Computer and Network Use Policy
Revised: November 29,2022
If you have questions about this policy, please contact the ITS Help Desk at (805) 493-3698 or send an email.
CLUnet, the campus-wide information system at California Lutheran University, is designed to serve and foster the University mITSion of teaching, learning and public service, while supporting its administrative needs. This policy governs use of computing resources including computers and related equipment, as well as local area networks and connections to larger networks, specifically but not limited to the Internet. CLU honors and respects the privacy and academic freedom of its members, and strives to permit maximum freedom of use consistent with current University policy, and state and federal laws.
Access to CLUnet resources, whether local or remote, by CLU faculty, staff and students requires that individual users act responsibly and courteously and respect the rights of other users, the integrity of the information systems, and related resources. Violations of this policy or misuse of CLUnet resources may result in disciplinary action and/or loss of or limited access to CLUnet. More specifically, the Office of ITS is constantly monitoring network activity. Some infractions, when accidental or through no obvious malicious intent, will be handled informally by the systems administrator. Other violations will be documented and referred through the Student Life Office, or the appropriate CLU administration or law enforcement authorities. Penalties range from reprimand, to loss of account, and to referral to University, state and/or federal authorities, for further action. Students and employees will lose account privileges while infractions are under investigation. Severity of punishment will be based on the infraction and/or history of infractions.
Unauthorized use includes illegal access to system files and files of other users, attempting to disrupt the integrity of the system(s), and use of accounts belonging to other people. Misuse includes violation of federal or state law including the Digital Millennium Copyright Act and all other copyright laws, violation of University regulations, use of the system(s) for commercial purposes, displaying sexually graphic images or text, abusive language, harassing behavior, plagiarism, excessive use for non- official or frivolous purposes, and deliberately wasting or overloading computer resources.
USE OF EQUIPMENT
CLU computing facilities and equipment are to be used only for University-related activities. All moves of or changes to equipment/software must be approved by ITS. Use for commercial purposes is neither authorized nor supported. All computing equipment purchased with Cal Lutheran funds must be purchased and inventoried by ITS. Please contact the help desk with your hardware requests. Privately owned personal computers are the responsibility of the owner and not the University. Ownership and/or use of personal equipment, whether on or off campus, does not exempt the user from compliance with the CLUnet Computer Use Policy. Hardware purchase requests must be approved by a supervisor with signing authority, a department chair or Dean.
USE OF SOFTWARE
The University has software licenses for the software that is available on CLUnet. All software owned by Cal Lutheran (paid for or reimbursed by Cal Lutheran) must be purchased by ITS via a help desk request. Removal, or transfer of such software without authorization is prohibited per U.S. Code, Title 17, Section 106. Opensource software (free software) also needs to be vetted by ITS and as it relates to instruction the CTL prior to use as they may open security or FERPA related issues. Ownership or possession of illegal or damaging software, whether intentional or not, constitutes violation of the Computer Use Policy. Information Systems and Services and the CTL will only provide support for University-approved software. Software purchase requests must be approved by a supervisor with signing authority, a department chair or Dean.
A list of software supported by Cal Lutheran can be found on the ITS web site: Supported Software
Understandably, faculty and staff may require additional software for special work-related functions such as: statistical analysis, graphical design and layout, groupware, etc. In most cases ITS can procure software at an educational discount, therefore it is imperative to forward any non-standard software purchase requests to the help desk. In addition to sending a request, all software installed on Cal Lutheran computers or connected to the Cal Lutheran network need to be vetted for security and privacy concerns by ITS. Software acquisition must be coordinated with ITS via the help desk and must follow relevant purchase policies. ITS will coordinate the use of instructional software with CTL.
ITS will not install or support software applications that are unrelated to Cal Lutheran.
APPROPRIATE ACCESS AND USE
Attempts to access unauthorized machines via the computer network, to decrypt encrypted materials, or to obtain privileges to which the user is not entitled (hacking) is prohibited per Public Law 98-473, Chapter XXI. Manipulation of files, access to unauthorized parts of CLUnet managed computers and network infrastructure, attempts to circumvent data protection schemes, to discover security loopholes, or possession of such software by users is prohibited.
Users are assigned one account for individual use. Sharing an individual computer account with other persons is prohibited. Passwords should be protected from discovery or use by others. If account holders knowingly or carelessly make their password available to others, they may still be held accountable for any actions that may arise from use of their account by another individual. Authorization for access will be canceled or modified when either a student terminates enrollment or fails to enroll for succeeding terms, or an employee separates from or changes job assignments at the University.
All degree recipients (Alumni) will retain the use of a Cal Lutheran email address for life in compliance with provisions of the Computer Use Policy. Violations of the policy may result in suspension or rescinding of this privilege. Alumni who are also employees may be provided a different email address upon separation from the university.
All accounts holders are expected to use strong passwords. Strong passwords have the following attributes:
Minimum of 8 characters in length.
Combination of both letters and numbers.
Does not contain common dictionary words.
May not be re-used (history tracking enabled).
Passwords must be re-set at least every 180 days for students and every 90 days for faculty, staff, and administrators or the account will be locked. Unlock your account or reset your password at the MyCLU login page.
CLU through the Office of Information Systems and Services maintains control of domain name services. No University controlled IP address may be registered without University approval. ITS assigns all IP addresses, and any unassigned IP will be disconnected.
APPROPRIATE USER BEHAVIOR (NETIQUETTE)
Users of CLUnet resources, including but not limited to electronic mail, bulletin boards, or discussion groups, are prohibited from sending or displaying messages or images that are libelous, patently offensive, or sexually explicit, or that intimidate, threaten, demean, or are defamatory or (4/15/09) harass individuals or groups, or that would otherwise bring discredit to the University. Refer to the Campus Policy on Harassment in the Student, Faculty, and Staff Handbooks.
PLAGIARISM & COPYRIGHT
Plagiarism of electronic works (e.g., text, graphics, programs) is prohibited. Copying of works without attributing credit to the author is cheating and constitutes academic dishonesty. Refer to the Academic Honesty Policy in the Student, Faculty, and Staff Handbooks.
The University also enforces the Digital Millennium Copyright Act. Reports of copyright infringement should be sent to the Chief Information Officer firstname.lastname@example.org
SECURITY AND PRIVACY
Faculty, staff, students, and other members of the community have individual passwords to access CLUnet resources such as voice mail, E-mail, and computer networks and programs. The University too employs various measures to protect the security of its CLUnet resources. Users should be aware that their uses of University computer and network resources are not private and that the University does not guarantee complete confidentiality in those uses. While the University does not routinely monitor individual usage, the normal operation and maintenance of the University’s computing and network resources require backup, logging of activity, the monitoring of general and individual usage patterns, and other such activities that are necessary for information security and the rendition of service. In addition, it reserves the right to review, monitor and capture content, communications and/or usage residing on, or transmitted over, its computers or network at its sole discretion.
The University will back up user data stored on the personal and shared directories on CLUnet central servers, and bears no responsibility for loss of user data due to system failure, user error or any other cause.
Users are responsible for backing up personal files stored on laptop and desktop computers. Exchange server email is backed up. Messages deleted in Outlook remain on the central server for 30 days.
REASONABLE USE OF SYSTEM RESOURCES
Users should not consume unreasonable amounts of limited resources. Space and time on CLUnet systems will be fairly distributed among users, and may fall under system-imposed quotas. Each dorm resident may connect only one personal computer using Mac OS and Windows OS to CLUnet. Sub-networks in residence halls are not permitted. ITS has responsibility for establishing all physical connections for CLUnet connected pc's and will maintain an inventory of MAC (media access control) addresses. Unregistered MAC addresses will be disconnected from CLUnet. Users may request additional storage space based on legitimate University-related use, subject to verification from ITS. Printing is limited to one original copy.