Southern Illinois University Edwardsville (SIUE) provides extensive computing and network communication services for students, faculty, staff and individuals affiliated with the University. As a provider of these services, the University acknowledges that there is a shared responsibility between the users of these services and the network provider. The goal of this policy is to establish a framework of accepted conventions regarding the use, management and governance of computing and network resources, while remaining cognizant of the principles of academic excellence to which the University continually strives. While the responsible use of computer resources is ultimately the responsibility of each user, the oversight of this policy lies with the office of the Associate Vice Chancellor for Information Technology and Chief Information Officer.
University computing and network communication services resources are to be used to advance the University's mission of education, research, and public service. Faculty, staff, and students may use them only for purposes related to their studies, their responsibilities for providing instruction, the discharge of their duties as employees, their official business with the University, and other University sanctioned or authorized activities. The use of University computing resources and network communication services for commercial purposes including any sort of solicitation is prohibited, absent prior written permission of the appropriate University official(s). Use of University computing resources for partisan political purposes is also prohibited.
The University acknowledges that occasionally faculty, staff, and students use University computing and network resources assigned to them or to which they are granted access for non-commercial, personal use. Such occasional non-commercial uses are permitted by faculty, staff, and students, if they are not excessive, do not interfere with the efficient operation of the University or its computing and network resources, or are not otherwise prohibited by this policy or any other University policy or directive.
Classification of Use
Decisions as to whether a particular use of computing and network resources conforms with this policy shall be made by the Provost's Office if the use involves faculty or student academic matters, by the Office of Student Affairs if the use involves non-academic student use, and by the Office of Human Resources if the use involves administrators or staff.
Computing use shall include, but is not limited to, using University provided computers, computing resources and networks or computer equipment to create, modify, manipulate or store files, information, or electronic media. This shall also include any creation, storage, manipulation or otherwise using electronic communications messages or email.
Computing resource users can facilitate computing at the University in many ways. Collegiality demands the practice of cooperative computing. It requires:
Computing resources may only be used for legal purposes and may not be used for any of the following purposes or any other purpose which is illegal, unethical, dishonest, damaging to the reputation of the University, or likely to subject the University to liability. Impermissible uses (some of which may also constitute illegal uses) include, but are not limited to, the following:
Access to and utilization of the computing resources and facilities provided by the University are a privilege and NOT a right; access to such resources and facilities may be withdrawn, limited, modified or curtailed if there is reason to believe that the user has or may have violated this policy or applicable local, state or federal law. Additionally, violation of this policy can result in further discipline under the appropriate processes and procedures set forth by the University or civil or criminal prosecution.
All users, as a condition of their access to or utilization of University computing or network services, agree to cooperate with and abide by University policies, regulations and guidelines, and applicable local, state and federal law. The user agrees to cooperate in an investigation of alleged improprieties or abuse of the privilege of using University computing services and waives any right of confidentiality. Any failure to cooperate fully with the University shall be considered a violation of this policy.
Responsibilities of Users
The user is responsible for correct and sufficient use of the tools available for maintaining the security of information stored on each computer system. The following precautions are strongly recommended:
SIUE will assume that users understand and are aware that electronic files, data, and communications are not necessarily secure.
Privacy and Confidentiality
The University reserves the right to inspect and examine any University-owned or operated communication system, computing resource, and/or files or information contained therein at any time, subject to the terms and conditions contained herein (viewing information in the course of normal system maintenance does not constitute disclosure). There shall be no expectation of privacy in the use of University computer resources.
When sources outside the University request an inspection and/or examination of any SIUE-owned or operated communication system, computing resource, and/or files or information contained therein, the University will treat information as confidential unless any one or more of the following conditions exist when:
The Provost, or designee, may direct an inspection and/or examination of any University-owned or operated communication system, computing resource and/or files or information contained therein when:
The applicable University grievance policy is available to anyone who has been aggrieved by the decision of the Provost.
Computers and Network Systems: SIUE Network Defined
The term SIUE Network is used here to denote the campus computer and data communications infrastructure at SIUE. It includes the campus backbone and local area networks, all equipment connected to those networks (independent of ownership), and all equipment registered to any domain name owned by the University and hosted systems. When connecting to the SIUE network, all devices become part of the SIUE Network and are subject to the policies set forth herein regardless of connection type (e.g. wired, wireless, or virtual private network).
It is expected that all members of the University community will abide by the guidelines and policies set forth herein while pursuing University business, wherever located. Members of the University community who use networks, facilities, or computers not owned by the University shall adhere to this Responsible Use Policy and all policies and procedures established by the administrators of non-University networks, facilities, or computers they use. Whether or not an external policy exists, this Responsible Use Policy shall remain in effect and shall be adhered to by members of the University community at all times, when using University resources or data.
Electronic mail and communications have become an integral part of society, and have become indispensable to the members of the University community. Users should be aware of the weak privacy afforded by electronic communications and electronic data storage. Users should not commit confidential information to either, and understand that there is no expectation of privacy in such communications.
Electronic mail and other forms of communication should be used in a responsible and courteous manner. Use of electronic mail, other communications services, or other network communications facilities to harass, offend, or annoy other users of the network is forbidden. All users need to be aware that material, which is obscene, defamatory, or violates the University's Non-Discrimination and Non-Harassment Policy will not be tolerated. The University reserves all rights to take appropriate measures to prevent, correct, or discipline behavior that violates this policy.
Electronic mail communications on University networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University when:
If the University inadvertently discovers messages or data files within its network that lead it to suspect the presence of illegal activities or activities which violate University policies, then the University will be free to use that discovered information to pursue investigations or inform the appropriate authorities.
Examination of Contents of Electronic Messages and Files
System Files and Logs: In the course of resolving system performance or security problems, system administrators may examine the contents of files that control the flow of tasks through the system or that grant unauthenticated access to other systems. This includes system logs that document some activities of users.
Process for Requesting Disclosure of Contents of Messages and Files
Violations of this policy shall subject users to the regular disciplinary processes and procedures of the University for students, staff, administrators, and faculty and may result in loss of their computing privileges. Illegal acts involving University computing resources may also subject violators to prosecution by local, state and/or federal authorities.
As part of the services available through the SIUE campus network, the University provides access to a large number of conferences, lists, bulletin boards, and Internet information sources. These materials are not affiliated with, endorsed by, edited by, or reviewed by the University, and the University takes no responsibility for the truth or accuracy of the content found within these information sources. Moreover, some of these sources may contain material that is offensive or objectionable to some users.
Existing University Rules and Regulations
This policy is intended to be an addition to existing University rules and regulation and does not alter or modify any existing University rule or regulation.
Approved by Chancellor effective 1/11/13
This policy was issued on February 26, 2013.
Document Reference: 2D4 & 3C10
Origin: OC 1/11/13