You are here

Use of University Information Technology Resources

This policy statement is intended to support appropriate and effective use of information technology (IT) resources at Florida State University (FSU), while providing guidelines for allowable use.

This and all policies and procedures associated with FSU IT resources are not intended to abridge academic freedom, constitutional guarantees of free speech, or freedom of expression. The use of IT resources is available to all members of the University community. While the rights of academic freedom and intellectual creativity are recognized, the interests of the University, students, faculty, and staff must be protected. In addition to consideration of legal liability issues, the institutional image and reputation of FSU as a major research institution are valuable assets requiring protection.

All uses of University IT resources are subject to applicable rules, policies and procedures of the University and/or governing boards as well as Florida Statutes governing computer fraud, misuse of state equipment resources, public information, and related criminal offenses.
Material accessible to the FSU community through networks and materials disseminated from FSU should not be restricted on the basis of content, nor because of the origin, background, or views of those contributing to its creation. However, University IT resources may not be utilized:

To access or view pornographic or obscene materials unless necessary for academic instruction or research.
To harass another person. Users should not transmit to others or display images, sounds, or messages that might be perceived by a reasonable person as being, or have been identified as, harassing.
To intentionally damage or disable computer systems, networks, or software.
To undermine the security or the integrity of computing systems or networks or to attempt to gain unauthorized access. Users may not use any computer program or device to intercept or decode passwords or similar access control information. Security gaps should be reported to the appropriate system administrators.

The University cannot guarantee absolute privacy of electronic communication.

Users who violate this policy may be denied access to University IT resources and may be subject to other penalties and disciplinary action, both within and outside the University. Violations may be handled through the University disciplinary procedures applicable to the relevant user. Additionally, the University may temporarily suspend, block or restrict access to an account, independent of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of University or other IT resources or to protect the University from liability. The University may also refer suspected violations of applicable law to appropriate law enforcement agencies.

This policy was adapted from Policies and Procedures OP-H-6 Use of University Information Technology Resources. For the complete document see http://www.vpfa.fsu.edu/policies/bmanual/itpolicy.html

Latest Revision: 
July, 2013
X
You will be redirected to the secure CAS login page.
You will be redirected to the secure CAS login page.