3 minute read

Unauthorized Use of Information Technology

• Items related to student government elections are presumed to be associated with SGA, however the individual candidate is personally responsible for their own postings. • Any written promotion for events sponsored by commercial establishments is forbidden unless authorized by the Office of Leadership and Engagement. • Promotional materials may be placed only on bulletin boards or designated posting areas. Signs or posters shall not be placed on any door or glass area of the university, including windows, doors or partitions and may not be affixed to wood-finished or painted surfaces of any kind. Materials may not be placed over existing postings. • All items must indicate an event date or expiration date. Organizations or individuals are responsible for the removal of materials when they are outdated or no longer relevant. • Any notices, publicity, etc., which are applied in such a way (e.g., paint, ink, chalk, spray fixative) so as to deface any campus building, sidewalk, lawn, tree or structure are prohibited. • Distribution of materials through the campus mail system must meet the following requirements: o The requesting organization must be SU affiliated (no outside groups) o A request is made and approved by the mailroom supervisor o All printed items must be individually addressed with valid student names and Hawk numbers o The mailroom is unable to provide names or Hawk numbers, as this information is protected by FERPA o These mailings are limited to no more than 100 addresses at a time o The mailroom cannot accommodate mass mailings (i.e., box stuffing) since each student does not have a physical mailbox. Please use other avenues (e.g., calendar of events, social media, email) for these types of communication efforts o Mailings must be the size of a 4X6 postcard or larger. Any items, such as candy, must be contained within the envelope. Postcards with items taped on the outside will not be distributed. • The use of airdrops or placement of materials on windshields is prohibited. • Unauthorized materials depicting or announcing activities at which alcohol is consumed are prohibited. • Commercial advertising may be placed only on the designated posting areas in the east stairwells of the Degenstein Campus Center with permission from the Office of Leadership & Engagement. • Non-commercial posters or notices are not to be removed from the bulletin boards or designated posting areas unless they are outdated, no longer relevant as determined by Event Management or Office of Leadership & Engagement staff, or there are multiple notices of the same event in the same location.

UNAUTHORIZED USE OF INFORMATION TECHNOLOGY

Defined as • Any action without authorization from the university which allows an individual to access, use, modify, destroy, disclose or take data, programs or supporting documentation residing in or relating to a university computer, computer system or computer network. • Any action that causes the denial of computer system services to an authorized user of such system. • Any violation of the Information Technology Policy and the Information Technology Conditions of Use statement. Examples of violations include • Use of university technology to harass or harm any person • Unauthorized access to or unauthorized use of Information Technology equipment and resources • Use of resources in violation of any applicable law or regulation • Creation and/or use of false user accounts • Unauthorized use of another user's account • Use of network packet sniffing software outside the classroom • Placing rogue hardware on the LAN for the purpose of exploiting network security and policies • Any activity that attempts to circumvent the LAN security • The posting on university-owned computers of material that may or will be perceived to be offensive to others • Use of university technology to violate copyright laws • Use of phone or computer technology to perpetrate false charges • Activities that constitute theft of service (e.g., unauthorized printing) • Sending an email using another person’s account without written permission • Impersonating another person in any electronic communications without written permission

This article is from: