Policy and Procedure

The Acceptable Use Agreement and full IT Policy for the The Connecticut State University System are summarized below including a link to the full CSU Policy page, which contains the policy information about Information Security, Electronic Communications, and the CSU IT strategic plan.

The following is a brief summary of the CSCU Acceptable Use Policy including FERPA. For more information, please refer to the full policy.

I will...

  • Comply with FERPA*, especially when saving and sharing data.
  • Protect my SCSU account from unauthorized use:
    -Safeguard access credentials (username and password)
    -Log off computer when not in use
    -Password protect mobile devices
  • Respect the confidentiality and privacy of others using SCSU systems.
  • Limit personal use of IT resources so that it does not hinder:
    -Institutional operations
    -Job performance
    -System resources
  • Report any misuse or suspicious activity on computers, network, or other equipment.

I will not...

  • Use IT resources to violate any SCSU policy, state, or federal law.
  • Appropriate someone else’s access credentials (username and password).
  • Attempt to circumvent system security.


* The Family Educational Rights and Privacy Act of 1974 (FERPA) is a federal law that protects the privacy of student educational records

The Connecticut State University System consists of Central, Eastern, Southern and Western Connecticut State Universities and a System Office that serves each university and the CSU Board of Trustees.

In January 2006, the CSU Board of Trustees passed a resolution regarding the Connecticut State University System Information Technology Policy. Board Resolution 06-10 calls for the establishment of an information security program that will ensure the security and integrity of CSU System’s tangible and intangible information resources.

Additionally, the resolution calls for the development of clear and consistent standards, procedures and guidelines to assist the entire CSU System in the implementation and execution of the information security program.


The CSU IT policy can be found here: