Computing and Network Policy
Access to modern information technology is essential to Lawrence Technological University’s mission of providing the students, faculty and staff of the University with educational services of the highest quality. The pursuit and achievement of the Lawrence Technological University mission of education, research, and public service require that the privilege of the use of computing systems and software, internal and external data networks, as well as access to the World Wide Web, be made available to all members of the University community. The preservation of that privilege for the full community requires that each faculty member, staff member, student, and other authorized user comply with institutional and external standards for appropriate use.
To assist and ensure such compliance, Lawrence Technological University established the following policy, which supplements all applicable University policies, including sexual harassment, patent and copyright, and student and employee disciplinary policies, as well as applicable federal and state laws.
General Use and Ownership
- Authorized use of Lawrence Technological University-owned or operated computing and network resources shall be consistent with the mission and values of the University and consistent with this policy.
- Use of the University network or computing resources is restricted to those having proper authorization to use that particular resource. It is a violation of the law and university policy to assist in, encourage, or conceal from authorities any unauthorized use, or attempt an unauthorized use, of any of the University's computers or network resources.
- This policy applies to all Lawrence Technological University computing and network resources, University telephones, University-distributed laptop and tablet computers, and external computing and network resources accessed via Lawrence Technological University’s computing and network resources.
- Individuals with personally-owned computers, but who rely upon the university network to connect those computers, either through the University on-campus or remote network connection are expected to abide by the policies set forth in this document.
- The University reserves the right to limit access to its networks and any posted materials when applicable campus or University policies or codes, contractual obligations, or state or federal laws are violated.
- Personally-owned computers which house materials that violate the University’s policies and/or are used in a manner inconsistent with University policies are subject to network disconnection without notice.
- Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws. The University further reserves the right to inspect non-University owned computers that are connected to the University’s resources upon reasonable cause to determine if a user is violating University policy or state or federal laws.
- This policy may be supplemented with additional guidelines by campus units that operate their own computers or networks, provided such guidelines are consistent with this policy. In addition, users are responsible for abiding by the acceptable use policies of Lawrence Tech authorized network and software providers.
- Lawrence Technological University will comply with requests from law enforcement agencies for access to information contained anywhere within the University’s computer system. The University is not responsible for notification to the account holder of such a request.
Privacy: No user should access, view, copy, alter or destroy another’s personal electronic files without permission (unless authorized or required to do so by law or regulation). If another user has failed to close out their session, a new user must close that session and enter their own username and password to use that computer.
Copyright: Written permission from the copyright holder is required to duplicate any copyrighted material, except where consistent with Fair Use. This includes but is not limited to duplication of music, audiotapes, videotapes, photographs, illustrations, computer software, data and all other information for educational use or any other purpose. Software and databases that reside on the University’s computing network are owned by the University or third parties. These works are protected by copyright and other laws, together with licenses and other contractual agreements. Users are required to respect and abide by the terms and conditions of software use and redistribution licenses. Such restrictions may include prohibitions against copying programs or data for use on the University’s network or for distribution outside the University, against the resale of data or programs, or against the use of software for non-educational purposes, or for financial gain, and against public disclosure of information about programs (e.g., source code) or data without the owner’s authorization.
Harassment, Libel and Slander: No user may use the University’s computers, telephones or networks for the purpose of libel, slander or harass of any other person.
Cheating: Students are not permitted to use software or other learning technologies such as Instant Messenger or blogging for the purpose of academic dishonesty in the classroom. Sanctions will be imposed as stated in the Student Code of Conduct.
Modifying Software or Software Installation: A user may not modify the software configuration on any computer provided for general access.
Access to Computing Resources:
- Accounts: Accounts created by a system administrator for an individual are for the personal use of that individual only.
- Sharing of Access: Computer accounts, passwords, telephone authorization codes and other types of authorization are assigned to individual users and not shared with others. The assigned user is responsible for any use of the account. Sharing of a computer account constitutes an inappropriate use and may lead to termination of that account and any accounts associated with the person making improper use of that account.
- Permitting Unauthorized Access: Users may not run or otherwise configure software or hardware to intentionally allow access by unauthorized users. Failure to configure hardware or software in a way that reasonably prevents access by unauthorized users is a violation of acceptable use.
- Termination of Access: Upon students separation from the University, appropriate security restrictions will be placed on the account to limit access to the University’s network and computing resources.
Circumventing Security: Users are prohibited from attempting to circumvent or subvert any system’s security measures. Users are prohibited from using any computer program or device to intercept or decode passwords or similar access control information.
Breaching Security: Activities which degrade the performance of a computer system or network, use of a system or network for which the user is not authorized, or deprive authorized users of resources or access to computers or networks is prohibited. Breach of security includes, but is not limited to, the following:
- Creating or propagating viruses
- Password grabbing
- Disk scavenging
Abuse of Computer Resources: Abuse of Lawrence Technological University computer resources is prohibited. This abuse includes, but is not limited to, the following:
- Distributing computer viruses: Users must not knowingly distribute or launch viruses, worms, Trojan horses, or other rogue programs.)
- Rogue Access Points: Users are not allowed to install access points without written authorization from Lawrence Tech IT Services.
- Port Scanning: Users are prohibited from systematically scanning University computer ports by use of scanner software or any other device.
- Flooding: Generating excessive network traffic, including spamming and denial-of-service, is prohibited.
- Game Playing: Limited recreational game playing, which is not part of authorized and assigned research or instructional activity, is acceptable, but computing and network services are not to be used for extensive or competitive recreational game playing.
- Chain Letters: The propagation of chain letters is considered an unacceptable practice and is prohibited.
- Unauthorized Servers: The establishment of a background process that services incoming requests from anonymous users for purposes of gaming, chatting or browsing the Web is prohibited.
- Unauthorized Monitoring: A user may not use computing resources for unauthorized monitoring of electronic communications.
- Private Commercial Purposes: The computing resources of Lawrence Technological University shall not be used for personal or private commercial purposes or for financial gain.
The issuance of a password or other means of access is to assure appropriate confidentiality of Lawrence Technological University files and information and does not guarantee privacy for personal or improper use of university equipment or facilities.
Lawrence Technological University attempts to provide reasonable security against intrusion and damage to files stored on the central facilities. Lawrence Technological University also provides some facilities for archiving and retrieving files specified by users; and for recovering files after accidental loss of data. However, the University is not responsible for unauthorized access by other users or for loss due to power failure, fire, floods, etc. Lawrence Technological University makes no warranties with respect to Internet services, and it specifically assumes no responsibilities for the content of any advice or information received by a user through the use of Lawrence Technological University computer network.
Users should be aware that Lawrence Technological University computer systems and networks may be subject to unauthorized access or tampering. In addition, computer records, including e-mail, are considered "records" which may be accessible to the public under the provisions federal or state law.
Account Creation and Account Termination
All students, faculty, and staff will have computer access and email accounts created and maintained for their individual use while they are enrolled at or employed by the University.
Upon separation from the University, appropriate security restrictions will be placed on the account to limit access to the University’s network and computing resources.
Email accounts are provided to students, faculty, and staff in support of the University’s mission. Email is the University’s official means of communication. Failure to read email messages sent from Lawrence Tech to its users does not absolve the user of responsibility for knowing the content of these messages. It is the user’s responsibility to monitor the content of their Lawrence Tech email account.
Email messages are neither personal nor private. While IT Services will not routinely monitor individual email and will take reasonable precautions to protect the privacy of email, program managers and technical staff may access a student’s or employee’s email:
- For a legitimate business purpose (e.g., the need to access information when an employee is absent).
- To diagnose and resolve technical problems involving the system.
- To investigate possible misuse of email when a reasonable suspicion of abuse exists or in conjunction with an approved investigation.
- Under the provisions of the USA Patriot Act in order to provide requested information to authorized personnel.
University email and voice communications systems and their content are the property of Lawrence Tech and are subject to its review and control. Email and voice messaging systems may be subject to discovery proceedings in legal actions.
On appropriate administrative approval, IT Services may monitor any official communications, including email and voice communications, if there is a reasonable suspicion of abuse or violation of University policies.
Email messages sent from a Lawrence Tech email account must have the user’s name associated with the message. Anonymous email messages may not be sent from University email addresses and are prohibited.
New student computer access and email accounts are created after registration and will be maintained as long as the student is enrolled at the University. The University presently allows current students to keep access to the email system after graduation.
All passwords used to access Lawrence Tech computer and network resources must be kept private. They must not be shared with others.
Passwords must be changed regularly according to a schedule determined by IT Services.
The University provides reasonable security against intrusion and damage to files stored on central storage facilities, and provides for the archiving of files based upon the operational needs of the University. The University has the right to limit system access if reasonable efforts are not made to protect the LTU information systems and network.
All individual users have access to a limited amount of protected storage on University servers. Data files stored on protected central storage facilities are regularly archived and may be restored on request of the user to the most recent version available.
However, the University is not responsible for the loss of users’ files or data when stored on desktop PCs, laptops, or any other non-centrally located and/or unprotected storage media. Users should take their own steps to back up and protect important information.
All computer systems accessing the Lawrence Tech network must have up-to-date antivirus software installed and running. IT Services will install University approved antivirus software on all University owned systems currently in production and on new systems prior to delivery to the end user.
Encrypted files, documents, and messages may be accessed by the University if suspected of breaching acceptable use guidelines. Under the provisions of the USA Patriot Act, the University is under no obligation to notify any user who may be the subject of an investigation.
The Laptop Program
The University provides laptops to registered undergraduate students, full-time faculty, and teaching adjunct faculty in support of the University’s mission. Graduate and doctoral students are charged $95 per credit hour per semester for a laptop. Availability is not guaranteed to graduate and doctoral students. Laptops are not generally available to University staff.
Before users can be assigned a Lawrence Tech laptop, they must agree to the terms and conditions contained in the Lawrence Tech Laptop Lease Agreement.
The term of the lease agreement is up to one year.
Complete information about the Laptop Program is contained in the Laptop Lease
Agreement. A copy of the Student Laptop Lease Agreement is available at ltu.edu/ehelp.
Printed copies of the Laptop Lease Agreement for full-time and adjunct faculty are available at the Help Desk.
Laptops are assigned to individuals only. There are no departmental laptop assignments unless special approval is acquired.
Users picking up a laptop must have fulfilled the requirements for laptop distribution and have a valid Lawrence Tech photo ID. Students and faculty must pick up their laptops in person. A laptop will not be distributed to anyone other than the person to whom it is assigned. Parents, relatives, or friends may not pick up a laptop for a Lawrence Tech student or faculty member.
Users agree to use the Lawrence Tech laptop within its normal capacity, without abuse, and in a manner contemplated by the University.
All laptops come with pre-installed software designed to meet the instructional goals of each college. Users may install any software on their assigned laptops that was legally obtained and licensed. University IT Services is not responsible for support and troubleshooting of personally obtained software installed on University laptops.
The Laptop Program is under continuous review. Laptop Program policies and procedures may change at any time.
Residence Hall Access
As members of the Lawrence Tech community, residents of University Housing must abide by this Computing and Network Policy.
Residence hall access to the campus network is granted to individuals. Each individual is responsible for assuring that his/her personal residence hall room connection is not misused. Each individual is also responsible for assuring that the residence hall room connection is not misused by guests in the room.
Incidents of misuse of University computing resources should be reported to the executive director of Lawrence Tech’s Information Technology Service Delivery. Appropriate action will be taken upon completion of any investigation.
Violation of this policy may be subject to immediate suspension of services by IT Services, which may include temporary or permanent reduction of IT privileges, and to the existing Student Code of Conduct or employee disciplinary procedures of Lawrence Technological University. Sanctions may include the loss of network access and computing privileges. Criminal acts involving Lawrence Technological University’s computing resources may also subject users to subpoena and prosecution by local, state and/or federal authorities.