Policies & Guidelines

Technology Usage Policy

The University of Lynchburg’s computing and electronic communication facilities and services are owned by the University and intended for teaching, educational, research, and administrative purposes. Access to these facilities is a privilege granted to the University’s faculty, staff, students, alums, and guests. Fundamental to the use of these facilities is the respect for the rights and privacy of all users.

By using the university’s computing and electronic communications facilities and services, university faculty, staff, students, alums, and guests agree to follow this policy and cooperate with the university in implementing it.

Certain responsibilities and possible liabilities accompany this privilege, and understanding them is essential for all computer users. This policy strives to balance the user’s ability to benefit from these computing resources with the University’s responsibility to maintain the computing and electronic communications facilities and ensure that its institutional policies comply.

The Technology Usage Policy aims to promote the efficient, ethical, and lawful use of the University of Lynchburg computer and network resources.

The Technology Usage Policy includes information about the following:

  • Guidelines for responsible use
  • Privacy, enforcement, and sanctions
  • Copyright information
  • File sharing

Responsible Use

To maintain a secure and fair computing environment, all users must:

- Protect login credentials and personal data
- Avoid unauthorized access to university systems
- Use IT resources legally and ethically
- Refrain from excessive bandwidth usage or system disruption

Privacy & Security

The university takes privacy and security seriously, but users should be aware that IT activity may be monitored to ensure compliance with policies.
If unauthorized access is suspected, IT administrators may review activity logs, including login history and file access.

To stay secure:
- Keep passwords confidential
- Log out of shared computers when finished
- Report any security concerns to ITR

Copyright & File Sharing

All users must comply with copyright laws when accessing, sharing, or downloading digital materials. Unauthorized file sharing, including the use of peer-to-peer (P2P) networks, is prohibited. Violations may result in restricted access to university networks and further disciplinary action. For more details, visit theTechnology Usage Policy
view raw