All traffic and the contents thereof which traverse the PSU computer and/or telecommunications network, all PSU-supplied computers, telephones and related technologies and all correspondence including but not limited to files, e-mail and respective attachments, instant messaging, text messaging, voice calls and video calls are subject to the rights reserved by PSU to manage to the extent deemed necessary any communication or the contents thereof.
Upon termination, resignation, withdrawal or status change of an employee or student, these materials remain the property of PSU, and shall be relinquished to ITS. ITS reserves the right to require the removal of any computing device or technology that does not meet the minimum specifications as defined in the Buying Guidelines on the ITS web site.
As necessitated by job duties, employees shall be issued the appropriate computer and peripheral and/or ancillary equipment. PSU shall endeavor to ensure all issued computer equipment is replaced before obsolescence in a timely manner, provided such equipment is still actively issued. When new equipment is issued to replace old devices, the old equipment must be relinquished to ITS.
Members of the general public and/or people unaffiliated with PSU may use computing resources as available and authorized for such a purpose by the Information Technology Services department. Such use shall be restricted to accessing the Internet and any PSU resources intended for use by the public.
All users may use Plymouth State University (PSU) systems for authorized purposes. Unauthorized access to or use of any system is prohibited.
The following activities are expressly prohibited:
- Installing, copying, distributing, sharing or otherwise making available or using software , files or content of any kind in violation of any local, state or federal law, copyright law and/or End User Licensing Agreement.
- Altering system software or hardware or disrupting or interfering with the delivery or administration of system resources.
- Misuse of computing resources directed toward people or entities outside of PSU.
- Attempting to circumvent or subvert any security measure.
- Accessing or attempting to access or facilitating access to another user’s account, server,workstation, computing device, files, voice mail or e-mail without the owner’s permission.
- Sharing personal information, including but not limited to account information, user credentials and/or access to university systems (see User Credentials policy).
- Misrepresentation of identity in electronic communication.
- Engaging in conduct or the use of computing resources which interferes with others’ use of IT systems, the activities of other users or otherwise impedes workplace productivity.
- Using computing resources for commercial interests, profit-making purposes and/or personal gain without written authorization from PSU.
- Failing to adhere to individual department and/or USNH policies, procedures, protocols or using systems in a manner contrary to their intended use.
- Acts of vandalism, theft or tampering with computer resources.
- Using ITS resources for any activities the state of New Hampshire, federal law, PSU and/or USNH have determined illegal, inappropriate or unacceptable. Such activities may include but are not limited to:
- Identity theft
- Harassment, including sexual harassment
- Terrorist activities
- Unauthorized access
- Installation, implementation or use of any unauthorized computing device or protocol, which includes but is not limited to:
- Wireless Access Points
- Any dynamic addressing protocol such as Dynamic Host Configuration Protocol (DHCP).
- Any host name resolution service such as Domain Name System (DNS).
- The propagation of computer viruses, worms or other similar programs.