The University of Lynchburg computing and electronic communication facilities and services are owned by the University and are primarily intended for teaching, educational, research and administrative purposes. Access to these facilities is a privilege granted to the University’s faculty, staff, students and guests. Fundamental to the use of these facilities is the respect for the rights and privacy of all users. By using the University’s computing and electronic communications facilities and services, University faculty, staff, students and guests agree that they will comply with this policy, and will cooperate with the University in implementing this policy.
Certain responsibilities and possible liabilities accompany this privilege, and understanding them is important for all computer users. This policy strives to balance the user’s ability to benefit from these computing resources and the University’s responsibility to maintain the computing and electronic communications facilities and to assure that its institutional policies are in compliance.
The purpose of the Technology Usage Policy is to promote the e\0xFB03cient, ethical, and lawful use of the University of Lynchburg computer and network resources.
This policy applies to all users of the University of Lynchburg computing and network resources, whether initiated from a computer and/or network device located on or off campus.
III. Policy Statement
Individuals using computer resources belonging to the University of Lynchburg must act in a responsible manner, in compliance with law and University policies, and with respect for the rights of others using a shared resource. The right of free expression and academic inquiry is tempered by the rights of others to privacy, freedom from intimidation or harassment, protection of intellectual property, ownership of data, and security of information.
IV. Guidelines for Responsible Use
A. In General
The specific usage guidelines that follow are not intended to be comprehensive, but rather to establish and clarify the intent of this policy. Situations not enumerated here will inevitably arise, and they should be interpreted according to the spirit of this policy.
Some constraints are necessary for the e\0xFB03cient and appropriate use of shared computer resources. Since network capacity is limited, academic and administrative needs must take precedence for use of the network. All users must act responsibly and use the facilities in an ethical, professional, and legal manner. This means that users agree to abide by the following standards of responsible use to ensure the integrity of all systems is respected and not intentionally abused:
- Users must recognize that certain data are confidential and must limit access to such data for use in direct performance of their duties.
- No one – faculty, staff, or student – shall obtain or provide unauthorized access to one’s own or other users’ accounts and files. Users shall keep their own access ID(s) confidential.
- The use of all accounts for research, instruction, or administrative purposes must be consistent with the College’s mission.
- All users must respect the rights of others to remain free from harassment.
B. Network Registration
Network registration is required for all devices connecting to the University network in residential facilities, wireless access areas, and public areas with network access. Such registration is necessary to ensure network security. Authentication by the network registration software will be required on a regular basis.
C. Personal Use and Use by Third Parties
Incidental personal use is an accepted and appropriate benefit of being associated with the University of Lynchburg. Incidental personal use must adhere to all applicable University policies and must not result in any measurable cost to the University. Under no circumstances may incidental personal use involve violations of the law, interfere with the fulfillment of an employee’s work responsibilities, or adversely impact or conflict with activities supporting the mission of the University.
Use of University of Lynchburg’s computing and network resources for commercial purposes not under the auspices of the University is not permitted.
The use of University of Lynchburg computing and network resources by individuals and organizations that are not part of the University community is not permitted unless approved by the President, Vice President and Dean for Academic Affairs, or Vice President for Business and Finance. Such approval will generally be granted only when the use is in connection with:
- a University-sponsored event or activity;
- a public service activity for which comparable equipment is not otherwise reasonably available to the user;
- use by a guest of the University for an otherwise appropriate use; and/or
- a contractual agreement between the College and a governmental agency, private business, educational institution, or other entity.
D. Plagiarism and Protection of Intellectual Rights
The University of Lynchburg Honor Code regarding plagiarism and other violations of academic integrity applies to coursework completed with use of University of Lynchburg computing and network resources just as it does to other coursework. In addition, electronically using, distributing, or posting copyrighted material in violation of license or other legal restrictions or contractual agreements is prohibited.
Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access and trade secret and copyright violations may be grounds for sanctions.
University of Lynchburg purchases and licenses the use of various computer software for academic and business purposes and does not own the copyright to this software or its related documentation. Users must adhere to the licensing agreements of each application and avoid illegal duplication of software and its related documentation.
V. Privacy, Enforcement, and Sanctions
A. Privacy of Users
While not legally required to do so, the University respects the privacy of the users of its computing and electronic communications facilities. While the University’s intent is to respect privacy, users should not expect complete privacy of electronic files. Users must be aware that the security of electronic files on shared systems is not inviolable. Except when legally required to do otherwise, private information obtained unintentionally will be treated confidentially.
All University-owned property and the work, correspondence, data and other material therein, whether stored electronically, on paper, or in any other form, are subject to review for legitimate business reasons. Portions of the IT infrastructure include automatic and manual monitoring and recording systems that are used for reasons that include, but are not limited to, security, performance, backup, and troubleshooting. The University reserves the right at any time to monitor and access any data, including the contents of any University computer or University communications, for any legitimate business reason.
Users must adhere to all of the University’s policies and procedures when using University equipment. This includes, but is not limited to: the University of Lynchburg’s Code(s) of Conduct as well as University discrimination and harassment policies. This also includes University of Lynchburg’s Confidentiality and The Family Educational Rights and Privacy Act (FERPA) policies. Users may not use University computers or other equipment in a manner that violates another’s rights under FERPA, The Health Insurance Portability and Accountability Act (HIPAA) or any other applicable law pertaining to privacy or confidentiality.
B. Investigation of Violations and Revocation of Access
Monitoring users’ accounts or conducting spot checks of users’ activities is prohibited except as set forth below. Computer programs, email, voice mail, phone logs, network tra\0xFB03c logs, web site cache, and electronic files can be accessed by ITR personnel, and other University personnel to whom such authority has been delegated to:
- Investigate suspected violations of this policy, or other University policy and rules;
- Probe possible disruption to the network or other shared services;
- Monitor the volume of system activity and track work flow;
- Restore system integrity in the event of a crash;
- Reestablish or protect the security of the system; and/or
- Cooperate with law enforcement officials.
Except in emergency cases, such access must be authorized by the President of the University.
The officials listed below have the authority, in an emergency situation and based on the results of an authorized investigation, to immediately revoke or limit any user’s access to University computing and electronic communication facilities and services.
- Vice President and Dean, Academic Affairs (faculty)
- Vice President for Business and Finance (staff)
- Vice President for Student Development (students)
- Chief Information Officer
In emergency cases, such as an occurrence of threatened system integrity and when the appropriate administrator is not available, access to systems as cited above may be authorized by any of the administrators listed above. If none of those o\0xFB03cials is available, designated ITR personnel have the authority to lock or search accounts or log sessions. Any emergency entry will be recorded in writing and forwarded to the appropriate University authority and its appropriateness reviewed after the fact. Where a user’s electronic files or other electronic material listed above is accessed by the University as part of an investigation into a suspected violation of this policy or other University policy or rules, the University will usually notify the individual of this access within five business days. This notice requirement shall not apply where the notice would, in the judgment of the University, interfere with an ongoing law enforcement investigation.
C. Other Sanctions for Misuse and Reporting Misuse
If abuse of University computing facilities occurs from campus or external network access, persons responsible for such abuse will be held accountable and may be subject to disciplinary action up to and including dismissal from employment or the University. Moreover, individuals or groups who take actions that may have legal implications are subject to further sanctions by relevant law enforcement authorities.
Abuses of computer resources are direct violations of the University’s standards of conduct as outlined in faculty, staff, and student handbooks. Alleged violations of this policy will be processed according to the procedures outlined in these handbooks. Also, unauthorized downloading and file-sharing of copyrighted materials, such as music and movies, by students is addressed through a three-tier response system detailed at /copyrightcomplaints.xml.
Users are expected to cooperate with authorized investigations of technical problems or use of technology facilities that may be unauthorized, illegal, or in violation of this policy. Except as noted in Section IV.B above, an explanation of any revocation of access will be provided to the user, and an appeal may be made in accordance with existing University procedures.
Any user who is the victim of harassment or other abuse involving the University’s computing or electronic communication facilities or any user who becomes aware of a possible violation of this policy should report the harassment or abuse to their supervisor or to the appropriate administrator listed above. Anonymous reporting will be accepted through the Campus Conduct Hotline at 866.943.5787.