University Housing Student Computing & Room/Apartment Condition Inventory Agreement
You must read and agree to all stipulations set forth in this document in order to receive clearance for network access. All on-campus housing rooms are equipped to provide residents who own a personal computer, a single high speed Internet access port. Our goal is to enable you to access information necessary to accomplish your academic course work, and to assure a positive computing experience while living on-campus. Safety is primary, so please take the time to follow the guidelines below.
In addition, you accept responsibility for the physical condition, maintenance, and cleanliness of the apartment, bedroom, and furnishings listed in the Apartment/Room Condition Inventory Form that was placed on your desk in your bedroom. You agree to clean your apartment/room before you check out. You understand that you may be held financially responsible for damages found during the final inspection of your vacant bedroom/apartment by custodial and/or maintenance staff.
- You will read and comply with the Information Technology Services Responsible Use Policy and state and federal laws.Understanding these policies will protect you from prosecution due to a violation of applicable laws and Information Technology Services Responsible Use Policy (ITS RUP). You are ultimately responsible for the use of your computer and your network connection. You can view these policies at http://security.calpoly.edu/policies.
- You will read and comply with the University Housing, ResNet Mandatory Computing Security Requirements. These requirements outline the required security measures necessary in maintaining a clean and stable network including operating system updates, antivirus, and antispyware measures. The University is not responsible for virus protection and waives any claim for damages due to viruses contracted through system use. You can view these requirements at http://resnet.calpoly.edu/security.html
- You are not permitted to use your computer as a server that is open to the general public.This includes, but is not limited to, web servers, FTP servers, and peer-to-peer (P2P) applications that permit open distribution of unauthorized files such as music, movies or, any other copyright protected material. Refer to the ITS RUP policy provision sections E.1, E.4.2, E.4.3, E.4.8, E.4.9, E.4.10, E.4.12, and E.8.
- You are not permitted to use unauthorized networking equipment. This includes, but is not limited to, routers, hubs, switches, access points, and airports, wireless or wired. The use of this equipment is strictly forbidden and will be regarded as a blatant disregard of state and federal law, University Housing, ResNet, and University Acceptable Use Polices. Refer to the ITS RUP policy provision sections E.4.8, E.4.9, E.4.10, and E.4.12.
- You are not permitted to make, download, and share illegal copies of software and media. Making, downloading, and sharing illegal copies of software and media is a violation of copyright laws, University Housing, ResNet, and University Acceptable Use Polices. Refer to the ITS RUP policy provision section E.8.
- You are not permitted to create, connect to, use, or participate in any unauthorized network connections on the University network. This includes, but is not limited to, any peer-to-peer (P2P) application, connection, or protocol such as BitTorrent, Waste, and Alliance, whether the connections are internal or external. Acting as a host or node on these types of networks has been deemed a violation of University Housing, ResNet, and University Acceptable Use Policies. Refer to the ITS RUP policy provision sections E.4.2, E.4.3, E.4.8, E.4.9, E.4.10, and E.4.12. Furthermore, using such unauthorized networks to distribute any copyright protected material is a violation of University Housing, ResNet, and University Acceptable Use Policies. Refer to the ITS RUP policy provision section E.8.
- Attempting to circumvent Cisco Clean Access (CCA) authentication will be considered a clear violation of University Housing, ResNet, and University Acceptable Use Policies. Refer to the ITS RUP policy provision section E.4.7 for more information.
- You will take the precautionary steps necessary to protect your computer against electrical damage. Plug your electronic equipment into a UL listed power surge protector. Make sure that you purchase a surge protector and not a power strip, which does not have any protective features. The University is not responsible for damage to electronic equipment due to failure to use a proper surge protector.
- You will take the precautionary steps necessary to protect your computer against malware attacks sent to you by email. As a rule, avoid opening questionable file attachments. Many malicious worms and viruses multiply by sending themselves as attachments to contacts in your email address book. If a file attachment is executed (clicked or opened) that contains a worm or virus, it will install itself, infect, and eventually destroy software and documents on your computer (quite possibly your entire operating system). Refer to ITS RUP policy provision section E.4.1.
- You will take the precautionary steps necessary to protect your computer against malicious attacks prior to sharing any directories or printers on the network. Unless you understand the risks of file and printer sharing on a network, it is recommended that you do not share any files or printers. Opening a directory or printer on your computer to the network permits others to save and execute processes on your computer remotely. Refer to ITS RUP policy provision section E.4.1.
Resident and non-resident users must abide by these policies and guidelines. You are ultimately responsible for all use of the network connection provided in your room. The University is not responsible for virus protection and waives any claim for damages due to viruses contracted through system use.
I have read and understand the above agreement, and I know can be held responsible for any damage that may occur as a result of my not following these guidelines.
Last Update: 16 August 2012
This website best viewed in Safari 4+, Firefox 3+ & IE 8+.