Skip To Content

 Reset Password
You are here:  CASC Computer Policy  

CASC Computer Policy

Telecommunications and Information System’s Policies, Procedures,
Guidelines, and Best Practices
Introduction:
It is the intent of this document to provide the procedures, outline policies,
guidelines, and best practices for securing the Carl Albert State College network,
and its electronic data assets. This document will be made available to all the
required CASC departments.
All guidelines and policies will be overseen by the office of Telecommunications
and Information Systems. Any systems that are not controlled by CASC, but
service the college will be under the guidelines of the contracted host party.
 
Information Policy:
The office of Telecommunication and Information Systems is committed to the
integrity and security of all CASC data. We will coordinate our procedures and
policies to meet the requirements of Oklahoma state law. All computer systems
and data created or hosted by CASC is the property of CASC and can be accessed
and retrieved when necessary, and is subjected to the policies, procedures, and
best practices outlined in the following document.
 
CASC User Responsibilities and Guidelines:
Users are advised to follow best practices for maintaining passwords on
authorized systems:
• Users should avoid keeping passwords posted in public view
• We advise all users not to keep a paper record of passwords
• Select a mixed alpha-numeric and special character password no less than 8
characters in length.
• Keep password confidential. Do not share password information.
• Change you temporary password at first logon.
• Do not re-use old passwords
• Change passwords at regular intervals. We recommend every 15 to 30 days,
and do not include passwords in automatic log-on process
• If a suspected breach of your password is suspected, please contact TIS
immediately, so your account may be secured.
• Avoid using personal information, e.g. dates, names, and number
Users are responsible for backing up all local data created or saved by the user
on their local computer systems:
• All network data shared by users is backed up and archived by our office.
• Any hardware or software, e.g. cd burner or usb drive, required by the user
to back up their local system, will be provided for by CASC at the request of
the user.
• The backups created by the user will be the sole responsibility of the user,
e.g. CD, usb external disk, or personal USB flash drives.
• CDs, usb external disk, or personal USB flash drives containing student or
employee data must not be taken off campus without prior authorization.
• Users are advised to maintain a regular routine for backing up their local
computers.
• It is recommended that all backups are tested for data integrity to ensure
accessibility of data in the event of a local system failure, e.g. hard drive
failure, or accidental deletion of data.
• The office of Telecommunication and Information Systems is not
responsible for any data loss incurred by a user who fails to follow the
above procedures.
The confidentiality of CASC student data is required by Oklahoma state law:
• Do not save confidential student data, e.g. social security numbers and
grades on the local machine
• Personal student information, e.g. social security number, grades, or any
another sensitive data is not to be shared with un-authorized personnel,
and must not be made available for public access.
• Confidential student and employee data is the property of CASC, and is not
to be shared or removed off campus without the proper authorization.
• Confidential student and employee data is the property of CASC, and should
not be stored on removable media i.e. USB without the proper
authorization and encryption.
 

The security and the integrity of the CASC network is the first priority for the
office of Telecommunications and Information systems. In order for us to
maintain our high standards, we need all users to:
• Keep un-authorized users from accessing your local system
• Run weekly spy-ware scans on local systems with Microsoft Essentials.
• Keep Microsoft Essentials anti-virus software updated
• Run weekly virus scans of local computer
• Do not install un-authorized software
• Do not connect personal laptop computers to the network without prior
approval.
• Avoid opening un-solicited email attachments or clicking on embedded
links.
• Avoid accessing un-authorized data or systems without obtaining
authorized access.
• Do not download and distribute copyright protected material
• Take no intentional actions to interfere with or disrupt the CASC network
• There will be no access , creation, and distribution of sexually explicit,
discriminatory, derogatory, defamatory, obscene, offensive, or harassing
based on gender, religion, race, national origin, ancestry, age, disability,
medical condition, sexual orientation, or any other status protected by the
state and federal laws
• Because of the need to protect the CASC network we cannot guarantee the
confidentiality of information stored on any computer networked device
belonging to CASC or personal devices used for CASC work duties.
Email accounts are provided for all CASC faculty and staff and are subject to the
policies and guidelines stated below in order to prevent tarnishing the public
image of CASC. When email is sent from CASC the public will tend to view
message as an official policy statement from CASC. CASC email accounts may
not:
• Send email using another individual’s email account to distribute sexually
explicit or obscene messages. Employees who receive any emails with this
content from any CASC employee should report the matter to their
supervisor immediately.
• spoof another user’s email account
• knowingly and maliciously forwarding viruses and worms
• violate any federal and state regulation
• harass fellow employees with hateful or threatening email
• Promote personal political, religious, philosophical positions as those held
officially by CASC
• Inappropriate use of email privileges will be reviewed by the college and the
appropriate actions, including the removal of email access, and possible
termination of employment.
• No sensitive student or employee data i.e. ssn, grades should be sent within
an email or as an email attachment.
• Reply or forward large distribution list
• Carl Albert State College email is not for personal use and is subject to the
computer policies and procedures. CASC employees shall have no
expectation of privacy in anything they store, send or receive on the CASC
email system. The CASC TIS Department may monitor messages without
prior notice.
 
The responsibility for maintenance of hardware and software on all CASC
computer systems belongs to the office of Telecommunications and
information Systems:
• Users shall report all hardware or software issues to the department of TIS
• Users must submit a help-desk support request for any service request
relating to their local system, by submitting a help-desk support request at
the following link: http://support.carlalbert.edu/
• Users should not attempt to replace hard drives, cd/dvd devices, or any
internal device in the local system
• Keep food and drinks away from the local system to prevent damage to
computer and system peripherals
• In the event of catastrophic damage to the local system, the user will be
provided with a working computer as a permanent replacement
 
The BYOD (Bring Your Own Device) policy at Carl Albert State College is the
following:
• TIS will not support personal devices i.e. laptops, IPADS, and Smartphones.
• No BYOD is permitted to access the Carl Albert State College network
without prior authorization from TIS.
• All BYODs are the sole responsibility of the owner. CASC and TIS are not
responsible for any device or data on device that is lost or stolen.
• All BYOD systems accessing the CASC network are required to use
encryption in the event that a system is lost or stolen.
• No BYOD should contain sensitive student or employee data i.e., ssn,
grades, or financial information.
Internet/Intranet access is granted by default to all CASC faculty and staff. Use
of these resources should be considered a privilege and a responsibility. Failure
to consider the following potential threats could result in severe network
interruption, and the potential for the compromise of information assets:
• Exploitation of the local system by various executable files delivered
through a web browser
• The forced download of malicious spy-ware that can significantly slow down
the local system. Spy-ware can be used by un-authorized corporations and
individuals to gain potentially sensitive information from the infected local
computer
• Non-encrypted information that is transmitted over an insecure connection
may be intercepted
• Using your casc email address while browsing personal interest or social
networking sites, may result in your email account, or the accounts in your
Outlook address book being spammed or spoofed
• CASC is not responsible for any monetary losses due to fraud or technical
failure if user engages in personal, e-commerce purchases on CASC systems.
• CASC is not responsible for any personal data losses due to technical failure
if user is storing personal files on any CASC systems
 
JICS Portal Access:
Vikeconnect is Jenzabar EX/PX portal software that allows for enterprise control
and tools for student, faculty, and staff. CASC’s access to Vikeconnect is
currently being hosted and maintained by TIS. It is the responsibility of the
Telecommunication and Information Systems department to administer the
Vikeconnect portal, e.g. account generation, passwords, and access permissions.
Each student, department and faculty member may request account creation
and specific tab access. The following policies and guidelines apply:
• The V.P. over the department shall contact the office of Telecommunication
and Information systems, to request specific access for their staff.
• TIS will offer the necessary training for each tab to equip the individual to
access needed portal functions
• It is the responsibility of each requesting department to ensure the security
of passwords and access within their department.
• Portal use must comply with the CASC Code of Computer Conduct.
• Any information posted on the CASC portal is subject to approval by the
Office of Telecommunications and/or the CASC Online Committee.
 
The office of Telecommunications and Information Systems has worked
diligently to provide CASC students, faculty, and staff with cutting edge
technology that will enable our institution to take advantage of up and coming
technologies, and will allow CASC to remain a competitive higher learning
institution. CASC has a one gigabyte backbone which will allow for considerable
campus growth, and permit our institution to take full advantage of broadband
technologies, e.g. wireless access and streaming video. To maintain and make
full use of our networks assets, it is our highest priority to keep our network
secure and fully operational. TIS has developed policies, procedures, and
guidelines to ensure the security and viability of the Poteau/Sallisaw, CASC
campus network:
 
User Account Request and Creation Policy
• All request for user login accounts for the CASC campuses are restricted to
staff, faculty, contract employees, and federal employees, e.g. Trio, Power
1.
• All requests must be initiated by the department supervisor to the office of
TIS.
• This request must be submitted to the office of TIS for review, approval,
and creation.
• Once the user account has been approved, a user name, password, email
and portal accounts will be issued by TIS.
• User login will be available immediately upon approval and creation.
• Users must contact TIS to obtain user’s account information.
• It is the responsibility of each user to ensure the confidentiality of their
account information.
• It is against CASC policy to allow a network user to login under any account
other than the account assigned to them by TIS.
• The un-authorized use of another employee’s account is strictly forbidden
and considered an abuse of account privileges.
• All intentional, un-authorized access to user accounts and data will be
viewed as a breach of network security, and reviewed for appropriate
recourse.
• TIS will assume no responsibility for the loss of personal data due to security
violations through the misuse of account information.
Jenzabar PX User Account Request and Creation Policy
• All requests for a Jenzabar PX user account must be made to TIS by the
supervisor of the department the user is working under.
• Once the user account has been approved, a user name and password will
be issued by TIS.
• User login will be available immediately upon approval and creation.
• Users must contact TIS to obtain user’s account information.
• It is the responsibility of each user to ensure the confidentiality of their
account information.
• It is against CASC policy to allow a PX user to login under any account other
than the account assigned to them by TIS.
• The un-authorized use of another employee’s account is strictly forbidden
and considered an abuse of account privileges.
• All intentional, un-authorized access to user accounts and data will be
viewed as a breach of network security, and reviewed for appropriate
recourse.
Passwords
• TIS password policy settings are configured on a Windows 2008 domain
server.
• All user accounts and account policies are cross replicated between the
Poteau and Sallisaw domain servers.
• All passwords must be at least 8 characters long and contain alpha-numeric
and special symbols.
• Users are forced to change passwords every ninety days.
• Users may not input existing passwords when required to enter a new one.
• A user has three attempts to enter the correct password. If the correct
password is not entered after 3 attempts, the account is automatically
disabled.
• If a user’s account has been disabled, the individual will need to contact
Jerry Ellis at TIS to have the account enabled.
• If a user forgets his/her password, they will need to contact Jerry Ellis at TIS
to request a password reset.
• If a user suspects that a password has been compromised, they should
change their passwords immediately, and inform TIS.
• All passwords are to remain confidential to the individual user, and should
not be divulged to another co-worker, or any un-authorized persons.
• Passwords must not be kept in open view to ensure user account and
network access security.
• Any damage incurred to the CASC network or local computer system, due to
negligence of the password policies and guidelines of this institution, will be
reviewed by this department and the appropriate actions will be decided.
Backups and Restoration of Data
• It is not the current policy of TIS to preform workstation backups. All
necessary data e.g. imaged documents, databases, and departmental
network shares that are housed on TIS servers are backed up nightly. In the
event of minor to sever data loss, the data can be retrieved from the
backup server or external backup drives. All applications and data hosted
outside of the CASC network, e.g. Blackboard and CASC website content is
the responsibility of the contracted host OneNet. OneNet provides a three
a.m. nightly backup of the following: CASC online course management
system Blackboard and the CASC website. Email is hosted by Google and is
not currently backed-up or archived.
• All backup media and documented backup procedures will be placed in a
secure environment.
• Back-ups will be routinely subjected to quality testing to ensure the
integrity of the archived data.
• Domain user information and policies are replicated between domain
servers. In the event of the failure of one domain server, all account access
and policies are made available by the other domain server.
• The backup of all local systems is the sole responsibility of the local user. TIS
is not responsible for any data loss incurred on the local system due to
system failure, theft, or security breaches.
• The appropriate backup peripherals, e.g. usb drive, cd burner, will be
provided to each user upon request. The routine storage and security of all
archived data on the local system is the responsibility of the local user.
• The appropriate backup peripherals, e.g. usb drive, cd burner, will be
encrypted to protect data in case devices are lost or stolen.
• In the event that a local system drive needs to be reformatted or replaced,
TIS will attempt to recover and restore the “My Documents” folder,
Internet Explorer’s “My Favorites” file, “Outlook”, “Address Book”, and
emails. We do not guarantee the recovery and integrity of any data we
attempt to retrieve.
Servers and Local System Security Updates
• All network servers (except Alpha and Beta) and local systems are
scheduled for daily updates.
• Updates are automatically installed on servers and local systems after they
have been downloaded.
• The server hosting the CASC Jenzabar PX application is updated manually
when necessary. Server must be powered down manually to protect against
potential data corruption and system downtime.
Virus Policy and Procedure
• All servers and local systems hosted on the CASC network (except for Alpha
and Beta are secured with Microsoft Essentials Anti-Virus software,
purchased by CASC from Microsoft.
• Microsoft Essentials software incorporates “live update” which downloads
the latest virus definitions weekly, to ensure up to date protection from
worms and viruses.
• In case a virus or worm is detected on a server or local system, the infected
system is immediately taken off the network, evaluated, and cleaned, and
then re-evaluated.
• If it has been determined that a system virus or worm cannot be removed,
the infected drive will be reformatted, the appropriate operating system
installed, and the most recent back up of the data restored onto the
computer.
• Once it has been determined that the system is no longer a threat to the
CASC network, the computer will be joined back into the CASC network.
Physical Security
• It is the policy of the office of Telecommunication and Information Systems
for all servers, routers, switches, and other equipment critical to the CASC
network to be kept locked and secured from public access.
• Keys to the facilities hosting network servers and devices are under the
supervision of the CASC Network Administrator, Jerry Ellis and the Director
of Information Technology, Michael Martin. All keys checked out by
authorized TIS staff must be returned to Jerry Ellis or Michael Martin.
• Access to all backend hardware critical to the CASC network is limited to TIS
staff, under the discretion of the Director of Information Technology,
Michael Martin.
• All un-authorized individuals tampering with any network system devices,
e.g. servers, routers, will be considered breaching network security, and
appropriate actions will be initiated. Employees of CASC shall report any
misconduct or access violations of all network systems and devices.
• The physical security of employee, desktop systems are the responsibility of
each employed user. All desktop computers are to remain in the offices in
which they were installed. All active desktops should be locked when users
leaves computer for any length of time. Each office is to be locked after
CASC operating hours to prevent unauthorized use or theft. Failure to
follow these procedures may result in TIS inability to replace the computer,
due to our limited stock.
• It is the responsibility of each user to contact the offices of
Telecommunications and Information Systems in case of theft or damage to
desktop systems. TIS will replace a stolen or damaged system with an
available system of equal or greater configuration, depending on availability
of systems in stock.
• All campus labs installed with Dell desktop systems, have been daisy
chained with cables and locks to prevent theft or removal from labs. All
other systems are kept secure behind locked facility doors.
 
Disaster Recovery
It is the primary responsibility and concern of the office of Telecommunications
and Information Systems to ensure the reliability of the CASC campus network.
We are committed to the accessibility of our networks in the event of the
compromise of servers, desktops, portables, our local area network, and
backbone systems. The policies, procedures and guidelines are to be followed in
the event of the catastrophic failure of any physical or logical part of the CASC
network.
• In the event of a network systems emergency, the TIS staff will meet at the
office of the Director of Information Technology, Michael Martin, to discuss
the nature and extent of the emergency. A systematic solution will be
discussed and developed according to the circumstance, and then a plan
will be immediately implemented.
• TIS shall designate a team leader to coordinate and direct all emergency
network recoveries. The leader will be responsible to assign TIS staff to
specific recovery responsibilities, according to their knowledge, skill, and
training.
• When an emergency situation has been detected, if there is a physical
threat of danger, notify the proper authorities, e.g. safety, campus police,
or fire department.
• During the summer months air conditioning is critical to our network
operation. If the air condition systems fail, power down critical systems to
reduce potential damage to network components and data.
• Critical systems are protected in the event of power failure with UPS
battery systems to allow for the proper system shutdown procedures.
• If a fire has been detected, shut off power and contact the fire department.
Fire alarms should automatically sound, and fire retardant should be
automatically released into the fires location.
• In the event of a flood, wind or water damage, power down all systems if
possible, or cut off power. Alert emergency services for assistance or
possible evacuation.
• If there is electrical failure, servers, routers, and switches are maintained
with an ups system. All systems should be powered down before ups power
is no longer available.
• If an un-authorized network intrusion has occurred, the affected system
should be removed from the network. If the extent of the compromise
cannot be immediately determined, all network links should be closed until
a proper analysis can be performed.
• Copies for recovery procedures are accessible to all TIS staff in case of the
above mentioned emergencies. Phone numbers for all TIS staff, vendors,
and vendor information will be located in a locked fire safe, and keys will be
made available on and off campus.
 
System Testing Procedures :
Due to the sensitive nature of information at CASC, the office of
Telecommunication and Information System’s set policies, are to keep all
hardware and software in development and testing separate from our accessible
network. Software and hardware critical to running Carl Albert State College
must be maintained in a test/development free environment, to safe-guard
against accidental corruption of live systems, access of test systems by unauthorized
network users, and possible loss and corruption of important data.
• Software currently being tested should be implemented on a stand-alone
system, with its own cpu, drives, and with access limited to assigned
individuals.
• Systems containing compilers, code, and system utilities should not be
accessible to live systems.
• Individuals assigned for test and development systems should use names
and passwords distinct from the live systems that are routinely accessed.
• The approval to ploy a test system for operational access must be approved
by the office of Telecommunications and Information Systems, Director of
Information Technology, Michael Martin .
 
Disposal of computer systems, drives, and peripherals
It is the policy of TIS to utilize all computer systems and components efficiently
and economically. If a computer system is no longer compatible with the required
hardware and software needed for CASC applications, the system is disassembled
and all usable parts, e.g. hard drive, memory, cdrom, and DVD drive, are salvaged
for use on other systems.
 
Firewall and VPN
Firewalls are a fundamental to any network infrastructure. A firewall is a critical
element in protecting a LAN, VPN, WAN (or a combination of these) from unauthorized
intrusion, viruses, worms, and potential denial of service attacks.
Although the firewall is not the cure all for these potential threats, it is an
important and critical element in securing any network.
TIS is currently utilizing Juniper Networks firewalls to secure the CASC private
networks in Poteau and Sallisaw, as well as VPN connections linking the campuses
together. The firewalls are password protected and maintained in a locked facility
to prevent physical access and network intrusion. The firewall operating systems
are patched or updated when vulnerabilities are found that present a threat to
network security. CASC has an intra-net VPN connection to the CASC Sallisaw
campus. Most systems have static IP addresses and are monitored and patched on
a regular basis. The CASC firewall is password protected and maintained behind a
locked facility. The operating system for the firewall is patched when Juniper
vulnerabilities are released.
 
CASC Website Maintenance and Security
The Carl Albert State College website is hosted by OneNet. OneNet is Oklahoma’s
telecommunications and information systems network for education and
government. OneNet is responsible for all backend operations for the CASC’s
website, e.g. server, hosting software, security, and disaster recovery.
• It is the responsibility of TIS to administer access, users, and content for Carl
Albert State College’s website.
• Each CASC department is assigned a sub-web with a user name and
password, and is responsible for assigning an individual to create and
maintain content for each department’s sub-web.
• A request can be made to TIS for web design training with ModX. The
request must be made by the departments to Director Michael Martin.
• OneNet backs up the entire website each evening, but TIS cannot guarantee
the recovery of any department’s content due to accidental deletion, file
corruption, or failure to save files.
• All sub-web user names and passwords are required to be kept confidential,
and should be known only to authorized individuals within each
department.
• In the event that the CASC website becomes inaccessible, the office of TIS
will alert OneNet to the issue for information and resolution.
• In the event that a sub-web becomes inaccessible, that department should
contact the office of TIS for information and resolution.
• In the event of the catastrophic data loss of the CASC website, disaster
recovery, procedures and policies will be determined by OneNet.
• In the event of the catastrophic data loss of a department sub-web, disaster
recovery procedures, and policies are the responsibility of the department,
 
TIS and OneNet.
CASC Online Courses: LMS Maintenance, Security, and Backup
In order to create a more productive and creative learning environment for CASC
students, CASC is committed to utilizing the World Wide Web for distance
instruction. Online learning has become a critical component for offering a flexible
alternative to class room instruction. CASC is currently contracting with OneNet to
host the Blackboard course management system.
• CASC online course software “Blackboard” is hosted by OneNet
• Installation, patches, system backups, and disaster recovery policies and
procedures are performed and maintained by OneNet
• TIS is responsible for maintaining valid, up to date Blackboard licensing and
administration
• TIS are responsible for creating and maintaining all Blackboard user
accounts, e.g. designers, teacher’s aids, and students.
• All requests for Blackboard user account must be made to Admissions by
the supervisor of the department the user is working under.
• Once the user account has been approved, a user name and password will
be issued by TIS.
• User login will be available immediately upon approval and creation.
• Users must contact TIS to obtain user’s account information.
• It is the responsibility of each user to ensure the confidentiality of their
account information.
• It is against CASC policy to allow a Blackboard user to login under any
account other than the account assigned to them by TIS.
• The un-authorized use of another administrator, faculty or adjunct account
is strictly forbidden and considered an abuse of account privileges.
• All intentional, un-authorized access to user accounts and data will be
viewed as a breach of network security, and reviewed for appropriate
recourse.
• TIS is responsible for faculty training, support, and works with faculty to
ensure the accessibility of all course content, features, and utilities.
• TIS is responsible for all technical support issues for students involving
online courses
• All non-technical issues involving student access to online courses and
content, e.g. exam dates, make-ups, and assignments are to be referred to
their instructor for assistance.
 
Vikeconnect Maintenance, Security, and Backup
All data presented in Vikeconnect comes live directly from the Carl Albert State
College administrative database, Jenzabar PX; All CASC student’s information is
automatically kept up to date. Links and functionality available are dependent
upon user permissions. Students are provided their login information at freshman
orientation and have access to online self-registration during availability.
Vikeconnect allows students to enroll and drop courses online, check their fees
and balances, and view information on the classes they have enrolled in, accept
and decline loan awards, and track degree progress. The following guidelines and
procedures are in place to ensure student information is secured while navigating
Vikeconnect.
• Whenever a session remains inactive for longer than 20 minutes, the
student will be logged out automatically. This time limit is for their own
security, preventing anyone else from seeing or changing the students
sensitive information.
• The Vikeconnect interface it hosted and maintained by the office of
Telecommunications and Information Systems. The interface presents
information dynamically, and pulls all student data from the college
database (Jenzabar PX).
• The CASC Jenzabar PX system is backed up nightly to a tape drive, and
archived for possible future catastrophic data loss recovery.
• Student user names and passwords are to remain confidential, and should
not be written down and left in open view for other students or any
unauthorized person to view.
• If a student or employee believes that their Vikeconnect account has been
compromised, they must contact the office of TIS immediately, so the
appropriate actions can be taken to secure the user’s account.
• In the event of a user name and password being compromised, users should
immediately reset their login information by going to the Vikeconnect
portal, clicking on “reset password” and enter the information needed to
change their password. The user should contact TIS immediately to relate
the possible security breach with the student, staff, or instructor account.
 
Policies on unlicensed software for backend operation:
The high cost of purchasing the necessary software to keep a state college
running effectively, can present an enormous expense to any college. It is the
policy of CASC and the department of Telecommunications and information
Systems to abide by all federal and state laws regarding the legal use of
proprietary and open source software. We use the following guidelines when
purchasing, installing, maintaining, and upgrading all software running on CASC
systems.
• All software purchased and installed at CASC must be safeguarded from
license expiration and misuse.
• A copy or proof of license must be available on demand, and kept available
for all TIS staff, or requesting authorities
• All software installed for test or trial purposes must be un-installed after
trial license has expired or software trial has been completed
• All software to be purchased and installed must be approved according to
the proper methods and procedures of Carl Albert State College.
• Absolutely no pirated, stolen, or illegal software is to be installed on any
system at CASC
• All software must meet system specifications, and be compatible with the
CASC network
• All outsourcing of software applications must be approved by the proper
methods and procedures of Carl Albert State College, and meet any federal
and state requirements for State college purchase and access. TIS will be
consulted for system specs, compliance and feasibility.
• All backend software must be related to job responsibilities and be utilized
for optimizing the CASC network and systems.
 
Carl Albert State College Dorms Policies, Maintenance, and Backup
CASC dorms have been provided with high bandwidth internet access. Access to
the internet is a privilege provided for by CASC, and must be used in accordance
with state and federal laws by all dorm room occupants. The failure to adhere to
state and federal laws, and to adhere to CASC policies and guidelines, may result
in the revocation of internet access privileges.
• Transmit or communicate any data that is unlawful, harmful, threatening,
abusive, harassing, defamatory, vulgar, obscene, invasive of another's
privacy, hateful, or racially, ethnically or otherwise objectionable
• Transmit, access or communicate any data that you do not have a right to
transmit under any law
• Transmit, access or communicate any data that infringes any patent,
trademark, trade secret, copyright or other proprietary rights of any party
• Transmit or communicate any data that contains software viruses or any
other computer code, files or programs designed to interrupt, destroy or
limit the functionality of any computer software or hardware or
telecommunications equipment
• Monitor traffic or make search requests in order to accumulate information
about individual users
• All personal computers utilizing the CASC dorm network are the sole
responsibility of the occupant. CASC is not responsible for any theft,
damage, or loss of data to the user’s personal computer. We do not provide
network backup or storage for dorm occupant’s computer systems
• CASC is not responsible for repairing student’s personal computers, and we
do not loan out college computer systems for personal use.
• In the event of a CASC network emergency, the office of
Telecommunications and Information Systems may be required to
appropriate dorm network hardware to ensure that vital CASC network
functions are maintained. Students will be notified of any situation which
may disrupt their access to the internet and email. Disruption will only be
temporary, until the necessary hardware can be replaced or returned
Social Networking
Facebook, Twitter, LinkedIn, and Pinterest are now common means of
communication outside and inside of the workplace. Social networking brings the
challenges of data security, computer conduct, and brand representation to each
and every public and private institution alike. The following policies are in place to
guide users at work using social networking applications.
• Social networking during CASC working hours is not encouraged unless
directly related to job duties. Social networking encompasses but is not
limited to the following social networking applications:
• Facebook
• Twitter
• YouTube
• Online Shopping
• Google, Yahoo, or AIM chat application
• Blogs
• Linkedin
Be advised that you are responsible for anything and everything you post.
Outside the workplace, your rights to privacy and free speech protect online
activity conducted on your personal social networks with your personal e-mail
address. However, what you publish on such personal online sites should never be
attributed to Carl Albert State College and should not appear to be endorsed by or
originated from CASC. If you choose to list your work association on a social
network, then you should regard all communication on that network as you would
in a professional network. Online posts are ultimately linked whether or not you
choose to mention CASC in your personal online networking activity, so please be
careful and consider how your social networking activity may impact the
reputation of Carl Albert State College. Social networking account created for CASC
departments must be cleared through Judi White.
 
Copyright Infringement and Peer to Peer File Sharing.
Copyright is legal protection of intellectual property, in whatever medium, that is provided for by the laws
of the United States to the owners of copyright. Types of works that are covered by copyright law include, but are
not limited, to literary, dramatic, musical, artistic, pictorial, graphic, film and multi-media works. Copyright protection
extends into software, digital works, and unpublished works and it covers all forms of a work, including its digital transmission and use. 
 
P2P File Sharing:  Peer to Peer file sharing is the process of sharing and transferring digital files from one computer to another.
In a P2P network, each ‘peer’ is an end-user’s computer connected to the other ‘peer’ via the Internet – without going through an intermediary server.
To participate, you must download and install a P2P software program. 
 
Consequences of violation:
 T  he Digital Millennium Copyright Act (DMCA), signed into law in 1998, recognizes that digital transmission of works
adds complexity to the Copyright Law. The DMCA provides non-profit educational institutions with some protections if individual
members of the community violate the law. However, for Carl Albert State College to maintain this protection we must immediately
block access to infringing material, whenever it is brought to our attention and whether or not the individual who is infringing has
 received notice, or is aware of their infringement.  Universities and individuals can be subject to the imposition of substantial damages for copyright infringement incidents relating to the use of College network services. In a civil action, the individual infringes may be liable for either actual damages
or statutory damages of up to $30,000 and can be increased to up to $150,000 if the court finds the infringement was willful.  Individual infringes may be subject to criminal prosecution. Criminal penalties include up to ten years imprisonment depending on the nature of the violation.
 
First-time Notifications:   If this is the first notification that the College has received on an individual, Student Affairs for students,
Human Resources for staff and faculty, and IT will verify that the infringing material has been removed from the computer. Once
this is done and the student has attended a mandatory intellectual property workshop, the network connection will be reinstated and the
computer can return to the network. A report about the violation of copyright will be sent by Student Affairs or Human Resources to the
appropriate administrative staff. We will also notify our internet service provider OneNet about the steps taken to remedy the situation.

Second Notification Process for Students:    If students are notified of copyright infringement a second time, their privileges to access
the network from their personal computers, either through a wired port or through wireless, will be denied for four weeks after action is
taken by Student Affairs to determine whether the violations occurred. Student Affairs will be notified when second infringements have
occurred and may take appropriate action within the College's disciplinary process. If the student tries to connect his/her computer to the
Internet from a College port that is assigned to someone else, through an open port in a classroom or through the wireless service, further
disciplinary action may take place. During this four week period, students will be allowed to access the Internet only from College computers.

Subsequent Notification Process for Students:    If students are notified of copyright infringement a third time, their privileges to access the
network from their personal computers will be denied for a semester after action is taken by Student Affairs to determine whether the violations
occurred. These subsequent infringements also will be reported to Student Affairs and may result in action taken within the College's disciplinary
process. If the student tries to connect to the Internet from a College port that is assigned to someone else, through an open port in a classroom, or
through the wireless service, further disciplinary action may take place. During the period when they cannot connect a personal computer to the
network, students will be allowed to access the Internet only from College computers.