CSC Information Technology Policies
The purpose of this policy is to educate users about their responsibilities regarding acceptable use of University computers/networks. We also describe and prohibit unacceptable use of University computers/networks.
This general security policy has been developed to ensure data integrity and confidentiality for all administrative computer systems at the University of South Alabama. This document will provide guidelines for the classification of data resources, and subsequent retrieval and dissemination of that data by various user groups.
This policy provides guidance in the use of copyrighted software. It was developed by a faculty committee and has been approved by the University's Deans and President as a University policy.
The University networks support a wide variety of devices and services of critical importance to the operations of the University. In addition to providing University constituents access to electronic mail, Internet, and file and print services, the networks also support telephony, monitoring of environmental control and other equipment, remote security monitoring, and other essential University services.
The Federal Higher Education Opportunity Act of 2008 (HEOA) imposes various requirements on higher education with respect to illegal sharing of copyrighted material by network users. This document contains guidelines regarding legal and policy implications of illegal file sharing plus legal alternatives for obtaining copyrighted materials.
The purpose of this policy is to ensure the compatibility, integrity, and security of University data systems.