• Housing Technology staff have the authority to take appropriate action when this policy has been violated, or as otherwise required to maintain the security, integrity, and functionality of the University’s IT environment. This may include, but is not limited to, traffic analysis and disabling access to individual or multiple computers.
  • Exceptions to this policy may be granted to accommodate disabilities or for academic purposes. If such an exception is required, please contact our help desk at (970) 491-4734.
  • Wireless Routers/Access Points:
    • Personal wireless access points/routers are not allowed in the Residence Halls and/or Apartments.
  • Wireless Printers:
    • The easiest way to use your wireless printer is actually to use the USB cable and turn off the wireless capability. If you must connect the printer using wireless, please click the link below and fill out the form below. This form will help us determine if your printer can work in the HDS enterprise-level wireless network and if so, how to connect it.


  • Anyone installing an unsecured wireless device that allows unrestricted access to CSU’s network will have their network connection disabled and will receive a letter of reprimand.
  • Other network devices:
    • Network devices that could interfere with our enterprise network may have their network access revoked. These devices can include but are not limited to: managed switches, firewalls, and servers.
  • Please see our Frequently Asked Questions for a larger list of common questions we get regarding technology issues.
  • Acceptable Use Policy (AUP) for Computing and Networking Resources at Colorado State University

    Computing and data communications at Colorado State University are valuable and limited resources that serve a large number and variety of users. All users have the responsibility to make use of these resources in an efficient, ethical, and legal manner. The University’s computer and network services provide access to resources on and off campus and shall be used in a manner consistent with the instructional, research, and administrative objectives of the University community in general and with the purpose for which such use was intended. Such open access is a privilege, and imposes upon users certain responsibilities and obligations. Access to the University’s computers and network services is granted subject to University policies, and local, state, and federal laws. Acceptable use is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, protection of sensitive information, ownership of data, copyright laws, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation and harassment. All activities inconsistent with these objectives are considered to be inappropriate and may jeopardize continued use of computing facilities and networks. In consideration of being allowed to use the University’s central computer and network services (“Resources”), I understand and agree to the following:

    1. I shall not use the Resources for any illegal activity or for any activity prohibited by this policy (see subsequent pages for examples of inappropriate conduct that is prohibited), the “Students’ Rights and Responsibilities” policy or the policies set forth in the Academic Faculty and Administrative Professional Manual.
    2. I agree not to use the Resources to infringe upon or otherwise impair, interfere with or violate any copyright or other intellectual property rights of another. This pertains to all copyrighted material, including, but not limited to music, video and software. I understand that I may be potentially liable for misuse of the Resources, including acts that are contrary to University policy. Except for such claims as may be covered by the Governmental Immunity Act (Colorado Revised Statutes 24-10-101 et seq.), I agree to be responsible for all claims arising from my misuse of the Resources and shall indemnify and hold harmless the University from any costs, expenses or liabilities that might be asserted or imposed upon it or any of its officers, agents or affiliates as a result of such misuse. Resources and guidance on copyright issues, including fair use of digitized works, are available on the TILT website, http://tilt.colostate.edu/guides/tilt_copyright/.
    3. I shall avoid any action that interferes with the efficient operation of the Resources or impedes the flow of information necessary for academic or administrative operations of the University.
    4. I shall protect my computer resources such as eID, logins and systems from unauthorized use. I acknowledge that I am responsible for reasonably securing my computer, including implementing such protections as logins to prohibit unauthorized use, applying in a timely fashion operating system and software patches that protect my computer from hackers, and implementing virus scanning software.
    5. I will access only information that is my own, which is publicly available, or to which my access has been authorized. I will only access networks, network resources, and information for their intended use.

  • Examples of Inappropriate Conduct

    Conduct which violates this policy includes, but is not limited to:

    • Accessing another person’s computer, computer account, files, or data without permission.
    • Using the campus network to gain unauthorized access to any computer system.
    • Using any means to decode or otherwise obtain restricted passwords or access control information.
    • Attempting to circumvent or subvert system or network security measures. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system.
    • Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files or making unauthorized modifications to university data.
    • Performing any act, intentionally or otherwise, that will interfere with the normal operation of computers, peripherals, or networks.
    • Making or using illegal copies of copyrighted software, storing such copies on university systems, or transmitting them over university networks.
    • Harassing or intimidating others via electronic mail, news groups or Web pages.
    • Initiating or propagating electronic chain letters.
    • Initiating or facilitating in any way mass unsolicited and unofficial electronic mailing (e.g., “spamming”, “flooding”, or “bombing.”).
    • Forging the identity of a user or machine in an electronic communication.
    • Saturating network or computer resources to the exclusion of another’s use, for example, overloading the network with traffic such as emails or legitimate (file backup or archive) or malicious (denial of service attack) activities.
    • Using the University’s systems or networks for personal gain; for example, by selling access to your eID or to university systems or networks, or by performing work for profit with university resources in a manner not authorized by the University.
    • Engaging in any other activity that does not comply with the general principles presented above.

  • Enforcement

    The University considers violations of acceptable use principles or guidelines to be serious offenses. The University will take such action it deems necessary to copy and examine any files or information resident on university systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Violations may be referred to the appropriate University entity for discipline. Academic Computing and Networking Services will use its best efforts to contact the offending party via email, telephone, or in person to explain the problem and discuss its resolution before taking any action deemed necessary to protect the integrity of the Resources. In the case of major infractions, for example those that impair others’ ability to use networking and computing resources, Academic Computing and Networking Services may immediately restrict systems or network access as it deems necessary to mitigate such activities. Only thereafter will Academic Computing and Networking Services make a reasonable effort to contact the involved parties when these incidents occur.
File Sharing Copyrighted material is More Than Just Free Music, Games and Movies… It’s a CRIME!
You are breaking United States law to reproduce and distribute any copyrighted material unless you have authorization from the copyright owner. This is specifically a violation of the Digital Millennium Copyright Act (DMCA), which is a copyright law passed in 1998 by the United States Congress. Colorado State University prohibits the use of its networks and systems for the purpose of committing violations of United States law. The software, music, and motion picture industries CAN and DO track copyrighted files on the Internet. A first time violation of the DMCA law commonly results in a notification to remove the offending computing device from the university’s network, but can be punishable by up to 3 years in prison and $250,000 in fines. CSU is required by law to respond to legal notices to remove offending systems from the CSU network (while keeping the individual user information private), or to respond to a legal court issued subpoena to provide the identify of the individual associated with the offense. Students who share copyrighted files will have their network privileges revoked and may be subject to both lawsuit and university disciplinary action.
  • 3 Strikes Policy Regarding General Misuse of the University Network

    All users of the university network must abide by the Acceptable Use Policy. This can be viewed at http://www.acns.colostate.edu/?page=aup

    • For the first documented incident of misuse of the network, the student’s access to the Housing network is denied and a letter is mailed to the student letting them know what the reported misuse is. They are asked to re-read the Acceptable Use Policy and they must take their system to the CSU Computer Diagnostics Center at the Morgan Library (491-7276) where the system is scanned and cleared of any file sharing programs, viruses, spyware, etc. that are found. THERE WILL BE A $45 CHARGE FOR THIS SERVICE.  Only after the CSU Computer Diagnostics Center notifies Housing Technology that the system is clean will it be permitted Housing network access.  This notification can take 1 business day after the system is returned, so access may not be restored until the next business day.
    • On a second documented misuse incident, access to the Housing network is again denied and not only must the user have their system cleared by the CSU Computer Diagnostics Center, as mentioned above, but the student must also contact the Office of Conflict Resolution and Student Conduct Services (CRSCS) for further discussion of the incident and possible disciplinary action.  A CHARGE OF $100 WILL BE ASSESSED ON THE SECOND VIOLATION by the CSU Computer Diagnostics Center. After Housing Technology is notified by the CSU Computer Diagnostics Center and Conflict Resolution and Student Conduct Services that the student has complied with the requirements, Housing network access will then be restored.
    • The third time documented misuse is received, Housing network access is permanently denied and the student is again directed to the Office of Conflict Resolution and Student Conduct Services office for any disciplinary action that may be required.

    Grounds for immediate and permanent Housing network termination include, but are not limited to, hosting a child pornography site, identity theft, extortion or attempting to break into any financial institution or government site. These types of violations are immediately turned over to the appropriate law enforcement agency, in addition to the University disciplinary office.

  • Where to get network access while your Housing network access is blocked

    If you have immediate academic needs that require network access, there are a number of alternative resources that you can utilize.

    • Contact the Housing Technology Help Desk at 491-4734 (8-5 M-F) and ask to discuss your case. Temporary access to the Housing network can be arranged on a case by case basis.
    • Utilize computer resources available to CSU students at the Morgan Library or within your own Academic College, such as computer labs or computer kiosks.
    • Utilize a Lory Student Center computer kiosk.

  • What is a DMCA violation and why should I care?

    The Digital Millennium Copyright Act (DMCA), is a copyright law passed in 1998 by the United States Congress. A common misconception is that a violation occurs due to illegally downloading games, music or movies. A DMCA violation is almost always caused by your computer files being accessible by anyone from the Internet. In that sense, you are acting as a distributor for copyrighted material. The recording industry will scan the university’s network to see if a computer is accessible from the Internet, and if so will scan the computer’s folders that are accessible to see if they contain any of their copyrighted material. If copyrighted material is accessible from that computer, a notice is sent to the university indicating the date, time, file name, file sharing program used, and IP address that was accessed. It is important to note, ANYONE on the Internet can access your computer’s folder(s) if they are configured as an open file share. File sharing programs make changes to your computer settings to permit this open access. This is why file sharing is a dangerous practice and can lead to identity theft. Often file sharing programs will also contain malware that may infect your system or give greater access to a specific person for illegal purposes. Are you concerned that anyone on the Internet may be connecting to your computer and looking at your files or personal information? There are two types of DMCA notices; a “take down” notice, or a “preservation of records” notice. A “take down” notice is a legal request to the university to remove the offending system from the network and not permit access until the offending system will no longer act as a distributer of copyrighted material. University IT staff use authentication logs to identify the owner of the computer that caused the offense and block the system’s network access. No information about the computer user is provided to the agency that notified the university of the offense in the case of a “take down” notice. There is no release of personal information by Housing Technology Services. A notice for “preservation of records” is a legal notice to preserve log files and records that will provide the identity of the user associated with the offense. This notice is sent when an agency intends to sue the individual responsible for distributing copyrighted material and is a legal step taken in advance of a court issued subpoena to the university. The CSU Legal office is the only one who will provide information about a user in response to a subpoena. User information may be provided by Housing Technology Services to the CSU Legal office, but is NEVER directly released to any external agency. In recent years, some “take down” notices have also included a “settlement request” and threatens further legal action. In such cases, residents are directed to Student Legal Services in the Lory Student Center for legal counsel and to potentially have them act as an intermediary to maintain anonymity of the user. We STRONGLY recommend talking with Student Legal Services in such cases.
  • Instructions to Disable File-Sharing

    While use of peer-to-peer (P2P) file-sharing programs is NOT illegal and there are legitimate uses, it is strongly recommended that you do not use any file-sharing programs.  These programs are often hard to completely remove from your system as they may contain malware that will reload the program or simply lie to you that it was removed. We recommend that you take your system to the CSU Computer Diagnostics Center in the Morgan Library to help you remove the file-sharing software. If you wish to try to remove the file-sharing program yourself, make sure you run a full virus scan of your system, as well as using a program that looks for “rootkits” such as malwarebytes.  You should ensure that your system is set to prevent sharing of files from your computer to others by disabling your P2P software’s uploading capability. Peer-to-peer programs turn your computer into a server, or distributor of material, and allow others to download content from it.

    Downloading music doesn’t have to be illegal: Many online music subscription services like iTunesRhapsody (www.listen.com)Apple Music, andSpotify.com offer pay-per-song rates or flat membership rates for unlimited downloading that do not infringe on copyright laws. If you are interested in downloading music without breaking any laws, consider membership in one of these services.