Apply to CSC

Information Technology Services

Print Page

CSC Acceptable Use Policy

The Acceptable Use Policy applies to all individuals accessing or using college technology resources. This includes college students, faculty, staff, and authorized guests

Technology Resources

Technology resources include and are not limited to the following:

  • All college owned, operated, leased, outsourced, or contracted computing, networking, telephone and information resources
  • All electronic information maintained within the college’s computing environment, in any format, stored on any medium or location
  • All data, voice, and video networks
  • All applications systems used to conduct campus business

Use of Resources


All information processed through technology resources is considered sensitive and/or confidential. Access to this information is based on a legitimate "need to know". It is the responsibility of each college employee to ensure that no unauthorized disclosures occur.


The College provides and supports electronic resources to employees for effective performance of job duties.

Activity on systems and networks may be monitored, logged, and reviewed by system administrators or discovered in legal proceedings. All information created, stored, transmitted or received on college resources may be subject to monitoring by system administrators.

Inspection of an individual’s data on back-up media by college Information Technology personnel in the course of responding to a request from that individual for restoration of data shall not be deemed a violation of the individual's privacy.

College Rights

The college reserves the right to access, monitor, lock and disclose the contents and activity of an individual’s account and to access any college owned resources and any non-college owned resources, on college property, connected to the college wired or wireless network. This action may be taken to maintain the network’s integrity and the rights of others authorized to access the network. This action may be taken if the security of a computer or network system is threatened, other misuse of college resources is suspected, or the college has a legitimate business need to review such files. This action will be taken only after obtaining approval from a Cabinet level officer when there is a compelling need to know (court order, campus safety, policy violation, etc.).

Individual Rights

  • Individuals are granted access to and permitted use of college technology resources. Access is granted for the purpose of achieving employment and educational goals based on the individual’s need and classification.

    Employees are granted access for the duration of employment. Individuals are considered employees if hired for full-time and part-time positions. Student employees funded via work study or institutional funds do not qualify for employee access.

    Students are granted access for the duration of their student status with the college. Extended access may be granted for access to the student information system and e-mail.
  • Individuals are granted access to the campus network and Internet by use of their campus issued credentials.


Each individual is responsible for the security and integrity of data stored on assigned devices and resources to which they have been authorized access, including but not limited to desktops, laptops, tablets, mobile devices. This includes:

  • Performing and securely storing backups of data
  • Securing physical access to devices and data
  • Logging out of sessions
  • Monitoring access to assigned computer accounts
  • Reporting suspected security compromise or unauthorized access to the IT Help Desk and changing passwords immediately
  • Maintaining device connection to the wired network for application of operating system and software updates
  • Installing, using, and updating virus protection software
  • Maintaining strong passwords and protecting the confidentiality of the password
  • Abiding by password procedures established for technology resources
  • Using accounts and privileges for their authorized purposes
  • Respecting the right of other individuals with regard to data access, intellectual property, privacy, academic freedom, copyright, freedom from harassment.


Unauthorized actions include but are not restricted to the following:

  • Providing computer accounts to an individual not authorized for such access to include sharing one’s own account with others.
  • Attempting to or successfully logging in to an account other to that which is officially assigned
  • Using an account for other than the authorized purpose
  • Tampering with accounts or authorization associated with an account
  • Sharing remote access authorization with anyone
  • Using knowledge of security or access to damage resources, obtain credentials, or gain unauthorized access to accounts
  • Operating servers (game or otherwise) on the campus network
  • Extending the network by connecting a hub, switch, router, wireless access point or any other device
  • Introducing malicious code to the college resources
  • Altering source addresses of network traffic
  • Altering source addresses (forging) of e-mail
  • Sending mass emails (spamming) for purposes other than official business
  • Using the Internet to maliciously damage campus or Internet accessible resources
  • Attempting to negatively affect resource performance
  • Modifying or destroying data which is not specifically assigned to or created by the user
  • Intercepting transmissions not intended for the individual
  • Vandalizing resources
  • Including profane, vulgar or other harassing language within e-mail messages, programs, and/or files
  • Engaging in non-collegial activities which threaten, defame, slander, etc. others
  • Accessing pornographic resources that are in view of and offensive to others
  • Utilizing computer resources with the intent to harass others
  • Installing and/or spreading virus related software
  • Placing undue burden on the CSC network
  • Violating copyright

Non-college use:

  • Using computers, software, or other college equipment for personal or commercial financial gain is strictly prohibited unless specifically authorized by the Board of Trustees
  • Political or lobbying activities not approved by the Board of Trustees
  • Private business or commercial use


The College understands that on rare occasion use of college resources for non-work or non-college related purposes occurs. Such use is to be considered a privilege and not a right. An example is use of the phone for arranging daycare for a child. Such use is to be kept to a minimum, outside of regular working hours, and in no way is to interfere with work responsibilities. It is the supervisor’s right to determine what is appropriate.

Violation of campus policy will result in one or more of the following actions:

  • The individual will be notified to cease the misuse
  • The individual will be required to reimburse the college
  • The individual will be denied access to the resource(s)
  • Disciplinary action will be initiated
  • Civil actions will be initiated
  • Law enforcement will be contacted

Individuals are encouraged to report suspected violations of policies to the Chief Information Officer. Individuals are expected to cooperate with system administrators during investigations of resource abuse and failure to do so may result in disciplinary action.

Discovery of misuse of resources by system administrators is to be formally reported in writing, with compelling evidence, to the Chief Information Officer who will conduct a review and make a recommendation for disciplinary action to the appropriate Cabinet officer.

The college has final authority to determine what constitutes acceptable use and the right to initiate disciplinary action.

Security Violation

In the event of an actual, suspected, or anticipated violation of resource security, designated system administrators may inspect any file on college resources without the individual's knowledge, in an effort to determine the nature and means of the violation and the perpetrator thereof. In order to protect the integrity of the investigation network activity may be monitored, directories and files may be reviewed, and accounts may be disabled until the conclusion of the investigation. Files will be backed up for the purpose of recovery if circumstances warrant.

Only those administrators named by the Chief Information Officer as being directly responsible for the security of college resources may use special privileges which permit the examination, copying or printing of files, programs, electronic mail, or other information in an account, without the individual’s prior permission. This shall apply equally to mail resident on servers which has not been retrieved by the individual.

The designated administrators may only use their special privileges in the event of a violation or reasonable suspicion of violation of computer security. A system administrator may not divulge any information obtained using special privileges to any person other than the Chief Information Officer who will take the appropriate action. If an individual suspects someone has attained access to his/her account, the incident should be reported to the Chief Information Officer immediately in order to initiate appropriate action.

Individuals must adhere to this Acceptable Use Policy in order to retain access to campus resources.

Effective: June 1990
Updated: June 13, 2005
Updated: November 16, 2015

Information Technology Web Page

Policy Reference Locations:
CSC Student Handbook
Employee Account Request Form

Copyright © Chadron State College. All Rights Reserved.
Member, Nebraska State College SystemEmployment OpportunitiesEqual Opportunity EmployerTitle IX Reporting/Resources
Accreditation InformationWebsite Feedback
1000 Main Street, Chadron, NE 69337 • 1-800-CHADRON