Who and What This Policy Covers:
The information technology resources this policy covers include, but are not limited to, hardware (including telephones, computers, and media equipment) either owned or leased by the College, software, and consulting time (and expertise) of the staff of Information Technology Services, or other technology support staff of the College. Additionally, owners of personal equipment that is connected to the data or telecommunications infrastructure of the College are also subject to the policy below.
Any person with a valid Linfield ID card is authorized to use Linfield information technology. By using Linfield College information technology, all users accept the conditions of this policy.
Certain guests and departed members of the Linfield community may also use Linfield information technology:
(1)The Chief Technology Officer is authorized to grant "guest" access to Linfield email services. In general, this access is for a specific period of time and for a specified purpose related to the educational mission of the College.
(2) As a courtesy to departing students and employees, it is customary to grant continued access to the email server to the end of the next full semester following departure. Requests for an extension can be made to the Chief Technology Officer and should include both purpose and length of requested extension. Neither this extension or "guest" access to email services implies access to other services such as lab equipment, consulting services, etc.
(3) Retiring employees may keep their email access indefinitely.
An officer of the College (President, Dean or Vice President) can direct the Chief Technology Officer to immediately terminate server access for any person who has left Linfield.
In accordance with the guiding principles of this policy, uses of Linfield information technology that support the educational and scholarly mission of the college are acceptable and encouraged. Some examples of these primary activities are:
Other uses of information technology not in support of the educational and scholarly mission of the college are allowed so long as they do not interfere with primary activities. For example, interference might occur when access to equipment is needed for primary activities, or secondary activities are done in such a way to consume too many resources such as memory, storage, bandwidth or support staff time. Examples of secondary activities are:
Activities that violate individual rights are prohibited as are activities that interfere with community use. Violations of laws and other Linfield policies are, as a matter of course, also prohibited; those with relevance to information technology are included in the examples below. Examples of prohibited activities are:
The use of any technology resource of the College implies acceptance of ALL current operational policies.