System Acceptable Use Standard
Access to computer systems and networks owned or operated by Boise State University imposes certain responsibilities and obligations and is granted subject to university policies and laws. Acceptable use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation and harassment.
The purpose of this standard is to define acceptable use requirements. It specifies the details of the standards as referred to by policies:
- 8000 Information Technology Acceptable Use
- 8060 Information Privacy and Security
Individuals using computer systems owned by Boise State University do so subject to applicable laws and University policies. Boise State University disclaims any responsibility and/or warranties for information and materials residing on non-university systems or available over publicly accessible networks. Such materials do not necessarily reflect the attitudes, opinions, or values of the State of Idaho, Boise State University, its faculty, staff, or students.
In making acceptable use of resources you MUST:
- Use resources only for authorized purposes.
- Protect your user id and system from unauthorized use. You are responsible for all activities on your userid or that originated from your system.
- Access only information that is your own, that is publicly available, or to which you have been given authorized access.
- Use only legal and supported versions of software that have been approved by the SARB process and are in compliance with vendor license or open source requirements.
- Comply with all University policies and applicable laws
In making acceptable use of resources you MUST NOT:
- Use another person’s system, userid, password, files, or data.
- Use computer programs to decode passwords or access control information.
- Attempt to circumvent or subvert system or network security measures.
- Engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files or making unauthorized modifications to university data.
- Use university systems for commercial or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates.
- Make or use illegal copies of copyrighted materials or software, store such copies on university systems, or transmit them over university networks.
- Use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else’s name or userid.
- Waste computing resources or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings.
- Use the university’s systems or networks for personal gain; for example, by selling access to your userid or to university systems or networks, or by performing work for profit with university resources in a manner not authorized by the university.
- Engage in any other activity that does not comply with the General Principles presented above
Non-Compliance and Exceptions
A Request for Exception, along with a plan for risk assessment and management, can be submitted at Help Desk Self Service. Non-compliance with these standards may result in revocation of access, notification of supervisors, and reporting to the Office of Internal Audit and Institutional Compliance. The university reserves the right to copy and examine any files or information resident on university systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Violators are subject to disciplinary action as prescribed in the Honor Codes, the University Policies for Student Life, and employee handbooks. Offenders also may be prosecuted under applicable laws.
Created: January 2016
Last Update: February 2022
Next Review: February 2023