CISE Help & Resources
Enforcement and Penalties
The University does NOT guarantee security, confidentiality, or privacy. The University may monitor the activity of accounts and resources including individual login session and the content of individual communications (i.e. email) without notice under any of the following circumstances:
- the user has voluntarily made them accessible to the public such as posting to Usenet or a web page
- it reasonably appears necessary to do so to protect the security and integrity of university computing resources, or to protect the university from liability
- there is reasonable cause to believe that the user is violating or has violated the Acceptable Use policy
- an account appears to be engaged in unusual or excessive activity
- in any other circumstance required or permitted by law
In order to enforce the policy, the following procedures are performed on CISE computers:
- automatic monitoring of systems for any indication of problems
- any indication of suspicious activity may be grounds for a temporary account lockout while more detailed inspection is performed
- users are required to periodically change their passwords
- all incoming logins are logged including local username, remote host, and time
The following procedures are NOT performed on CISE computers unless strong evidence exists that the account has been used to violate the Acceptable Use Policy:
- monitoring the content of files stored in the account including email and web page content
- monitoring daily use activities such as web browsing, mail, talk sessions, etc.
- monitor or censor material on user's home pages
Violation of the Acceptable Use Policy may result in any of the following measures, as appropriate to the violation:
- temporary or permanent termination of the account
- temporary or permanent suspension of access to CISE resources such as printers, modems, etc.
- release of the content of the account to University or court officials as required
- temporary or permenant shutting down a web page, email access, or any other resource if that resource is used to violate the CISE acceptable use policy