- Admissions
- Getting Started at DSU
- Apply Online
- Your Admissions Counselors
- Admissions Information & Requirements
- Undergraduate Students
- Graduate Admissions
- International Admissions
- Parents
- Continuing Education
- Schedule a Campus Visit
- Academic Regulations
- Admissions Reception
- Directions to DSU
- Early Bird Program
- Financial Assistance
- Academics
- Provost/Academic Affairs
- Register for Classes
- Strategic Plan for Delaware State University
- Majors and Concentrations
- University College
- Adult and Continuing Education
- Catalogs and Course Information
- Claude E. Phillips Herbarium
- DSU Arboretum
- College of Agriculture & Related Sciences
- Department of Agriculture/Natural Resources
- Agriculture Course Descriptions
- Undergraduate Degree Programs
- Graduate Degree Programs
- Faculty and Staff
- Fonio Plant
- The Center for Small Flock Research and Innovation
- Department of Human Ecology
- Cooperative Research
- Cooperative Extension
- CARS Academics
- CARS Conversations
- CARS Faculty
- CIBER
- Department of Agriculture/Natural Resources
- College of Arts, Humanities & Social Sciences
- Department of Art
- Department of English and Foreign Languages
- Department of History, Political Science and Philosophy
- Department of Mass Communications
- Department of Music
- Department of Psychology
- Department of Sociology and Criminal Justice
- College Advance Learning Community
- Women's and Gender Studies Minor
- College of Business
- Commencement
- College of Education, Health & Public Policy
- Department of Education
- NCATE Information
- Bachelor's Programs
- Doctoral Programs
- Master's Programs
- Education Course Descriptions
- Early Childhood Lab School
- Robert Noyce Teacher Scholarship Program
- Teacher Education Program Regulations
- STEP Scholarship
- Department of Nursing
- Department of Public and Allied Health Sciences
- Department of Social Work
- DE Center for Health Promotion
- Student Services Center
- Department of Education
- College of Mathematics, Natural Sciences & Technology
- DSU Optics Center
- Department of Biological Sciences
- Department of Chemistry
- Department of Computer and Information Sciences
- Department of Mathematical Sciences
- Department of Physics and Engineering
- Support Programs for Science Majors
- Honors Program
- Distance Education & Learning Technologies
- International Programs
- International Students Association
- Current International Students
- F-1 Students
- J-1 Scholars and Students
- Prospective International Students
- Study Abroad Students
- International Student and Study Abroad Request Form
- OIA Events
- Passports
- Study Abroad Faculty and Staff
- Study Abroad Opportunities
- Study Abroad Photos and Videos
- School of Graduate Studies and Research
- Center for Teaching and Learning
- Sexual Misconduct, Harassment & Sex Discrimination (Title IX)
- Summer 2015
- Research
- Student Affairs
- Career Services
- Internships
- Student Services
- Employer Services
- Graduate Study
- Hire-a-Hornet
- Online Resources
- Roadmap
- Assessments and Career Exploration
- Career Services Ambassadors
- Faculty Resources
- Resume Resources
- Spring 2016 Career Fair
- Student Employment
- Student Success at DSU
- What Can I Do With This Major?
- Director's Message
- Meet the Staff
- Career Services Industry Advisory Board Members
- Counseling Services
- Parents and Families
- Judicial Affairs
- Student Leadership & Activities
- Housing and Residential Education
- Student Health Services
- Wellness & Recreation
- Current Students
- Service & Community
- Comment Box
- Dept. of Conferences & Events
- Sexual Misconduct, Harassment and Sex Discrimination (Title IX)
- Student Health Insurance
- Career Services
- Athletics
- Academic Services for Student-Athletes
- Academic Services for Student-Athletes FAQ
- Applying to Delaware State University
- Awards and Honors
- Book Purchase and Return Policy for Student-Athletes
- Forms Library for Student-Athletes
- Mission and Vision Statements
- NCAA Faculty Athletic Representative
- NCAA Initial Eligibility
- Other Academic Services Available for Student-Athletes
- Student-Athlete Advisory Committees (SAACs)
- Study Hall Policy for Student-Athletes
- Study Tips and Learning Strategies
- Tutorial Support
- Camps
- Compliance
- Marketing and Promotions
- Sports Information Office
- Sports Medicine
- Tickets
- Online Store
- Academic Services for Student-Athletes
- Library
- Administration
- Office of the President
- Board of Trustees
- Board Members
- David G. Turner, Board Chair
- John J. Allen, Jr.
- Robert E. Buccini
- The Honorable Michael N. Castle
- José F. Echeverri
- Barry M. Granger
- Lois M. Hobbs
- Charles S. McDowell, Esq.
- Wesley E. Perkins
- Claibourne D. Smith, Ph.D.
- James "Jim" W. Stewart, III
- Leroy A. Tice, Esq.
- Mark A. Turner
- Devona E. Williams, Ph.D.
- Board Minutes
- Board of Trustees Meeting Schedule
- Committees of the Board of Trustees
- Board Members
- Alumni Relations
- DSU Foundation
- Give to DSU
- Ways to Give
- Naming Opportunities
- Establishing Scholarships
- Corporations and Foundations
- Class Reunion Gifts
- Alumni Phone-a-thon
- Solicitation Guidelines
- Alumni Fundraising Event Request
- Faculty and Staff Event Request Form
- Faculty, Staff and Administrator Fundraising Proposal
- Off-Campus Solicitation by Faculty and Staff
- Off-Campus Solicitation by Students
- On-Campus Solicitation
- On-Campus Solicitation By Students
- On-Campus Solicitation by Faculty and Staff
- Solicitation by Alumni
- Student Fundraising Event Request
- 21st Annual Hornet Golf Classic
- DSU Champion Fund
- Delaware Diamond Extravaganza
- Jerome Holland Commemorative Statue
- Periodic Table of Donor Elements
- Support Michael J. Feeney Memorial Endowed Scholarship Fund
- Support Peggy C Brinkley Memorial Scholarships
- Contribute to DSU - Alumni & Friends of DSU
- Faculty Senate
- Forms Library
- Human Resources
- Mission/Vision Statement
- News and Media
- Public Safety
- Finance and Administration
- Division of Finance
- Purchasing
- About Us
- Bid Process and Forms
- Conflict of Interest
- Frequently Asked Questions
- Office of Supplier Diversity
- Purchasing Contacts
- Purchasing to Payment Process
- Small Purchase Procedures and Thresholds
- Special Handling of Goods and Materials
- Suppliers
- Training
- Vendor Registration
- Accounts Payable
- Fixed Asset and Inventory Management Department
- Forms
- Policies and Procedures
- Accounting Department
- Enterprise Risk Management
- Payroll Department
- Purchasing
- Dr. Teresa Hardee Bio
- Division of Finance
- Information Technology
- Integrated Marketing
- University Policies and Procedures
- Administrative
- Academic/Research/ Libraries
- Financial
- Human Resources
- University General Counsel/ Legal Affairs
- Student Affairs and Enrollment Management
- Risk and Safety Management
- Information Technology
- Procurement and Auxiliary Services
- Facilities Management
- University Athletics
- University Foundation
- Sexual Misconduct, Harassment & Sex Discrimination (Title IX)
- Internal Audit and Advisory Services
- About DSU
Acceptable Use Policy
You are here
A Message to all System Users
This document formalizes the University policy employees, students as well as contractors and other “users” of the Universities communications and computer systems. Each department may also choose to develop and enforce its own acceptable use policies to further restrict the use within its areas. This may be done only with the understanding that, should a conflict exist, the Universities Acceptable Use Policy (AUP) takes precedence over all local policies developed within the department for the explicit purpose of exercising responsible controls at the local level.
Our goal is to put controls in place that will help protect the University from Hackers, viruses, data loss etc. The threat is real, as each month, DSU intercepts tens of thousands of viruses and suspicious messages containing executable files trying to bypass our security systems. These controls also help minimize the potential risks of misuse. This misuse includes unnecessary Internet usage causing network and server congestion. This Acceptable Use Policy is your (the user’s) guide for helping us achieve this goal by conducting Delaware State University business with integrity, respect, and prudent judgment. Each of us is responsible for upholding the University’s commitment to the highest standards of conduct.
Users are accountable for familiarizing themselves with this policy and using it as a guidepost for your daily decisions and actions when using these services.
Each department is responsible for the activity of its users and for ensuring that its users follow this Acceptable Use Policy. Violations, which are not promptly remedied by the organization, may result in termination of these services.
Introduction
This Acceptable Use Policy is your resource to help you make sound decisions in using communications and computer systems to do your job.
All of us have a responsibility to:
Read: the policy and give careful attention to those subjects that most pertain to your job duties.
Understand: the purpose of this policy and your overall responsibilities for standards of business conduct.
Consult: your supervisor or organization’s Information Resource Manager (IRM), Information Security Officer (ISO), or Human Resources for additional clarification of this policy.
Note the Following:
Applicability
Delaware State University’s expectations for responsible use are applicable to all parties who use the Universities communications and computer systems on behalf of the University, including, but not limited to, its employees, consultants, in-house contractors, and other “users”, either full or part time.
Limitations
This acceptable use policy does not address every expectation or condition regarding acceptable use. It does not substitute for other more specific University policies and procedures.
Acknowledgement Statement
As part of this policy, each network user is required to read and understand the AUP and sign the acknowledgement statement in Appendix 2. We encourage Departments to have their users review the AUP annually. The signed acknowledgement statement must be maintained by the University. Network users who do not sign the Acceptable Use Policy Acknowledgement Statement will be denied access to the Universities Communications and Computer Systems.
Acceptable Use of Communications and Computer Systems
Delaware State University communications and computer systems are vital to our business and critical to overall communications. Our success is directly related to safeguarding and properly using these systems.
WHAT ARE DSU COMMUNICATIONS AND COMPUTER SYSTEMS?
Delaware State University communications and computer systems are any equipment, hardware, software or networks (including wireless networks) owned, provided or used by or on behalf of Delaware State University that store or transmit voice or non-voice data. This includes telephones, cellular/wireless telephones, voice mail, computers, e-mail, facsimiles, pagers, and University Intranet or Internet access (including when accessed through personally owned computers).
Note: Personally owned computers are not authorized on campus to do University Business. Also, when used at home for University Business, you must ensure that any University materials are appropriately safeguarded according to applicable standards in this section, including, but not limited to, virus protection of, protected access to and backup of these materials
Access, Maintenance and Protection
Users must safeguard the confidentiality and integrity of University systems, including strong logon passwords access codes, network access information, log-on IDs) from improper access, alteration, destruction and disclosure. Users shall only access or use these systems when authorized. Users must abide by University standards contained in this section and other University policies regarding protecting data and information stored on these systems.
Unlawful and Inappropriate Use
Users are obligated to never use University systems (such as the Intranet or Internet) to engage in activities that are unlawful, violate University policies or in ways that would:
-
Be disruptive, cause offense to others, or harm morale.
-
Be considered harassing or discriminatory or create a hostile work environment.
-
Result in Delaware State University’s liability, embarrassment or loss of reputation.
External groups or organizations are not permitted to make announcements, solicitations or otherwise access the Universities Communications and Computer Systems, except as permitted by Delaware State University.
Protection and Integrity of Data
Users must maintain the integrity of University Information and data stored on University systems by:
-
Only introducing data into our systems that serves a legitimate business purpose.
-
Only acquiring, using, altering, disposing of, or destroying data or information with proper authorization.
-
Protecting data and information stored on or communicated across our systems and not accessing this data or information (for example, University data, employee records) unless authorized.
-
Protecting data and information communicated over internal or public networks (for example, the Internet) to avoid compromising or disclosing nonpublic University Information or communications. Organizations and employees should seek counsel from their supervisor, HR, or Legal for an opinion when in doubt. The protection of data and information applies to all electronic venues that the University might be using such as email, web applications, social media, etc.
-
Protect data and information by not auto-forwarding University email to non-authorized individuals.
Unauthorized Network Devices
Faculty, staff, students or other non-University users (contractors/vendors) are not permitted to connect any device to the Delaware State University network unless authorized by the Delaware State University I/T Department. These devices include but are not limited to computers, servers, hubs, switches and or wireless access points. If anyone tries to use these devices on campus and any University personnel identify them, these devices will be removed by the Delaware State University I/T Department.
In order to prevent further possible unauthorized activity, Delaware State University may temporarily disconnect any device from the network.
If this is deemed necessary by the Delaware State University I/T Department, every effort will be made to inform the person prior to disconnection, and every effort will be made to reestablish the connection as soon as it is mutually agreed upon.
Delaware State University accepts no responsibility for traffic that violates the acceptable use policy of any directly or indirectly connected networks beyond informing the client that they are in violation if the connected network so informs Delaware State University
Personal Use
While University systems are intended for primarily business/instructional purposes, limited (incidental and occasional) personal use may be permissible when authorized by your management and it does not:
-
Interfere with your work responsibilities or business/instructional operations.
-
Involve interests in personal outside business and/or other non-authorized organizations and activities (which may include, but is not limited to selling personal property/items or soliciting for or promoting commercial ventures, charitable, religious or political activities or causes).
-
Violate any of the standards contained in this code or other Delaware State University policies.
-
Lead to inappropriate costs to the State. (Excessive personal surfing, Excessive long distance or International phone calls, utilizing streaming services for personal use such as listening to music or watching video, and downloading of Illegal music and video files are specifically forbidden.)
Virus Protection
Users must ensure all electronic media is checked , such as software, diskettes, CD-ROMs and files for viruses when acquired through public networks (for example, the Internet) or from outside parties using virus detection programs prior to installation or use.
If users suspect a virus, they must not use the applicable computer systems and equipment until the virus is removed and they will report the matter immediately to the Help Desk. DSU has purchased anti-virus software for all University pc’s.
Properly Licensed Software
Users will only use approved and properly licensed software and will use it according to the applicable software owner’s license agreements.
Treatment of Third-Party Data or Software
Users must ensure that any nonpublic University Information or software of a third party that is stored, copied, or otherwise used on University systems is treated according to Delaware State University’s standards regarding nonpublic University Information and applicable agreements and intellectual property restrictions.
Delaware State University Monitoring
University communications and computer systems, including, but not limited to, computer networks, data files, e-mail, voice , and voice mail, may be monitored and/or accessed by the University to ensure the integrity of the technology, protect against fraud and abuse, detect unauthorized access or use, and for other business purposes.
Although the I/T Department does not randomly monitor message or network transactions, The University may without notification or approval, monitor, access and review any and all communications originating from Delaware State University or delivered to Delaware State University
- Employees should have no expectation of privacy in regard to use of these services. This is in accordance with 19 Del. C. chapter 7,# 705. See Appendix 1
Use of E-Mail and the Internet
Inappropriate use of e-mail includes, but is not limited to, sending or forwarding:
-
Messages, including jokes or any language, that may be considered discriminatory, harassing, unlawful, defamatory, obscene, offensive, insensitive or otherwise inappropriate (this includes but is not limited to, messages about age, race, gender, disability, sexual orientation, national origin or similar matters).
-
Pornographic or sexually explicit web sites or materials.
-
Chain Letters.
-
Information related to religious materials, activities or causes, including inspirational messages, Charitable solicitations unless sanctioned by Delaware State University.
-
Gambling.
-
Auction-related information or materials unless sanctioned by Delaware State University.
-
Games or other software or copyrighted materials without a legitimate business or instructional purpose (and then only according to the rights and licenses granted by the owner of the games, software or copyrighted material).
-
Messages that disparage other institutions, companies, or products.
-
Large personal files containing large graphics materials, video or audio files (such as photographs, movies, and music)
-
Materials related to personal commercial ventures or solicitations for personal gain (for example, messages that could be considered pyramid schemes).
-
Information related to political materials, activities or causes unless sanctioned or permitted by Delaware State University.
-
Unauthorized or inappropriate mass distribution of communications.
-
Intentional importation of viruses.
-
Any other materials that would be improper under this policy or other Delaware State University.
Note: In order to perform their job duties (for example), network monitoring), specific Delaware State University employees may receive management approval exempting them from some of the above restrictions.
REMEDIAL ACTION
Network users who do not sign the Acceptable Use Policy Acknowledgement Statement in Appendix 2 will be denied access to the Universities Communications and Computer Systems.
When Delaware State University learns of a possible inappropriate use, Delaware State University will take immediate remedial action. In instances where users do not respond in a timely or reasonably appropriate manner, are "repeat offenders”, or if criminal activity is suspected, Delaware State University will work directly with the proper authorities, and follow their guidance in determining appropriate action.
Any inappropriate use of Delaware State University communications and computer systems may be grounds for discipline up to and including dismissal.
Exempt employees shall be subject to appropriate discipline without recourse, except as provided by law.
Any determination of non-acceptable usage serious enough to require disconnection will be promptly communicated to HR/Legal, by the Delaware State University I/T Team.
Unauthorized activity or non-acceptable usage determined DSU may be subject to remedial action being taken in accordance with the acceptable use. Delaware State University provides access to state, national and international resources to its clients through connections with networks outside of Delaware. In general, it is the responsibility of those networks to enforce their own acceptable use policies.
Delaware State University will make every attempt to inform its clients of any restrictions on use of networks to which it is directly connected; as such information is made available by the network provider.
Delaware State University accepts no responsibility for traffic that violates the acceptable use policy of any directly or indirectly connected networks beyond informing the client that they are in violation if the connected network so informs Delaware State University.
APPENDIX 1
§ 705. Notice of monitoring of telephone transmissions, electronic mail and Internet usage.
(a) As used in this section, "employer" includes any individual, corporation, partnership, firm or association with a place of business in Delaware and the State of Delaware or any agency or political subdivision thereof.
(b) No employer, nor any agent or any representative of any employer, shall monitor or otherwise intercept any telephone conversation or transmission, electronic mail or transmission, or Internet access or usage of or by a Delaware employee unless the employer either:
(1) Provides an electronic notice of such monitoring or intercepting policies or activities to the employee at least once during each day the employee accesses the employer-provided e-mail or Internet access services; or
(2) Has first given a 1-time notice to the employee of such monitoring or intercepting activity or policies. The notice required by this paragraph shall be in writing, in an electronic record, or in another electronic form and acknowledged by the employee either in writing or electronically.
The notice required by this subsection shall not apply to activities of any law enforcement officer acting under the order of a court issued pursuant to Chapter 24 of Title 11.
(c) Whoever violates this section shall be subject to a civil penalty of $100 for each such violation. A civil penalty claim may be filed in any court of competent jurisdiction.
(d) The provisions of this section shall not be deemed to be an exclusive remedy and shall not otherwise limit or bar any person from pursuing any other remedies available under any other law, state or federal statute, or the common law. The violations of this section by an employer shall not be admitted into evidence for the purpose of, or used as, a defense to criminal liability of any person in any Court in this State.
(e) The provisions of this section shall not apply to processes that are designed to manage the type or volume of incoming or outgoing electronic mail or telephone voice mail or Internet usage, that are not targeted to monitor or intercept the electronic mail or telephone voice mail or Internet usage of a particular individual, and that are performed solely for the purpose of computer system maintenance and/or protection.