Southern Illinois University provides extensive computing and network communication services for students, faculty, staff and individuals affiliated with the University. As a provider of these services, the University acknowledges that there is a shared responsibility between the users of these services and the network provider. The goal of this policy is to establish a framework of accepted conventions regarding the use, management and governance of computing and network resources, while remaining cognizant of the principles of academic excellence to which the University continually strives.
This document constitutes the University policy for the management of computer networks, personal computers and the resources made available thereby. This policy is intended to reflect the academic and ethical principles of the University community and indicates, in general, the privileges and responsibilities of those using University computing and network resources.
University computing and network communication services resources are to be used to advance the University's mission of education, research, and public service. Faculty, staff, and students may use them only for purposes related to their studies, their responsibilities for providing instruction, the discharge for their duties as employees, their official business with the University, and other University sanctioned or authorized activities. The use of University computing resources and network communication services for commercial purposes including any sort of solicitation is prohibited, absent prior written permission of the appropriate University official(s). Use of University, computing resources for partisan political purposes is also prohibited.
The University acknowledges that occasionally faculty, staff, and students use University computing and network resources assigned to them or to which they are granted access for non-commercial, personal use. Such occasional non-commercial uses are permitted by faculty, staff, and students, if they are not excessive, do not interfere with the efficient operation of the University or its computing and network resources, and are not otherwise prohibited by this policy or any other University policy or directive.
Decisions as to whether a particular use of computing and network resources conforms with this policy shall be made by the Provost's Office if the use involves faculty or student academic matters, by the Office of Student Affairs if the use involves non-academic student use, and by the Department of Human Resources if the use involves administrators or staff.
Computing use shall include, but is not limited to, using University provided computers and networks or computer equipment to create, modify, manipulate or store files, information, or electronic media. This shall also include any creation, storage, manipulation or otherwise using electronic communications messages or email.
Computing resource users can facilitate computing at the University in many ways. Collegiality demands the practice of cooperative computing. It requires:
Computing resources may only be used for legal purposes and may not be used for any of the following purposes or any other purpose which is illegal, unethical, dishonest, damaging to the reputation of the University, inconsistent with the mission of the University, or likely to subject the University to liability. Impermissible uses (some of to which may also constitute illegal uses) include, but are not limited to, the following:
Access to and utilization of the computing resources and facilities provided by the University are a privilege and NOT a right; access to such resources and facilities may be withdrawn, limited, modified or curtailed if there is reason to believe that the user has or may have violated this policy or applicable local, state or federal law. Additionally, violation of this policy can result in further discipline under the appropriate processes and procedures set forth by the University or civil or criminal prosecution.
All users, as a condition of their access to or utilization of University computing or network services, agree to cooperate with and abide by University policies, regulations and guidelines, and applicable local, state and federal law. The user agrees to cooperate in an investigation of alleged improprieties or abuse of the privilege of using University computing services and waives any right of confidentiality. Any failure to cooperate fully with the University shall be considered a violation of this policy.
The user is responsible for correct and sufficient use of the tools available for maintaining the security of information stored on each computer system. The following precautions are strongly recommended:
The Southern Illinois University will assume that users understand and are aware that electronic files, data, and communications are not necessarily secure.
Users of electronic mail systems should be aware that electronic mail in its present form is generally not secure and is extremely vulnerable to unauthorized access and modification. The office of Information Technologies will make available to interested persons information concerning reasonable methods for attempting to protect information on central computing resources from loss, tampering, unauthorized search, or other access. Level of obtainable security will vary depending upon the system involved.
The University reserves the right to inspect and examine any University owned or operated communication system, computing resource, and/or files or information contained therein at any time, subject to the terms and conditions contained herein (viewing information in the course of normal system maintenance does not constitute disclosure). There shall be no expectation of privacy in the use of University computer resources.
When sources outside the University request an inspection and/or examination of any SIU owned or operated communication system, computing resource, and/or files or information contained therein, the University will treat information as confidential unless any one or more of the following conditions exist:
The Provost or designee may direct that an inspection and/or examination of any University owned or operated communication system, computing resource and/or files or information contained therein when:
The applicable University grievance policy is available to anyone who has been aggrieved by the decision of the Provost.
It is expected that all members of the University community will abide by the guidelines and policies set forth herein while pursuing University business, wherever located. Members of the University community who use networks, facilities, or computers not owned by the University shall adhere to this Acceptable Use Policy and all policies and procedures established by the administrators of non-University networks, facilities, or computers they use (policies and procedures can usually be obtained from the network information center of the network in question). Whether or not an external policy exists, this Acceptable Use Policy shall remain in effect and shall be adhered to by members of the University community at all times.
Electronic mail and communication have become an integral part of society, and have become indispensable to the members of the University community. Users should be aware of the weak privacy afforded by electronic communications and electronic data storage. Users should not commit confidential information to either, and understand that there is no expectation of privacy in such communications.
Electronic mail and other forms of communication should be used in responsible and courteous manner. Use of electronic mail, other communications services, or other network communications facilities to harass, offend, or annoy other users of the network is forbidden. All users need to be aware that material which is obscene, defamatory, or violates University policy on non-discrimination will not be tolerated. The University reserves all rights to take appropriate measures to prevent, correct, or discipline behavior that violates this policy.
Electronic mail communications which on University networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University when:
If the University inadvertently discovers messages or data files within its network that lead it to suspect the presence of illegal activities or activities which violate University policies, then the University will be free to use that discovered information to pursue investigations or inform the appropriate authorities.
Violations of this Policy shall subject users to the regular disciplinary processes and procedures of the University for students, staff, administrators, and faculty and may result in loss of their computing privileges. Illegal acts involving University computing resources may also subject violators to prosecution by local, state, and/or federal authorities.
As part of the services available through the SIU campus network, the University provides access to a large number of conferences, lists, bulletin boards, and Internet information sources. These materials are not affiliated with, endorsed by, edited by, or reviewed by the University, and the University takes no responsibility for the truth or accuracy of the content found within these information sources. Moreover, some of these sources may contain material that is offensive or objectionable to some users.
This policy is intended to be an addition to existing University rules and regulation and does not alter or modify any existing University rule or regulation.