The use of campus-owned computer equipment is granted to the undersigned only. By signing this form, you agree to accept all responsibilities and accountabilities for the type of account chosen below.
System User Responsibilities
- Read and agree to all University Policies ADG01, ADG02, AD19, AD20 and AD23 as referenced at http://guru.psu.edu/policies and all related and referenced policies, as well as any subsequent revisions, amendments, newly implemented policies, and Mont Alto campus policies as listed here http://www.ma.psu.edu/policies.
- Agree NOT to share account ID or password information.
- Back up important user files.
- Comply with all software license and intellectual property agreements governing installed software. (Please consult with Penn State Mont Alto ITS staff regarding questions or concerns.)
- Ensure physical security of the computer at all times. (This is especially significant for laptop computers.)
- Agree NOT to alter system hardware, software, or network configuration without the assistance and approval of Penn State Mont Alto ITS support staff.
System Administrator Responsibilities
- Abide by the system user responsibilities set forth in items 1-6 above.
- Reconfigure original hardware and software as necessary to support the mission of the University; and, in doing so, assume responsibility for compliance with all governing policies and procedures.
- As a system administrator, enhanced privileges are provided to the user to perform system changes. The user; however, should operate under a system user (limited user) account at all times unless required to elevate his/her privileges to perform a task.
- If the user maintains a server(s) he/she must comply with campus policy PSU-MA-IT-008 Server Security Policy.
- Use the appropriate IP addresses, as assigned by the ITS Department per device. Use of other addresses is prohibited while on the Campus network. Violators will be subject to removal of computers from the Campus data network.
- Assume sole responsibility and accountability for the system operations, any software installed, and its interaction with the Campus and University data networks. (Systems not maintained by ITS will reside in a network Demilitarized Zone (DMZ).
- Agree to the installation of software aimed at ensuring compliance with University policy by monitoring software copyright records, Personally Identifiable Information (PII) scanning, and system inventory.
- Maintain appropriate software licensing documentation associated with all installed system software. Documentation should be readily available for audit to ensure compliance with terms of issuance. (Improper software licensing will result in the system’s removal from the Campus data network, and, if necessary, notification of violation to the appropriate authorities.)
- Acknowledge that the system may be disconnected from the campus data network without warning should any network or security issues arise concerning assigned systems, including suspected virus activity or any network security issue, until the issue(s) are remediated.