Topics Map > Services > Security > Acceptable Use Policy
Acceptable Use and Policies - Guidance
Below is guidance for acceptable use at NDSU.
Guidelines for Incidental Personal Use
Incidental personal use of University owned Electronic Computing Devices(ECD) or personal use on University time is acceptable when the use:
- Does not interfere with the person's work performance
- Is of nominal cost or value
- Does not create the appearance of impropriety
- Is not for a political or personal commercial purpose
- Is reasonable in time, duration, and frequency
- Makes minimal use of hardware, software and network resources
- Use for harassment or similar inappropriate behavior
- Use for accessing or distributing sexually explicit, offensive or erotic material
- Violation of copyright laws
- Use for probing or hacking
- Use of non-business streaming technologies that consume significant amounts of bandwidth
- Use of pirated software or data
- Knowingly distributing viruses or bypassing established security
- Using University provided email to send or receive confidential information such as social security numbers or tax returns.
- Using University provided storage services to store confidential information that is not required as a part of your job duties, such as your own social security number or your own tax returns.
Summary of Procedural Guidelines
Initial discovery of a potential Acceptable Use Policy(AUP) violation can result from a number of triggering events which include but are not limited to:
- Bandwidth and network monitoring
- Complaint by a supervisor, other employee or person
- Inadvertent discovery during routine service or maintenance
- Legal copyright complaint (includes copyrighted materials such as music, movies, software, etc.)
- Creation or distribution of SPAM or other network abuse
- Law enforcement query or subpoena; open records request
Occasionally, emergency action might be necessary so that the NDSU Chief IT Security Officer may not be able to contact all the above officials before an action is taken. If criminal violations are suspected, appropriate law enforcement will be notified. Outcomes of the investigation could include the following determinations: no violation, violation of law or policy, and/or possible criminal violations. Sanctions, if a violation is found, could include, but are not limited to: verbal caution; letter of warning; loss of computer and/or network access; referral to the Employee Assistance Program; referral for training and education; letter of reprimand; suspension with or without pay; and termination of employment. Any criminal process is separate but can also be considered when deciding on appropriate sanctions. The employee may use the normal employment appeals processes for any sanctions imposed.
*Members of the AURC include the NDSU Chief of Staff, the North Dakota Assistant Attorney General, the NDSU Vice President of Information Technology, and the Chief Information Security Officer or their designees.
Policies and Laws
- NDSU Policy 158 - Acceptable use of Electronic Communications Devices
- NDSU Policy 158.1 - E-mail as an Official Communication Method for Employees
- NDSU Policy 710 - Computer and Electronic Communications Facilities
- NDSU Code of Student Conduct
- NDSU Student Acceptable Use Guidelines
- NDSU Employee Acceptable Use Guidelines
- NDUS Policy 1202.1 - NDUS Acceptable Use of Information Technology Resources Policy