Policy Manual

User Responsibilities Related to Network Use

Employees and students of GCSU may use the university's computing resources including transmission over the university network, for scholarly purposes, for official university business, and for personal purposes so long as such use does not:

  • Violate any Federal or state law or university policy,
  • Involve significant use of university resources or direct costs,
  • Substantially interfere with the performance of university duties, work, or data
  • communications networks, and/or
  • Conflict with the State policy on Misuse of State Property.

Authorized users of GCSU’s network resources shall not:

  • Create or willfully disseminate computer viruses. Authorized users shall be sensitive to the ease of spreading viruses and shall take steps to insure computer files are virus free.
  • Allow non-authorized users access to passwords or share accounts. It is the authorized user's responsibility to protect any account from unauthorized use by following security procedures.
  • Attempt to circumvent system security, guess other passwords, or in any way gain unauthorized access to local or network resources. Users may not use another person's computing account, attempt to forge an account, or use a false account or e-mail address.
  • Transfer copyrighted materials to or from any system or via the university network without express consent of the owner as this may be a violation of Federal and/or State Law.

Computer Labs and Electronic Classrooms

Authorized users in campus computer labs shall follow these additional guidelines:

  • Show current GCSU identification (Bobcat card) or Faculty/Staff ID upon entering the computer lab. All users must sign in on entry or swipe their identification card as available.
  • Reconfigure computers, changing colors or fonts, installing/uninstalling software, moving equipment or in any way trying to change the set up of the computers.
  • Keep noise levels to a minimum.

All authorized users shall avoid the following:

  • Connecting to other computers without explicit permission.
  • Bringing children, food or drinks into the computer labs.
  • Attempting to circumvent security mechanisms.
  • Attempting to intercept or decode passwords or similar information.
  • Attempting to deliberately degrade performance, deny service, or disrupt services.
  • Using the lab phone for personal calls.
  • Accessing anyone else's account(s).
  • Attempting to damage files, equipment, software, or data.
  • Using formerly privileged access after graduation, transfer, or termination.
  • Using computer lab resources for political campaigns or commercial advertising.