College of Southern Idaho
Device Registration

Acceptable Use Policy


The CSI Computer and Information Resources Acceptable Use Policy is designed to guide students, faculty, and staff in the acceptable use of computers, information resources and networks provided by the College of Southern Idaho (CSI), hereby referred to as the College or CSI.  Electronic device use by faculty, staff and students at CSI is encouraged to support the educational mission of the College.  As a result, CSI’s computing and information resources are to be used for educational purposes in an ethical and courteous manner. In addition, all CSI electronic device users are bound to adhere to the acceptable use policy.

Guiding Principles

The CSI community is encouraged to make innovative and creative use of information technologies in support of education and associated research.. Access to computing and information resources owned or operated by the College of Southern Idaho impose specific responsibilities and obligations.  This access is granted subject to college policies, and local, state, and federal laws. Acceptable use always is ethical, non-offensive, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of information, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation and harassment.


Electronic files created, sent, received, or stored on computers owned, leased, administered, or otherwise under the custody and control of the College are the sole and exclusive property of the College; they are not the private property of any User.  Provided, however, that there shall be a rebuttable presumption that works that an individual creates for academic or research-related purposes are the intellectual property of that person.  Notwithstanding such presumption, all such works are nevertheless subject to the College’s rights as provided in the privacy provisions of this policy.

Notice is hereby given that there are no facilities provided by the College for guarantee of confidential files. CSI staff may have the ability to view all messages and files of any user. However, it is not the routine policy of the staff to view others’ files, and the intention is to keep files private, even though such privacy cannot be guaranteed.

Acceptable Use Guidelines

In making acceptable use of electronic resources the College expects that you will:

  • Use information resources only for authorized purposes, which are limited to educational-related coursework, academic research, and work-related departmental activities.
  • Protect your user id and system from unauthorized use. You are responsible for all activities on your user id or that originate from your system.
  • Access only information that is your own, that is publicly available, or to which you have been given authorized access.
  • Use only legal versions of copyrighted software in compliance with vendor license requirements.
  • Abide by the laws of libel, privacy, copyright, trademark, obscenity and child pornograpy.  This includes plagerism, digital piracy and other unauthorized copyright infringement.
  • Minimize and avoid unnecessary network traffic which might interfere or negatively impact the work of other users of the network or connected networks.

In making acceptable use of resources the College expects that you will not:

  • Allow others to access CSI computing resources using your network credentials.
  • Improperly access or attempt to access, misuse, send, or misappropriate information or files. Unauthorized access to systems, software, or data is prohibited.
  • Use computer programs to decode passwords or access control of information.
  • Attempt to circumvent or subvert computer and network security measures.
  • Connect or use unauthorized or personal equipment on CSI networks.
  • Engage in any activity that might be harmful to systems, networks, or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
  • Use CSI systems to access or distribute what could be considered offensive, abusive, pornographic, threatening or libelous material.
  • Use CSI systems for commercial or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates.
  • Make or use illegal copies of copyrighted software, store such copies on CSI systems, or transmit them over CSI networks.
  • Engage in unauthorized copying, download or sharing of copyrighted digital files as outlined in the Digital Millennium Copyright Act (DMCA). 
  • Use systems that significantly interfere with the ability of others to make effective use of the network or which disrupt the CSI network or any connected networks, systems, services, or equipment.
  • Use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by sending unwanted mail, or by using someone else’s name or user id.
  • Use the College’s systems or networks for personal gain, for example, by selling access to your user id or to CSI systems or networks, or by performing work for profit with CSI resources in a manner not authorized by the college.
  • Engage in any other activity that does not comply with the Guiding Principles presented above.

Procedures and Sanctions

Individuals accessing information systems owned by the College of Southern Idaho do so subject to applicable laws and CSI policies. College of Southern Idaho disclaims any responsibility and/or warranties for information and materials residing on non-CSI systems or available over publicly accessible networks. Such materials do not necessarily reflect the attitudes, opinion, or values of College of Southern Idaho, its faculty, staff or students.

Violations or apparent violations of this policy will be referred to CSI Student Services or Human Resources as appropriate. Persons found to be in violation of this policy are subject to the full range of sanctions, including the loss of computer or network access privileges, disciplinary action, dismissal from the College, and legal action.

The College of Southern Idaho considers any violation of acceptable use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on CSI systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Violators are subject to disciplinary action as prescribed in the student’s College Code of Conduct and the student and employee handbooks. Offenders also may be prosecuted under laws including (but not limited to) the Communications Act of 1934 (amended), the Privacy Protection Act of 1974, the Computer Fraud and Abuse Act of 1986, the Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property, the Electronic Communications Privacy Act, the Higher Education Opportunity Act, the Digital Millennium Copyright Act, and Idaho computer crime laws as specified in Idaho Code, Section 2201. Access to the text of these laws is available in the reference section of the College of Southern Idaho library.


Appeals should be directed through the existing appeals and problem solving procedures.

If you need assistance, please contact the Help Desk at 732-6311