POLICY
In support of the university's mission of teaching, research and public service, Instructional Technology Services (ITS) provides computing, networking and informational resources to the university community of students, faculty, and staff for university programs. Students are referred to Board of Regents Policy, Section #22.

RIGHTS AND RESPONSIBILITIES
Open access through computers and networking is a privilege. Users must respect the rights of other users, the integrity of the system and related physical resources. Users must keep all passwords and access mechanisms private and secure. All existing laws(federal, state and local) and university regulations and policies apply. Laws and regulations specific to computers and networks, as well as those laws that may apply generally to personal conduct, shall be observed. Users may be held acccountable for misuse of computing, networking or information resources under any applicable university policies, procedures or collective bargaining agreements.  Misuse may result in loss of computing privileges. Allegations of misuse of ITS resources will be directed to those responsible for taking appropriate disciplinary action.

PROCEDURES
1. All network users must be registered with Instructional Technology Services (ITS).

2. In accepting authorization to use computing or networking services, user agrees to comply with all existing laws (federal, state and local) and university regulations and policies.  (See Board of Regents Policies, Section B22)

3. Theft, misuse or abuse of computing or networking resources may result in loss of networking privileges, discipline or prosecution in accordance with all Regental, university, local, state and federal policies, laws or regulations.

4. Activities will not be considered misuse when authorized by the Director of Instructional Technology Services (ITS) for security or performance testing.

   A. Theft, misuse or abuse of computing or networking resources includes, but is not limited to: 
 
        Unauthorized use of any computer account. 
 
        Unauthorized transfer of or entry into a file. 
 
        Using the campus network to gain unauthorized access to any computer system. 
 
        Performing an act that will interfere with or degrade the quality of the normal operation of computers, peripherals or networks - or with the normal operations of the university computing system. 
 
        Violating terms of applicable software licensing agreements or copyright laws. (Illegal reproduction of software protected by US Copyright law is subject to civil damages and criminal penalties including fines and imprisonment.) 
 
        Using electronic mail to harass others. 
 
        Running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs    known as computer viruses, Trojan horses, and worms. 
 
        Attempting to circumvent data protection schemes or uncovering security loopholes. 
 
        Posting materials on any electronic medium which violate existing laws, regulations or the university's policies and codes of conduct. 
 
        Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing or deleting another user's files or software. 
 
        Masking the identity of an account or machine, or use of another individual's password, identification or account. 
 
        Use of computing facilities that interferes with the work of another student, faculty or staff member. 
 
        Unauthorized use of university network system, i.e. network infrastructure for commercial purposes. 
 
        Hosting of materials for individuals or business not affiliated with the university.

   B. Users assume all risks and conditions associated with utilizing institutional computer resources and the transmission and posting of information including: 
 
        SDSM&T reserves the right to access any and all files stored on institutional computer systems. 
 
        SDSM&T cannot guarantee that information transmitted or stored electronically will be protected.

   C. World Wide Web Pages

Space and resources permitting, students, faculty, and staff of SDSM&T are encouraged to create Web pages that can be accessed from the World Wide Web. These Web pages are
provided as part of the university’s mission, and should be used to showcase our achievements and provide information to the public. Therefore, those individuals and departments whose Web pages are hosted by SDSM&T are responsible for ensuring that their pages are professional and appropriate in content, appearance, and with regard to links to other sites.


        Users must request an account through ITS. 
 
        Users will be allotted a maximum amount of space as identified by ITS. 
 
        Users are encouraged to observe copyright protocols with regard to establishing links and with regard to link agreements. Users are also encouraged to monitor the accuracy of the links in their sites. 
 
        SDSM&T reserves the right to access any and all materials and files stored on the institutional computer systems.

   D. Residence Hall DormNetConnections

Access is available in the residence halls. In accepting authorization to access computing or networking services through a residence hall room, a user agrees to comply with all existing laws (federal, state and local) and university regulations and policies. Additionally, user agrees not to engage in any practice that would be considered theft,
misuse or abuse of computing or networking resources. Users assume all risks and conditions associated with utilizing institutional computer resources and the transmission
and posting of information including the following: 
 
        Only allow login access to registered Tech students.  Initial login indicates agreement and acknowledgment on the part of Tech students to this agreement and all subsequent additions, deletions or addendums to this policy. 
 
        These accounts must be reviewed, by the user, each semester for validity. 
 
        Only Anonymous FTP "downloads" of files owned by the site owner will be allowed. 
 
        Anonymous FTP "uploads" are specifically prohibited. 
 
        Individual site security is the responsibility of the site owner.

   E. Theft, misuse or other abuse of computing or networking resources may result in loss of computer privileges, discipline or prosecution in accordance with all applicable regental, university, local, state and federal policies, laws or regulations.

   F. Activities will not be considered misuse when authorized by the director of ITS for security or performance testing.

Need More Help?

The ITS Help Desk is located in the basement of the library. 

Contact Us...

After hours emergencies
(mission-critical service/outage)

    605.939.0455
Grubby with Tablet