Acceptable Uses and Privacy Policy


Computer and Network Policies

The Information Technology resources, including but not limited to, physical devices, data and informational systems owned and operated by SUNY New Paltz, SUNY New Paltz Foundation, or the Research Foundation used at SUNY New Paltz must be used in a manner that is consistent with the University educational purposes and environment. All users of these resources are expected to act in a spirit of mutual respect and cooperation and to adhere to the policies set forth in this and associated documents.

Use of the Information Technology resources requires that you have a valid user account. You are responsible for the safeguarding of your computer account. Your account and network connection are for your individual use. A computer account is to be used only by the person to whom it has been issued. You are responsible for all actions originating through your account or network connection. You must not misrepresent or conceal your identity in electronic messages and actions.

Acceptable Uses

The campus computing facilities and network resources are provided for instructional, administrative, and research purposes. All registered students, faculty and staff as well as officially recognized organizations and affiliated individuals are allowed use of these facilities appropriate to their role at the institution. Computing facilities and services are primarily provided for academic and support purposes and should never be used for commercial purposes.

The following activities are prohibited:

  • Using University computers and network services to harass or threaten other computer users, or to publicly display offensive or obscene messages
  • Impersonating another user via electronic means
  • Unauthorized access to any computer or network based resource including but not limited to the reading, copying, manipulation or deletion of another user’s files and data
  • Making unauthorized duplicates of software, music, or other copyrighted material; running file sharing software which allows others access to copyrighted materials. For more information please see our Digital Millennium Copyright Act policy.
  • Introducing or utilizing any form of malicious software (including viruses, worms, spyware, keyloggers)
  • Interfering with the operation of SUNY New Paltz Information Technology facilities by deliberately or inadvertently degrading or disrupting system performance, security, or administrative operations
  • Using SUNY New Paltz Information Technology resources for commercial or profit making enterprises, except for those activities officially sanctioned by the University.
  • Any mass electronic communications in support of political campaigning, advocacy, or endorsements (such as for national, state, local, or union offices or legislative changes)
  • Writing personal communications in a manner that could reasonably be interpreted as coming from an official of the state or SUNY New Paltz.

We reserve the right to remove or block any computer/device or to demand the removal of a network service from a computer/device that causes an inordinate strain on network or server resources, whether intentional or unintentional. This includes, but is not limited to spreading spam or viruses, causing or participating in denial of service attacks, and any other activities which consume an excessive amount of bandwidth.  A user may be held accountable for the activities of their computer/device, as well as any activities performed under their computer user id. It is the responsibility of the user to ensure that their computer is “patched” for security vulnerabilities and that it is free of viruses, to this end, resources and assistance may be available through the Service Desk.


SUNY New Paltz backs up data on our systems that is critical to the University operations and also provides network storage locations for users to store files to be backed up. Additional steps may be taken by users to back up their individual files as computers themselves are not backed up. Backing up individual files to USB or external hard drives is permissible as long as they do not violate the Confidential Information Policy. Any full disk backup will be required to be encrypted as well as password protected. The University will make a best effort in recovering user files from failed media however the University is not responsible for the loss of user’s files or data. Non-work related files (family photos, personal music collections, etc) are not governed by the best effort policy as they are extraneous to the mission of the University. For more information on accessing network locations for storage and/or proper backup procedure, please contact the Service Desk.


You must not share your password with others (including your supervisors or employees who you supervise). You are responsible for all activity associated with this account. All of our users are expected to respect the privacy of others. Any attempt to gain access to private information or passwords (via technological or social means) is prohibited. Any form of “identity theft” or the compromising of another individuals personal information is strictly prohibited.

All users should be aware that there is no guarantee of privacy when using our facilities. Unencrypted network traffic might be intercepted, e-mails may be spoofed, etc. In addition, the University reserves the right to monitor its network and servers in order to investigate performance or system problems. This includes, but is not limited to, locating viruses or other harmful programs, gathering performance or usage statistics, verifying that both University and student owned computers and devices are following the policies set forth by the University.

While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the University computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and other such activities that are necessary for the rendition of service. Monitoring or review of your data or network activity may be granted by the University President or their designee in the case of imminent risk to health and safety or as a result of a lawful order. Furthermore, the President or designee can also grant access to such information for purposes of investigating suspected inappropriate activity by an employee. 

Access to student records information is governed by the Family and Educational Rights and Privacy Act (FERPA).  

In addition, the University is required under the federal law known as the “Digital Millennium Copyright Act” to respond to complaints from copyright holders about unauthorized distribution or use of copyrighted materials. Copyright violations committed by users may result in disciplinary sanctions against the user as required by law and local policy. We do not monitor traffic, but in order to comply with this law we do log connections to the network. For more information see our DMCA policy.

Range of Disciplinary Sanctions

Persons in violation of this policy are subject to a full range of sanctions, including, but not limited to, the loss of computer or network access privileges, disciplinary action, and separation/expulsion from SUNY New Paltz. Some violations may constitute criminal offenses, as defined by local, state, and federal laws. In these cases, the University will cooperate with law enforcement authorities.



Article ID: 20993
Wed 12/7/16 9:42 AM
Mon 5/13/24 11:32 AM