The following is a list of overarching polices that govern the use of Information Technology (IT) at Plymouth State University (PSU). These policies were developed to help clarify expectations of individual community members and to support compliance with other University System policies and regulations, and all local, state and federal laws. Subject to the parameters set forth below, all users of computing resources, voice systems, and data network services owned and/or operated by PSU may use any system for which they have been authorized.
ITS staff reserves the right to monitor, access, log, intercept, read, prohibit, limit and manage to the extent deemed necessary any communication or the contents thereof that makes use of PSU IT systems (See Acceptable Use Policy).
Enforcement of IT policy is the responsibility of the supervisor, department head, Chief Security Officer, Chief Information Officer, Human Resources, Student Affairs or any combination thereof, depending on the circumstances of any given violation. Any violation of IT policy that arises either through systematic monitoring or through normal supervision, and observation of business processes must be reported to the Chief Security Officer (CSO) and/or the CIO.
Violations of the following PSU ITS Policies may result in disciplinary action, including but not limited to suspension, termination of employment and/or referral to law enforcement.
- Acceptable Use of Computing Resources
- Sensitive and Confidential Information Policy
- User Credentials Policy
- Email Use Policy
- Departmental Server Policy
- Voice Mail Use Policy
- Secure Web Application Development Policy
- Departmental Shared Drive Policy
- Email Distribution List Policy
- Surplus Computer Equipment
- Technology Repair Services
- Supported Computer Equipment
Other ITS policies and practices
Cell Phone Policy
Phishing Policy and Practices
Phishing is the use of email and fraudulent web sites to trick people into disclosing personal financial or identity information, such as credit card or Social Security numbers, Usernames, Passwords and addresses. Although most “phishes” come as email, phishing scams can also come in the form of text messages and phone calls. People who respond to phishing e-mails, and enter the requested personal information into e-mails, websites, or pop-up windows put themselves and Plymouth State University at significant risk.
If PSU ITS detects that your account has been compromised, access to the account will be suspended immediately to preserve the integrity of PSU systems. Additionally, your PSU owned computer may be confiscated by an authorized IT technician for analysis and needed repairs.
University System of New Hampshire Policy on the Use of Technological Resources
The USNH On-Line Policy Manual (USNH OLPM) explicitly defines specific policy components, and requires that each USNH institution further clarify those components by developing local campus policies.
All PSU IT service providers and service consumers should familiarize themselves with the information provided in the USNH OLPM, Section F with particular regard to Subsections 4. Policy on Use of Technological Resources, and 5.Information Technology Security Policy. As the USNH OLPM is a living document, users should regularly view the document for changes.
State of New Hampshire Computer Crimes Law
Access to and use of Plymouth State University’s technological resources is subject to applicable laws of the State of New Hampshire.
Digital Millenium Copyright Act
The Digital Millennium Copyright Act provides protections to and describes procedures for ISP providers, including higher education institutions, concerning copyright materials on the Internet.