Information Technology Services
ITS Standard Operating Procedures for Electronic Access
In accordance with the CSUSB Acceptable Use Policy for Electronic Communications, ITS follows strict standards for protecting the privacy and confidentiality of the campus community electronic communications, including accessing end user’s digital content located on the end user’s workstation, information located on university servers, such as information located in file share servers, email, google docs, one drive, etc., or information transmitted through the campus network.
Access to Digital Information on workstations
On instances when the Technology Support Center needs to access an end user workstation as a follow up to a request for service, the TSC will initiate a session that will require the approval of the end user. The end user will be able to follow the actions conducted by the TSC personnel.
Only a campus Domain Administrator, with the approval of the end user, may access an end user workstation administrator account.
The Information Security and Emerging Technologies may access an end user workstation only with the approval of the university Provost or his/her designee or approval by the CSU Office of General Counsel.
Network Communication
ITS only captures network flow information which is permitted under the Pen Register, Trap and Trace Statue of the Wiretap Act (federal law). Examples include: source and destination IP addresses, port addresses, e-mail routing headers, and excludes any payload or content.
ITS do not intercept or capture content of electronic communications, unless an exception applies, such as falls under the "Trespasser Exception" to the wiretap act, court order or CSU OGC request.
Additional information can be found on the CSUSB ITS Information Security Office Wiretap Law Highlights.