Information Technology Policies
Access to computer equipment systems and networks owned or operated by FSU, is a privilege that is granted by the University subject to certain rules, regulations and restrictions. It is the responsibility of each user of FSU computing resources to read and adhere to the following computing guidelines.
- Computer Security Policy (PDF)
- Confidentiality Agreement (PDF)
- Data Classification Policy (PDF)
- Data Use Standards (PDF)
- Electronic Accessibility Policy (PDF)
- FSU International Travel CyberSecurity Procedures (PDF)
- Gramm-Leach-Bliley Act (GLBA) Safeguards Rule
- Identity Verification for Online Courses (PDF)
- Intellectual Property Policy (PDF)
- Privacy Policy (PDF)
- Privacy Statement (PDF)
- Web Site, E-mail, and Data Storage Privacy Policy (PDF)
- Web Site Development & Operations Policy (PDF)
- USM Board of Regents Policy on Copyrights
- USM Board of Regents Policy on Patents
In addition, users of FSU computer resources are subject to all relevant state and federal laws, including the two Maryland laws listed below.
- Annotated Code of Maryland, Criminal Law
Subtitle 3: Crimes Involving Telecommunications and Electronics Section 7-302 (PDF) - Annotated Code of Maryland, Criminal Law
Subtitle 3: Crimes Involving Telecommunications and Electronics Section 8-606 Making False Entries in Public Records and Related Crimes (PDF)
Often non-FSU individuals, such as prospective students, community members and other web site visitors, perform common electronic tasks (such as sending an email message or completing an online form) or make use of web-enabled services offered on official FSU web sites. It is important to note that all of these activities involve FSU computing resources and are subject to all computing policies.