OFFICE OF RECORD: Computing Services
ISSUED BY: CIO and Director of Computing Services
EFFECTIVE DATE: 02-13-87 (Revised 6/04/13)
APPROVED BY: David Borofsky 03-61-00
This policy is intended to provide direction for the use of computing hardware, facilities, software, networks, and other information technology resources associated with or accessible from Dakota State University.
The use of computers and related technologies, including all hardware and software, is a privilege. The University's CIO/Director of Computing Services is authorized to extend access to the University's computing services and related hardware and software to members of the faculty and staff; members of the student body; participants in workshops, short courses and similar approved activities and projects; or members of an entity that has contracted for the use of DSU's computing resources.
Charges for the use of computing services may be assessed by the CIO/Director of Computing Services with the approval of the President. (See DSU Policy 01-76-00 Facility Use and Rental and DSU Policy 03-62-00 Tablet Repair Services/Replacement)
It is expected that all faculty, staff, students and campus guests will use any software (whether or not it is supplied by Dakota State University) only in accordance with license agreements and copyright provisions applicable to the specific software package.
All users of the University's computing environment must comply with all pertinent DSU and Board of Regents policies and local, state and federal laws. The use of DSU facilities by any individual whose sole purpose is to make a profit is prohibited, except as outlined in DSU Policy 01-76-00 Facility Use and Rental.
Individuals who physically damage computing hardware and facilities are subject to University fines, sanctions and discipline, as appropriate and as detailed below. (See DSU Policy 03-62-00 Tablet Repair Services / Replacement.)
All persons who use computing facilities and services provided through Dakota State University must comply with the following rules:
- Users will comply with all provisions of software copyrights.
- Users will utilize computing, network, and video-conferencing resources only for authorized administrative, educational, research or other scholarly activities, or a project approved by the CIO/Director of Computing Services.
- Users will abide by University directives relative to consumption of bandwidth.
- Users will abide by the EDUCOM Code - A Guide to the Ethical and Legal Use of Software for Members of the Academic Community, which has been adopted by Dakota State University. ( http://net.educause.edu/ir/library/html/code.html )
- Users will also abide by the "acceptable use" policy of any organization or agency whose network is accessed through the University's computing and communications environment.
- Users will abide by more stringent rules imposed by DSU colleges, academic programs, courses, or groups.
As indicated above, individuals accessing the University's computing environment are expected to exhibit ethical use and behavior relative to those services and resources. Unacceptable behavior includes, but is not limited to, the following items. (Approval to conduct one of the uses or behaviors listed below may be granted by the CIO if it is needed to support an academic activity.)
- Excessive consumption of bandwidth or excessive email traffic, particularly during high usage times.
- Modifying, attempting to modify, or removing computer equipment, software, or peripherals.
- Modifying or attempting to modify operating systems or files without proper authorization.
- Establishing or attempting to establish server or server-like functions on any equipment connected to the University's network or housed in University facilities.
- Accessing or attempting to access computers, computer networks, computer software, or computer files of any other user without the explicit, prior consent of the other user. The capability to access does not imply the authority to access. NOTE: This prohibition applies, regardless of whether the computer used for access or the computer accessed is owned by the University. (See related DSU Policy 03-22-00 Academic Integrity) Any willful, unauthorized access is a violation of the ethical standards of Dakota State University and may also be a violation of state or federal statutes. Violations will be subject to the penalties listed in those statutes.
- Circumventing or attempting to circumvent normal resource limits, login procedures, and security regulations.
- Using computing facilities, computer accounts, or computer data for purposes other than those for which they were intended or authorized.
- Sending any fraudulent electronic transmission.
- Using the University's computing, network, and video-conferencing resources to harass or threaten others. (See DSU Policy 02-81-00 Sexual Harassment, BOR Policy 1:17 Sexual Harassment and BOR Policy 3:4 Student Disciplinary Code)
- Physically interfering with or encroaching on another user's authorized access to the University's computing, networking, and video-conferencing facilities.
- Excessive printing or storage of documents, files, data, or programs.
Consequences of Unacceptable Behavior
Dakota State University will take appropriate disciplinary action against any employee, student or facility user who knowingly violates any provision of this policy. Such discipline shall not exempt the individual from applicable civil or criminal remedies available through federal or state judicial proceedings.
Dakota State University faculty, staff, students and facility users who learn of any misuse of computing facilities, hardware, software or related documentation, unauthorized information access, or inappropriate behavior should immediately notify the CIO/Director of Computing Services. The CIO/Director of Computing Services will take immediate steps to verify the facts associated with the reported misuse and ascertain the circumstances of the reported or observed incident.
Upon notification of the misuse, the CIO/Director of Computing Services may immediately suspend the computing privileges of any/all persons involved in the incident and a report of that suspension will be provided to the appropriate institutional vice president (as indicated below) within two (2) working days of the suspension action. Within seven (7) working days, the appropriate institutional vice president (as indicated below) must either initiate formal disciplinary proceedings or reinstate the computing privileges. The CIO/Director of Computing Services may ask other campus personnel for assistance in preparing a report of the misuse or suspected misuse to the appropriate institutional vice president.
Any formal disciplinary action will be taken following appropriate policies including, but not limited to, BOR Policy 3:4 Student Disciplinary Code, BOR Policy 4:14 Faculty Code of Professional Conduct, BOR Policy 1:17 Sexual Harassment and/or Administrative Rules of South Dakota, 55:01:12 Disciplinary Actions for Career Service Employees, and DSU Policy 03-22-00 Academic Integrity. The Director of Human Resources will be involved in discussions and decisions relative to formal disciplinary proceedings regarding actions of employees.
- If the misuse or suspected misuse involves students or student services personnel, the CIO/Director of Computing Services shall also notify the Vice President for Student Affairs immediately.
- If the misuse or suspected misuse involves faculty or academic support staff, the CIO/Director of Computing Services should also notify the Vice President for Academic Affairs immediately.
- If the misuse or suspected misuse involves other campus staff, the CIO/Director of Computing Services should also notify the Director of Human Resources immediately.
To appeal a disciplinary decision, students should refer to DSU Policy 03-30-00 Appealing Academic and Administrative Decisions. Faculty/staff should refer to the Board of Regents policies on grievances: BOR Policy 4:7(faculty), 4:8 (non-faculty exempt) or 4:9 (CSA).