Authority: Board of Trustees
History: First Issued: April 17, 1998. Last Revised: September 18, 2008.
UNC Code, Appendix I.C. and XII
Contact Info: Director of Security & Compliance, Office of Information Technology (919-515-2794)
North Carolina State University’s (hereinafter “University”) Information Technology (IT) Resources consists of computer networks, equipment, and resources – owned by the University and provided primarily to support the academic and administrative functions of the University. The use of IT Resources is governed by federal and state laws and University policies and procedures.
2. REGULATORY LIMITATIONS
Students, employees, and approved guests of NC State are authorized to use IT Resources pursuant to administrative regulations established and promulgated by the Chancellor or his or her designee. Administrative regulations shall address at a minimum the following:
2.1. The University’s right to examine electronic information stored on or passing over IT Resources.
2.2. The University’s right to limit access when federal or state laws or University policies may be or may have been violated or where University contractual obligations or University operations may be impeded.
2.3. The conditions under which students, employees and approved guests may access IT Resources including access for personal use.
2.4. The conditions under which the University will access personal material on IT Resources.
3. VIOLATION OF POLICIES AND REGULATIONS
3.1. Violators may be disciplined as defined below:
3.1.1. Faculty and EHRA non-faculty who violate University computer use policies or regulations issued by the Chancellor or his designee shall be deemed to have engaged in misconduct under EHRA policies.
3.1.2. SHRA employees who violate such University policies or regulations shall be deemed to have committed “unacceptable personal conduct” under SHRA policies.
3.1.3. For students, violations are misconduct under the applicable student disciplinary code.
3.1.4. For approved guests, violations will result in appropriate action depending on their affiliation.
3.1.5. Violators may be referred to the appropriate disciplinary procedure. Violations of law may also be referred for criminal or civil prosecution. Sanctions may include revocation of access privileges in addition to other sanctions available under the regular disciplinary policies.
3.2 Apart from referrals to disciplinary procedures, a University system administrator (or designees) may suspend a user’s access privileges for as long as necessary in order to protect the University’s computing resources, to prevent an ongoing threat of harm to persons or property, or to prevent a threat of interference with normal University functions. Administrative regulations shall provide a user an opportunity to meet with the system administrator as soon as practicable following the suspension of access privileges to discuss the suspension and any reasons why the suspension should be lifted.
4. ADDITIONAL RULES
Additional rules and regulations on computer use may be adopted by various
divisions/departments to meet specific administrative or academic needs. Any adopted
4.1. comply with applicable federal and state laws;
4.2. be consistent with this policy and University administrative regulations;
4.3. be adopted and posted in writing or electronically in a manner that is available to all affected users in accordance with NCSU REG01.25.05 – Procedure for Formatting, Adopting, and Publishing Policies, Regulations, and Rules (PRR Protocol); and
4.4. be filed with the General Counsel and the Vice Chancellor for Information Technology.