Registrar's Office

Acceptable Use Policy for Computer Technology

The computing facilities at Grambling State University are provided for the use of Grambling State University students, faculty and staff in support of the programs of the University. All students, faculty and staff are responsible for seeing that these computing facilities are used in an effective, efficient, ethical and lawful manner.

The following policies relate to their use.

  1. Computer facilities and accounts are owned by the University and are to be used for university-related activities only. All access to central computer systems, including the issuing of passwords, must be approved through the Information Technology Center.
  2. Computer equipment and accounts are to be used only for the purpose for which they are assigned and are not to be used for commercial purposes or non-university related business.
  3. Others must not use an account assigned to an individual, by the Information Technology Center without explicit permission from the account holder and the Information Technology Center. The individual is responsible for the proper use of the account, including proper password protection.
  4. Programs and files are confidential. They may be made available to other authorized individuals with permission from appropriate authority. When performing maintenance every effort is made to insure the privacy of a user’s files. However, if violations are discovered, they will be reported immediately to the appropriate vice president.
  5. Electronic communications facilities (such as EMAIL) are for university-related activities only. Fraudulent, harassing or obscene messages, pictures and or other materials are not to be sent, retrieved, or stored.
  6. No one may deliberately attempt to degrade the performance of a computer system or to deprive authorized personnel of resources or access to any University computer system.
  7. Loopholes in computer security systems or knowledge of a special password must not be used to damage computer systems, obtain extra resources, take resources from another user, gain access to systems; or use systems for which proper authorization has not been given.
  8. Computer software protected by copyright is not to be copied from, or into, by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright. This means that such software may only be copied in order to make back-up copies, if permitted by the copyright owner. The number of copies and distribution of the copies may not be done in such a way that the number of simultaneous users in a department exceeds the number of original copies purchased by that department.

An individual’s computer use privileges may be suspended immediately upon the discovery of a possible violation of these policies. Such suspected violations will be confidentially reported to the appropriate faculty, supervisors, department heads, Information Technology staff, and vice presidents.

The appropriate administrative staff or supervising department head will judge an offense as either major or minor. The Information Technology Center Security Administrator and the supervising department head will investigate the first offense. Additional offenses will be regarded as major offenses. Appeals relating to minor offenses may be made to the supervising vice presidents. The supervising vice presidents will address all major offenses once reported.

Violations of the policies will be dealt with in the same manner as violations of other University policies and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available, including the loss of computer use privileges, dismissal from the University, and legal action.

Violation of some of the above policies may constitute a criminal offense. Individuals using campus computer facilities should be familiar with the Louisiana Revised Statutes 14:73, Computer Related Crimes.