Information Technology 政策
访问 to computer equipment systems and networks owned or operated by FSU, is a privilege that is granted by the University subject to certain rules, regulations and restrictions. It is the responsibility of each user of FSU computing resources to read and adhere to the following computing guidelines.
- Computer 安全 Policy (PDF)
- Confidentiality Agreement (PDF)
- Data Classification Policy (PDF)
- Data Use Standards (PDF)
- Electronic 访问ibility Policy (PDF)
- FSU International Travel Cyber安全 Procedures (PDF)
- Gramm-Leach-Bliley Act (GLBA) Safeguards Rule
- Identity Verification for 在线 Courses (PDF)
- Intellectual Property Policy (PDF)
- 网络 Site, 电子邮件, and Data Storage Privacy Policy (PDF)
- 网络 Site Development & Operations Policy (PDF)
- USM Board of Regents Policy on Copyrights
- USM Board of Regents Policy on Patents
In addition, users of FSU computer resources are subject to all relevant state and federal laws, including the two Maryland laws listed below.
- Annotated Code of Maryland, Criminal Law
Subtitle 3: Crimes Involving Telecommunications and Electronics Section 7-302 (PDF) - Annotated Code of Maryland, Criminal Law
Subtitle 3: Crimes Involving Telecommunications and Electronics Section 8-606 Making False Entries in Public Records and Related Crimes (PDF)
Often non-FSU individuals, such as prospective students, community members and other web site visitors, perform common electronic tasks (such as sending an email message or completing an online form) or make use of web-enabled services offered on official FSU web sites. It is important to note that all of these activities involve FSU computing resources and are subject to all computing policies.------------------------------------------