Technology Acceptable Use Policy

The Computers and Technology Acceptable Use Policy is a part of the Student Housing License Agreement. Acceptance and agreement to abide by the regulations listed herein is acknowledged by signature(s) on the Student Housing License Agreement.

University Housing Services (UHS) of Cal Poly Pomona, hereafter referred to as the university, offers Ethernet connection and wireless from the residential facilities to the campus network (CPPNet) via Cal Poly Pomona’s Internet Services Provider, CENIC. The purpose of this connection is to enhance and support the educational experience of the student by facilitating the sharing of knowledge and information. The services and facilities are designed to provide reliable individual access to the campus network, electronic mail and the Internet. They are not designed for experimentation with network protocols, running of experimental networks, running commercial or for-profit services, or providing such services to outside entities or individuals or other functions that might compromise the quality and integrity of services.
Residence access to the campus network (CPPNet) is provided primarily for the student’s educational use.
The university shall implement basic security and privacy measures as part of routine operations to help protect, to the extent possible, both the university and the student from service degradation and from the effects of illegal activity, such as computer attacks. These measures may include, but are not limited to, routine testing of services and facilities, monitoring for activity patterns commonly indicating misuse, implementation of firewalls and temporary or permanent limits on bandwidth consistent with maintaining stable and reliable services, including traffic-shaping solutions. However, the university, in general, cannot assure complete electronic security or privacy for personal computing. It is important that each individual take reasonable security and privacy precautions to protect against computer viruses and other computer attacks which may result in loss of data, unintentional release of personal information, or negative impact on the services and facilities for others. Access granted to any individual may not be transferred to or shared with any other person without written authorization.

  1. Individuals may not access, copy, add, alter, damage, delete or destroy any data or computer software on any other computer unless specifically authorized.
  2. The Internet Protocol (IP) address to the student’s personal computer will be dynamically assigned. The student may not set up a server without authorization of the university. Switching equipment and Ethernet hubs other than those provided by the university are prohibited for use on any residence network connection. If experimentation with network protocols, running of personal networks or servers, provision of such services to outside entities or individuals, or other functions is academically required (including the need for static IP addresses), the student shall obtain prior written authorization through the Division of Information Technology and the student’s academic dean or his/her designee.
  3. The student shall be held accountable for his/her own behavior and for the inappropriate activity originating from his/her unit or computer. All passwords should be secure.
  4. The student shall abide by all applicable laws (federal, state, and local) and University policies. Pursuant to State of California law, any unauthorized access, attempt to access, or use of any state computing or network system, including all data contained within them, is a violation of Section 502 of the California Penal Code and other applicable federal laws, and is subject to prosecution. Discipline ranges from loss of networking privileges to eviction from the UHS Residences. The university regards all computer-related crimes as a violation of this policy, and violators may be subject to disciplinary sanctions up to and including dismissal from campus.
  5. Examples of misuse include, but are not limited to, the following:
    1. Incidental personal use that interferes with university operations of information technologies or electronic mail services, burdens the university with incremental cost or excess bandwidth utilization, or interferes with employment, student status, or other obligations of the university.
    2. Using a computer, computer account or system (including scanning systems for security loopholes, user accounts, passwords, etc.) without authorization.
    3. Using the campus network to gain unauthorized access to any computer.
    4. Knowingly performing an act that will interfere with, damage, or otherwise degrade the normal operation of other systems and/or network resources including, but not limited to, running, installing or distributing programs known as computer viruses, Trojan Horses or worms.
    5. Attempting to monitor or tamper with another entity’s electronic communications, including scans and probes of the residences and other networks. This includes connecting your computer to your roommate’s Ethernet port without permission.
    6. Attempting to circumvent data protection schemes or security mechanisms.
    7. Misrepresenting your identity to avoid accountability (e.g., falsifying your e-mail address).
    8. Violating terms of applicable software licensing agreements or copyright protection laws, including making available such materials as music, videos, photographic images, texts or software without the appropriate permission.
    9. Taking any action that invades the privacy of individuals or entities that are creators, authors, users, or subjects of information resources (e.g. inappropriate use of webcams or microphones).
    10. Any use of hidden cameras, hidden microphones or other recording devices without pre-approval by University Housing Services.
    11. Violating any federal or state law or regulation, or University codes of conduct.
    12. Using the network for commercial purpose or charging for any service provided across the network or registering any IP address assigned by the university to a third-party domain name registry.
    13. Facilitating access to the on-campus network from off-campus or outside the student’s room by operating a virtual private network (VPN) or file sharing site.
    14. Using an unauthorized IP address or statically assigned address without approval.
    15. Using electronic mail, services, or facilities to harass others, including, but not limited to, sending unsolicited mass mailing over the network (chain mail, solicitations, etc.) or making threatening or slanderous statements.
    16. Hosting or operating a wireless access point that is connected to the University’s network in your unit or common area of your residence.
    17. Activities that are not considered misuses when authorized by appropriate University officials for the purposes of security or performance testing.

Additional information can be found at Cal Poly IT Policies, Procedures, and Guidelines.