Computer Use Policy
If you have questions about this policy, please contact the ITS Help Desk at or send an email.
CLUnet, the campus-wide information system at California Lutheran University, is designed to serve and foster the University mITSion of teaching, learning and public service, while supporting its administrative needs. This policy governs use of computing resources including computers and related equipment, as well as local area networks and connections to larger networks, specifically but not limited to the Internet. CLU honors and respects the privacy and academic freedom of its members, and strives to permit maximum freedom of use consistent with current University policy, and state and federal laws.
Access to CLUnet resources, whether local or remote, by CLU faculty, staff and students requires that individual users act responsibly and courteously and respect the rights of other users, the integrity of the information systems, and related resources. Complaints regarding misuse of CLUnet accessible resources will be directed to those responsible for taking appropriate disciplinary action. The Office of ITS will monitor network activity twenty-four hours per day, seven days per week. Some infractions, when accidental or through no obvious malicious intent, will by handled informally by the systems administrator. Other violations will be documented and referred through the Student Life Office, or the appropriate CLU administration or law enforcement authorities. Penalties range from reprimand, to loss of account, and to referral to University, state and/or federal authorities, for further action. Students and employees will lose account privileges while infractions are under investigation. Severity of punishment will be based on the infraction and/or history of infractions.
Unauthorized use includes illegal access to system files and files of other users, attempting to disrupt the integrity of the system(s), and use of accounts belonging to other people. Misuse includes violation of federal or state law including the Digital Millennium Copyright Act and all other copyright laws, violation of University regulations, use of the system(s) for commercial purposes, displaying sexually graphic images or text, abusive language, harassing behavior, plagiarism, excessive use for non- official or frivolous purposes, and deliberately wasting or overloading computer resources.
CLU computing facilities and equipment are to be used only for University-related activities. All moves of or changes to equipment/software must be approved by ITS. Use for commercial purposes is neither authorized nor supported. All computing equipment purchased with Cal Lutheran funds must be purchased and inventoried by ITS. Please contact the help desk with your hardware requests. Privately owned personal computers are the responsibility of the owner and not the University. Ownership and/or use of personal equipment, whether on or off campus, does not exempt the user from compliance with the CLUnet Computer Use Policy. Hardware purchase requests must be approved by a supervisor with signing authority, a department chair or Dean.
The University has software licenses for the software that is available on CLUnet. All software owned by Cal Lutheran (paid for or reimbursed by Cal Lutheran) must be purchased by ITS via a help desk request. Removal, or transfer of such software without authorization is prohibited per U.S. Code, Title 17, Section 106. Opensource software (free software) also needs to be vetted by ITS and as it relates to instruction the CTL prior to use as they may open security or FERPA related issues. Ownership or possession of illegal or damaging software, whether intentional or not, constitutes violation of the Computer Use Policy. Information Systems and Services and the CTL will only provide support for University-approved software. Software purchase requests must be approved by a supervisor with signing authority, a department chair or Dean.
A list of software supported by Cal Lutheran can be found on the ITS web site: Supported Software
Understandably, faculty and staff may require additional software for special work-related functions such as: statistical analysis, graphical design and layout, groupware, etc. In most cases ITS can procure software at an educational discount, therefore it is imperative to forward any non-standard software purchase requests to the help desk. In addition to sending a request, all software installed on Cal Lutheran computers or connected to the Cal Lutheran network need to be vetted for security and privacy concerns by ITS. Software acquisition must be coordinated with ITS via the help desk and must follow relevant purchase policies. ITS will coordinate the use of instructional software with CTL.
ITS will not install or support software applications that are unrelated to Cal Lutheran.
Attempts to access unauthorized machines via the computer network, to decrypt encrypted materials, or to obtain privileges to which the user is not entitled (hacking) is prohibited per Public Law 98-473, Chapter XXI. Manipulation of files, access to unauthorized parts of CLUnet managed computers and network infrastructure, attempts to circumvent data protection schemes, to discover security loopholes, or possession of such software by users is prohibited.
Users are assigned one account for individual use. Sharing an individual computer account with other persons is prohibited. Passwords should be protected from discovery or use by others. If account holders knowingly or carelessly make their password available to others, they may still be held accountable for any actions that may arise from use of their account by another individual. Authorization for access will be canceled or modified when either a student terminates enrollment or fails to enroll for succeeding terms, or an employee separates from or changes job assignments at the University.
All degree recipients (Alumni) will retain the use of a Cal Lutheran email address for life in compliance with provisions of the Computer Use Policy. Violations of the policy may result in suspension or recinding of this privilege. Alumni who are also employees may be provided a different email address upon separation from the university.
All accounts holders are expected to use strong passwords. Strong passwords have the following attributes:
Minimum of 8 characters in length.
Combination of both letters and numbers.
Does not contain common dictionary words.
May not be re-used (history tracking enabled).
Passwords must be re-set at least every 180 days for students and every 90 days for faculty, staff, and administrators or the account will be locked. Unlock your account or reset your password at the MyCLU login page.
CLU through the Office of Information Systems and Services maintains control of domain name services. No University controlled IP address may be registered without University approval. ITS assigns all IP addresses, and any unassigned IP will be disconnected.
Users of CLUnet resources, including but not limited to electronic mail, bulletin boards, or discussion groups, are prohibited from sending or displaying messages or images that are libelous, patently offensive, or sexually explicit, or that intimidate, threaten, demean, or are defamatory or (4/15/09) harass individuals or groups, or that would otherwise bring discredit to the University. Refer to the Campus Policy on Harassment in the Student, Faculty, and Staff Handbooks.
Plagiarism of electronic works (e.g., text, graphics, programs) is prohibited. Copying of works without attributing credit to the author is cheating and constitutes academic dishonesty. Refer to the Academic Honesty Policy in the Student, Faculty, and Staff Handbooks.
The University also enforces the Digital Millennium Copyright Act. Reports of copyright infringement should be sent to the Chief Information Officer firstname.lastname@example.org
Faculty, staff, students, and other members of the community have individual passwords to access voice mail, E-mail, computer programs and the like. The University does not, however, guarantee complete confidentiality in those transmissions. While the University honors a user’s privacy in most circumstances, it reserves the right to monitor communications and/or usage when there is just cause. Just cause includes but is not limited to the following: removing or compressing inappropriate or large files; investigating user directories and files which may cause or be affected by a system problem; examining a suspected unauthorized use or misuse of systems, technologies, or other resources; or attempting to remedy a file or system that may be corrupted or damaged.
The University will back up user data stored on the personal and shared directories on CLUnet central servers, and bears no responsibility for loss of user data due to system failure, user error or any other cause.
,Users are responsible for backing up personal files stored on laptop and desktop computers. Exchange server email is backed up. Messages deleted in Outlook remain on the central server for 30 days.
Users should not consume unreasonable amounts of limited resources. Space and time on CLUnet systems will be fairly distributed among users, and may fall under system-imposed quotas. Each dorm resident may connect only one personal computer using Mac OS and Windows OS to CLUnet. Sub-networks in residence halls are not permitted. ITS has responsibility for establishing all physical connections for CLUnet connected pc's and will maintain an inventory of MAC (media access control) addresses. Unregistered MAC addresses will be disconnected from CLUnet. Users may request additional storage space based on legitimate University-related use, subject to verification from ITS. Printing is limited to one original copy.