Purpose of this policy:  Computing and data systems, equipment and services at Colorado State University are valuable and limited resources that serve a large number and variety of Users. Misuse of these resources can result in loss of integrity, functionality, speed, bandwidth and reliability of the University’s information systems, as well as violations of other laws and policies (such as those concerning conflicts of interest, privacy, etc.). The purpose of this policy is to establish what constitutes acceptable use of these resources in order to assure that they are available to everyone as needed for the University’s business needs.

Application of this policy:  This policy applies to all students, faculty and staff, affiliates, and all other persons and organizational units having access to the University’s technology and information systems (“Users”).

All Users have the responsibility to make use of the Resources in an efficient, ethical, and legal manner. The Resources are to be used in a manner consistent with the instructional, research, and administrative objectives of the University community in general, and for the purposes such Resources were provided. Access to the Resources is a privilege and imposes upon Users certain responsibilities and obligations, as further described in this policy.

Access to the Resources is granted subject to CSU System and university policies and local, state, and federal laws. Acceptable use is always ethical, reflects academic honesty, integrity, and shows restraint in the consumption of shared Resources. It demonstrates respect for intellectual property, protection of sensitive information, ownership of data/information, copyright laws, system security mechanisms, and an individual’s rights to privacy and to freedom from intimidation and harassment. Activities inconsistent with these objectives are inappropriate and may jeopardize continued use of the Resources. The University may take any action it deems necessary to protect the Resources from systems and events that threaten or degrade operations, or that otherwise violate this policy.

It is important that you become familiar with this entire policy, especially the sections on “Policy Provisions” and “Examples of Inappropriate Conduct Using University Resources”.  The full policy can be found here: