take any actions that constitute inappropriate behavior including, but not limited to the following:
Users must abide by patent and/or copyright restrictions that relate to the use of computer facilities, products, files, programs, or documentation. Users may not copy or modify licensed software, files, and/or accompanying materials without expressed consent. Users may not use any computing resources belonging to Clayton State University for the purpose of violating terms of any software license agreement or any applicable local, state, or federal laws.
It is against state policy to create, access or transmit material considered sexually explicit, pornographic, discriminatory, offensive, threatening, harassing or intimidating.
Users understand that any violation of this policy may call for corrective action as deemed necessary by the employee’s supervisor, department head, or Vice President. Policy violation by students will be addressed by Student Judicial Affairs. Violators may be subject to local, state and/or federal prosecution.
For the purpose of this document, the phrase “computing resources” includes, but is not limited to, computers, files, networks, electronic mail, and Internet access, that is owned, leased, and/or maintained by CSU.
A User is any person who utilizes CSU owned or leased computing resources, including, but not limited to faculty, staff, students, temporary employees, and contract labor. The user is responsible for the conduct of any person that the user allows to use CSU computing resources.
Acceptable use refers to the use of computing resources, as outlined in this document, in a manner consistent with Clayton State's mission for education, research and service.
The following URLs contain additional policy, copyright and security information:
Computer, Network, and Information Security Policy and Plan:http://www.clayton.edu/nes/policiesandprocedures/securitypolicyandplan
Computer, Network, and Information Security Policy FAQ:http://www.clayton.edu/nes/policiesandprocedures/securitypolicyandplan
Clayton State Peer-to-Peer and Copyright Policy:http://www.clayton.edu/nes/policiesandprocedures/copyright
CSU Surplus Computer Policy: http://www.clayton.edu/operation-services/surplus
Regents Guide to Understanding Copyright and Fair Use http://www.usg.edu/copyright/
Digital Millennium Copyright Act (Requires Adobe Acrobat Reader)http://www.copyright.gov/legislation/pl105-304.pdf