Information Technology Services
AASU Policy on Use of Network
Resources and Services
Background and PurposeThis document represents the University-wide guidelines and responsibilities required to maintain acceptable and proper use of all AASU network resources and services. The intent of this policy is to educate users about their responsibilities regarding computing resources and services while identifying certain unacceptable uses of network resources and services.
ScopeThis policy covers all computer and communincations equipment owned or operated by Armstrong Atlantic State University including all equipment attached to or using AASUNet resources. Explicit in the above statement is that this policy also includes ANYONE using AASU computer and/or communications equipment and/or ANYONE accessing and/or using AASUNet resources.
Courtesy and respect for rights of othersThe AASU campus community has the responsibility to foster a positive and secure campus community by respecting and valuing the right of privacy and the diversity of the population and opinion in the community. In addition, all are responsible for complying with University policy and all laws and contracts regarding the use of information.
Use of resourcesUsers are responsible for knowing what information resources are available including those shared by the campus community. Users should refrain from all acts that waste or prevent others from using these resources.
Users have a responsibility to ensure the security and integrity of the computer and network resources and services they use or access. Responsibilities include performing regular data backups, controlling physical access to information and computer equipment, using virus protection software, and keeping the virus definition file (DAT file) up to date. Responsibilites may also include updating Windows Critical Updates as requested by IT Services.
Information integrityUsers are responsible for the accuracy, completeness, trustworthiness, timeliness, and relevance of the data they enter into and extract from AASU information systems. Users should not unconditionally depend on information or communications to be correct when they appear contrary to expectations. It is important to verify the integrity of the data entered into AASU information systems because information contained on AASU information systems may be used for reporting at a future date. Such reports could influence future decisions made by the state concerning student funding, employment opportunities, capital projects, policy design, and other data related issues.
Users shall not place confidential information on the computer's local hard drive without protecting the information appropriately.Student academic records are required by law, Family Educational Rights and Privacy Act (FERPA - http://www.ed.gov/offices/OII/fpco/ferpa/), to be kept confidential.
If you store confidential or sensitive information on your computer, you are required to take all precautionary steps to safeguard the information.
Users are responsible for adhering to the Internal Network Equipment Policy when connecting any devices to the AASUNet.Devices include, but are not limited to computers, laptops, servers, routers, switches, hubs, wireless devices.
No one shall use any University network resources or services without proper authorization.No one shall assist in, encourage or conceal any unauthorized use or attempt at unauthorized use of any of the University's network resources and services.
Use of network resources and services without permission is theft of services and is illegal under state and federal law (GA CODE 16-9-90 et seq).
Authorized use of AASU-owned or operated computing and network resources is use consistent with the academic and service missions of the University.
Authorized users are:
- Current faculty, staff and students on AASU
- Approved auxiliary service employees (Compass Point, ETTC, Cafeteria)
- Approved individuals whose involvement with the University furthers the mission of the University and whose usage will not interfere with other authorized users' access to resources.
No one shall knowingly endanger the security of any AASU network resource, nor willfully interfere with others' authorized network usage.
No one shall use AASU's network resources or services to attempt unauthorized use, nor to interfere with others' legitimate use, of any network facility anywhere.
- The ability to use a remote computer does not constitute permission.
- Users are not permitted to run software that searches for means of obtaining unauthorized access (ie. port scans, password crackers, etc.) even if the user does not plan to make unauthorized access after finding an access point.
- Users are not permitted to run software that burdens the network with unnecessary traffic or intentionally degrades the performance of the network. (ie. unnecessary repetitive pings and traceroutes)
No one shall connect any computer or network equipment to any of the University's network resources or services until the equipment has been registered with the Department of Computer and Information Services.Users are responsible for adhering to the Internal Network Equipment Policy when connecting any devices to the AASUNet. One improperly configured computer or network device on a network can cause campus-wide disruption.
Devices include, but are not limited to computers, laptops, servers, routers, switches, hubs, wireless devices.
No one without specific authorization shall use any University network resource or service for non-University business.By law, the University can only provide computer resources and services for its own work, not for private use. Therefore, using University resources or services to establish, run or support a personal and/or non-University related business venture (e.g. via email, web site, listserv, etc.) is prohibited.
Users in need of computing/printing resources for private or personal purposes, will need to contact local computer vendors for procurement options.