Live Chat Support
Policies & Guidelines
ITSS Service Guidelines
The ITSS Service Guidelines establish university guidelines for the access to, and handling of, university-owned computer equipment.
ITSS Support Guidelines
IT Support Services provides two main types of hardware and software support to the CSU Chico community: service desk support and field service support. Contacts to the Service Desk are free for all departments, retirees, and guests, however phone and walk-in support are limited in scope and duration.
Responsible Use Policy
ICSUAM Policy 8105.0 - Responsible Use Policy; CSU Responsible Use Policy
Computing Use Policy
Executive Memorandum 97-18; Policy on Use of Computing and Communications Technology.
Information Security Policies and Standards
System-wide Information Security Policies and Standards are published in Section 8000 of the Integrated CSU Administrative Manual (ICSUAM). System-wide policies and standards as well as CSU Chico supplemental polices and standards are published on the Information Security (ISEC) Policies and Standards page.
Student E-mail Policy
Executive Memorandum 05-05; Student E-Mail: Interim Policy for Official Communication With Students via Electronic Mail
Intellectual Property Policy Documents and Forms
View policy documents, practical guides, forms and other documents relating to intellectual property.
View policy documents, practical guides, forms and other documents relating to copyrighted materials.
California State University CENIC/CalREN Acceptable Use Policy
Use of the university's computing and communications facilities and resources is governed by all applicable CSU system and university policies and procedures, as well as by all applicable federal, state, and local laws and statutes. Users are subject to the California State University CENIC/CalREN Acceptable Use Policy. CENIC/CalREN provides access to the network infrastructure that interconnects CSU campuses and other sites to information and communication resources worldwide.
Executive Memorandum 01-04; Information Resources has developed procedures to ensure that password security is maintained at an acceptable level, and the procedures shall serve as official university policy.
Computing Use and Netiquette
View information on computing use and netiquette. Some information is excerpted and paraphrased from Policy on Use of Communications Technology, Executive Memorandum 97-18. This information is not intended to supersede official policy.