Acceptable Use of Information Resources

Purpose

The purpose of this Standard is to safeguard South Texas College's network and information resources from threats such as malware, cyberattacks, unauthorized access and legal liability. Inappropriate use of these resources can compromise data integrity, network security and institutional operations. This Standard aligns with the College’s culture of openness, trust and integrity while ensuring compliance with applicable laws and regulations, and Policy CR – Technology Resources and CS – Information Security. Protecting the College’s information assets is a shared responsibility among all employees (faculty and staff), students and stakeholders who interact with College systems.

Acceptable Use

State and federal laws protect against the misuse of information resources, unauthorized access, and cybersecurity threats. South Texas College defines acceptable use to maintain operational security, legal compliance and a professional digital environment.

Responsibilities of Users of College Information Resources

Users of College information resources must adhere to the following responsibilities:

  • Data Protection: Protect sensitive, classified, or legally protected information from unauthorized access or disclosure.
  • Account Security: Safeguard user credentials (e.g., usernames, passwords and multi-factor authentication tokens) and avoid sharing login information.
  • Device Compliance: Follow the Information Security Mobile Device Security Standard when connecting personal devices to College networks or systems.
  • Incident Reporting: Immediately report lost or stolen College-owned devices or personal devices that store College-related data.
  • Intellectual Property: Respect and adhere to copyright laws, licensing agreements and intellectual property rights associated with digital resources.
  • Software Licensing: Comply with software licensing terms for applications installed on College- owned or operated systems.
  • Legal and Ethical Use: Utilize College information resources in accordance with federal, state and institutional regulations, including ethical and responsible computing standards.
  • Generative Artificial Intelligence (GenAI): Users must adhere to guidelines for using AI tools, ensuring compliance with College policies regarding data privacy, intellectual property, and ethical considerations. Users must reference and follow the best practices outlined in the South Texas College Generative AI Portal.

Prohibited Uses of College Information Resources

The following activities are strictly prohibited as they compromise the security, efficiency and integrity of the College’s information systems:

  • Credential Sharing: Sharing passwords or authentication credentials for any College accounts or information systems.
  • Unauthorized Access: Attempting to bypass security controls, exploit vulnerabilities, or gain unauthorized access to systems, networks or data.
  • Spam and Phishing: Sending unsolicited or deceptive email messages unrelated to College
  • Eavesdropping and Interception: Monitoring, intercepting or altering electronic communications without authorization.
  • Security Tampering: Disabling, bypassing or interfering with security controls, antivirus solutions, or monitoring tools deployed on College systems.
  • Network Disruption: Engaging in activities that degrade system performance, cause outages or otherwise disrupt network operations.
  • Inappropriate Content: Transmitting, accessing or displaying material that violates Policy DIAA, Policy FFDA, Policy DIAB, or Policy FFDB.
  • Copyright Violations: Illegally downloading, streaming or distributing copyrighted materials without proper authorization.
  • Commercial and Political Activities: Using College resources for personal profit, commercial ventures, unauthorized fundraising, political campaigning or illegal activities, unless explicitly sponsored by the College.
  • Malicious Software Deployment: Creating, distributing, or executing programs, scripts, or files that could harm, alter, or compromise College IT resources.
  • Unauthorized AI Use: Using Generative AI tools in a manner that violates College policies, exposes confidential information, or misrepresents official College Users must review best practices and compliance guidelines available on the South Texas College Generative AI Portal.
  • Personal Device Connections: Personally owned devices may only connect to the College’s network via approved wireless access points.

By using South Texas College information resources, users agree to comply with this Standard. Violations may result in disciplinary action, loss of access or legal consequences as determined by College administration and applicable laws.

back to top