University Libraries


Library Quicklinks


Page Content

3. Requirement for Compliance with Laws and Policies

Users are expected to comply with applicable laws and university policies concerning usage of university property, licensing, and copyright or intellectual property rights, and policies and laws covering individual privacy and confidentiality or harassment.

  1. Responsibility of Account Owners. The owner of an account on multi-user systems, or an ID on a network, is responsible for all activity performed under the account or ID. With rare and authorized exceptions, each person must use his/her own account (user ID) and not use, or alter an entry so as to appear to use, any other account (user ID). The password to an account must be kept confidential, must not be released to any other party or included in any documentation and must not be included in any unprotected communication software automatic login script. In the rare instances where special circumstances or system requirements mandate that multiple users access the same account, extreme care must be used to protect the security of the account and its access password.
  2. Intellectual Property and Copyright Protection. Users who publish information maintained on university computers for the use or retrieval of others, whether on bulletin boards, intranets, or the World Wide Web, are responsible for the content of the pages they publish and are required to comply with all CSUEB policies and procedures as well as state and federal laws concerning appropriate use of computers, copyrighted material, and fair use of intellectual property.
  3. Licensed Software. Software must be used in a way that is consistent with copyright laws. No more than the authorized number of copies of a software product may be made. If a temporary evaluation license is granted, the time limits of the software use must be observed. Violation of copyright laws may be grounds for disciplinary action.
  4. Personal Financial Gain. The use of university owned computer systems for private financial gain is prohibited. Use of university owned computer systems for professional development activities such as research or publication is permitted within the limits of system capacities. The use of university computer systems by students for personal activity not related to financial gain may be allowed, provided the use does not interfere with others’ use of the machines, or with the efficiency of any affected systems or operations, or with the performance of the assigned duties of a university employee, and provided that consumable university supplies are not used.
  5. Harassment or Deliberate Interference with Productivity. Mischievous or malicious abuse of electronic mail and electronic campus information services and/or mischievous or malicious alterations to or removal of installed software or machine configurations and/or mischievous or malicious additions of software, hardware, macros, or files that interfere with productivity or computer operations or harass others may result in suspension of computing privileges and/or in appropriate disciplinary or criminal action.

Posted on 03.06.08

Helpful Links