Information technology policies and guidelines have been designed with existing laws and other policies as well as the following guiding principles in mind:
Procedure: If you suspect violations of these policies, contact the ITS Support Offices (firstname.lastname@example.org or (503) 883-2553), or any other member of the ITS Staff.
Violations of these policies will ordinarily result in an educational process and a warning. Serious or repeated violations may result in denial of access to College owned information technology, which normally means disabling user ID access to campus servers and will be reported to the appropriate dean or vice president.
Who and What This Policy Covers:
The information technology resources this policy covers include, but are not limited to, hardware (including telephones, computers, and media equipment) either owned or leased by the College, software, and consulting time (and expertise) of the staff of Information Technology Services, or other technology support staff of the College. Additionally, owners of personal equipment that is connected to the data or telecommunications infrastructure of the College are also subject to the policy below.
Any person with a valid Linfield ID card is authorized to use Linfield information technology. By using Linfield College information technology, all users accept the conditions of this policy.
Certain guests and departed members of the Linfield community may also use Linfield information technology:
(1)The Chief Technology Officer is authorized to grant "guest" access to Linfield email services. In general, this access is for a specific period of time and for a specified purpose related to the educational mission of the College.
(2) As a courtesy to departing students and employees, it is customary to grant continued access to the email server to the end of the next full semester following departure. Requests for an extension can be made to the Chief Technology Officer and should include both purpose and length of requested extension. Neither this extension or "guest" access to email services implies access to other services such as lab equipment, consulting services, etc.
(3) Retiring employees may keep their email access indefinitely.
An officer of the College (President, Dean or Vice President) can direct the Chief Technology Officer to immediately terminate server access for any person who has left Linfield.
In accordance with the guiding principles of this policy, uses of Linfield information technology that support the educational and scholarly mission of the college are acceptable and encouraged. Some examples of these primary activities are:
Other uses of information technology not in support of the educational and scholarly mission of the college are allowed so long as they do not interfere with primary activities. For example, interference might occur when access to equipment is needed for primary activities, or secondary activities are done in such a way to consume too many resources such as memory, storage, bandwidth or support staff time. Examples of secondary activities are:
Activities that violate individual rights are prohibited as are activities that interfere with community use. Violations of laws and other Linfield policies are, as a matter of course, also prohibited; those with relevance to information technology are included in the examples below. Examples of prohibited activities are:
The use of any technology resource of the College implies acceptance of ALL current operational policies.
Purpose of Policy:
The purpose of this policy is to ensure the proper access to and usage of Linfield College ITS systems by its students, faculty, staff, and alumni. This policy defines account creation, expiration and deletion procedures for ITS systems.
Linfield College provides system accounts to all faculty, staff, students, and alumni in support of academic, research, service, and administrative needs. These resources should be used responsibly in an efficient, ethical, and lawful manner.
Accounts are provided according to the following guidelines:
Linfield College accounts provide access to Linfield College system resources, such as WebAdvisor, Blackboard, email, and others. All Linfield College users are required to change their account password every six months. Reminder emails will be sent starting 14 days before the account password is scheduled to expire. When the account password expires, the account will be locked and cannot be used to log into any Linfield College resources except for the account management tool.
All active students at the College, including those on leave or in exchange programs, are entitled to a Linfield College account. Students are provided accounts upon enrollment at the College and may retain accounts while enrolled. If a student withdraws from the College, their account will be disabled after 180 days.
Students who graduate and become Alumni will have their accounts disabled after 180 days.
Faculty and Staff:
Current faculty and staff are entitled to a Linfield College system account.
Faculty or staff who have voluntarily terminated their employment will have their accounts deleted on or after the last day of employment. The employee may have the opportunity to set up an email response for 15 days, although they will no longer have access to the account.
Faculty or staff who have been terminated involuntarily from College employment will have their accounts deleted on the last day of employment.
Supervisors may request access to a terminated employee’s email account or may have the email forwarded to another Linfield email account for 30 days.
Retired faculty and staff may retain their email account indefinitely. Upon retirement, the employee must request retired status from ITS in order to retain their account.
Volunteers may be given accounts at the request of their supervisor or a Linfield sponsor. These accounts must have an expiration date and will be reviewed annually for activity.
Spouses, partners, other family members, or friends are not eligible for an account at Linfield College.
Purpose of Policy:
This Policy supports Linfield College’s Strategic Plan by describing an orderly approach to upgrading or replacing computer technology on an annual basis. The College has established a central budget and procedures for the regular replacement of computer equipment for employees, classrooms and computing labs. The department of Information Technology Services (ITS) is responsible for the annual replacement of computer equipment as described below.
One-fifth of the ITS computer equipment inventory should be replaced every year. The actual number of computers replaced annually will depend on the funds allocated by the College. Computer equipment purchased by ITS is expected to have a life-cycle of five years. IPads and other tablets are not included in the replacement cycle. Monitors and peripherals are replaced on an as-needed basis.
The CTO will be responsible for decisions regarding the replacement budget allocation. Input to ITS about purchase decisions will be provided by departmental and divisional administrators. Decisions will take into account existing inventory, available budget, and justification for upgrades.
Some administrative units may determine that additional equipment is needed outside of the established standard. This equipment should be purchased through ITS, but must be funded by the administrative unit and will not be included in the replacement cycle. Please contact the Technology Acquisitions Manager for pricing and specifications.
Hardware or software purchased without input from ITS staff or the CTO will not be supported by the department.
Computer specifications are established annually based on pricing and available hardware.
All computers remain a part of the computer pool of the College. They are not "owned" by the staff member or department.
Any full-time employee whose position requires a computer will be provided the standard configuration for that fiscal year (desktop or laptop with monitor, keyboard and mouse).
Consideration will be given to requirements for laptop computers to those faculty and staff members who travel or work from home. If a laptop is issued, a desktop will not be assigned in addition to the laptop.
Replacements will be made based on the age of the computer and the needs of the user. ITS staff will maintain an accurate database of equipment in order to determine which equipment is eligible for replacement each year.
The Digital Millennium Copyright Act amends federal copyright law to provide certain liability protections for online service providers, including Linfield College when their computer systems or networks carry materials that violate (infringe) copyright law. To qualify for liability protection, Linfield is required to have a policy under which the computer accounts of users will be terminated if they repeatedly infringe the copyrighted works of others.
Compliance with federal copyright law is expected of all Linfield students, staff and faculty. Copyright is legal protection for all creative works and is interpreted to cover most expressions of ideas. Text, graphic, art, photographs, music and software are all examples of works protected by copyright.
You may use all or part of a copyrighted work only if you have the copyright owner’s permission or if you qualify for a legal exception (the most common exception is called “fair use”). For more information on the “fair use” exemption see the Library web page “Use” of a work is defined for copyright purposes as copying, distributing, making derivative works, publicly displaying, or publicly performing the work.
Copying, distributing, downloading, and uploading information on the Internet usually infringes the copyright for that information. This include unauthorized copying of software, downloading or uploading of copyrighted music and video files. Even an innocent, unintentional infringement violates the law. Violations of copyright law that occur on or over Linfield’s networks or other computer resources may create liability for Linfield as well as the computer user. Accordingly, repeat infringers will have their computer account and other access privileges terminated.
The following procedure is to be used for making a copyright infringement claim and counter claim:
A copyright owner, or person acting for the owner, must provide Linfield's designated agent, the Chief Technology Officer (email@example.com), with written notice that information residing on Linfield's computer systems or networks is an infringement of the copyright. This notice must meet the requirements of 17 U.S.C. 512(c)(3). The notice requirement also applies to information in system cache and to information location tools (e.g., hypertext links) that infringe copyright.
[Note: if a person working for Linfield has independent knowledge of a copyright violation on a College computer system or network, Linfield may have a duty to remove the infringing material. This is true even if there is no "notice" from the copyright owner. Therefore that person should report the violation to the Chief Technology Officer as soon as possible.
If, after consultation with legal council, the Chief Technology Officer finds there may be substance to the claim of infringement, s/he will promptly remove or disable access to the allegedly infringing material and will promptly inform the computer account holder/user of this action.
The computer account holder/user may send Linfield's designated agent, the Chief Technology Officer (firstname.lastname@example.org), a written statement that the removal or disabling of access was based on a mistake or misidentification. This counter notice must meet the requirements of 17 U.S.C. 512(g)(3). The The Chief Technology Officer will promptly transmit a copy of the counter notice to the person who complained of infringement, and will inform that person that the removed material or disabled access will be restored in 10 business days.
The Chief Technology Officer will restore the material or access no less than 10 business days and no more than 14 business days from receipt of the counter notice, unless the person who complained of infringement first notifies the designated agent that the complainant has filed a court action to restrain the computer account holder/user from the infringing activity that was the subject of the original notice to Linfield.
The following procedure is to be used when notice is provided that official Linfield material on a web page or other Internet communication medium my infringe copyright:
Linfield has a legal duty to insure that official web sites, official email, and other official communications and expressions do not violate the intellectual property rights of third parties. The most common intellectual property rights found on the Internet involve copyright and trademark/service marks.
"Official" web sites and communications include those that are funded or otherwise sponsored by Linfield for a college purpose, or which are created by an employee or agent of the College who is acting within the authorized scope of employment or agency on behalf of the College (e.g., posting course materials on the web for educational use of enrolled students).
Linfield has "notice" of possible infringement when a third party advises a college official that there is an infringement, or when it appears to a college official that material is likely to be infringing based on the circumstances (e.g., copies of nationally syndicated cartoons appear on a College web site without any statement of copyright permission).
When Linfield has notice of a possible intellectual property infringement in official college-provided content, it will in good faith:
Attempt to establish who truly owns the copyright (or other intellectual property) through consultation with the author of the College content and the party claiming ownership.
Attempt to determine if any legal defense (e.g., "fair use") exists to allow the material to be used by the College.
Attempt to negotiate a permission or settlement if it appears that the content is infringing or if it appears that settlement is preferable to litigating an unclear claim. If permission or settlement is not feasible and it appears that the material is infringing, the College will remove the material.
Determine if any disciplinary action is appropriate against the person who posted infringing content. In the case of repeated infringement or bad faith infringement, disciplinary sanctions may include termination of computer privileges. Violations of the above terms of agreement may result in suspension of computing privileges, disciplinary review, termination of employment, and/or legal action. ATN will refer serious violations to the appropriate department for disciplinary action.
Linfield College has the twin objectives of minimizing liability while also providing full legal support for the activities of faculty and staff. In the context of copyright and other intellectual property, this means that an Officer of the College should be advised as soon as there is any notice of possible infringement. The Officer will work with the College content provider in to establish any defenses. However, if there is inadequate information to provide a defense, or it appears that no defense exists, the best route to minimize College damages may be prompt removal of the allegedly infringing material.
Removal of official College content, especially course materials, can be harmful to academic freedom, to teaching effectiveness, and to the College’s educational mission. Therefore, faculty and staff are encouraged to secure copyright permission, or a license, or a legal basis for use of someone else's intellectual property without permission, before using the material.
Adapted from "Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community" issued by EDUCOM and ADAPSO, 1992.
Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.
Here are some relevant facts:
Respect for the intellectual work and property of others has traditionally been essential to the mission of colleges and universities. As members of the academic community, we value the free exchange of ideas. Just as we do not tolerate plagiarism, we do not condone the unauthorized copying of software, including programs, applications, data bases and code.
The restrictions and limitations regarding each classification are different.
Commercial software represents the majority of software purchased from software publishers, commercial computer stores, etc. When you buy software, you are actually acquiring a license to use it, not own it. You acquire the license from the company that owns the copyright. The conditions and restrictions of the license agreement vary from program to program and should be read carefully. In general, commercial software licenses stipulate that
Shareware software is covered by copyright, as well. When you acquire software under a shareware arrangement, you are actually acquiring a license to use it, not own it. You acquire the license from the individual or company that owns the copyright. The conditions and restrictions of the license agreement vary from program to program and should be read carefully. The copyright holders for Shareware allow purchasers to make and distribute copies of the software, but demand that if, after testing the software, you adopt it for use, you must pay for it. In general, shareware software licenses stipulate that
Freeware also is covered by copyright and subject to the conditions defined by the holder of the copyright. The conditions for Freeware are in direct opposition to normal copyright restrictions. In general, Freeware software licenses stipulate that
Public Domain software comes into being when the original copyright holder explicitly relinquishes all rights to the software. Since under current copyright law, all intellectual works (including software) are protected as soon as they are committed to a medium, for something to be Public Domain it must be clearly marked as such. Before March 1, 1989, it was assumed that intellectual works were NOT covered by copyright unless the copyright symbol and declaration appeared on the work. With the U.S. adherence to the Berne Convention this presumption has been reversed. Now all works assume copyright protection unless the Public Domain notification is stated. This means that for Public Domain software
A Final Note
Restrictions on the use of software are far from uniform. You should check carefully each piece of software and the accompanying documentation yourself.
Other Linfield College copyright policy: Linfield Libraries Copyright Policies
Purpose of Policy
This policy outlines the use of cell phones, including smartphones, for authorized employee users. Linfield College recognizes the need for a number of its employees to utilize cell phones and smart phones to facilitate effective communication. The college therefore provides a program to support the use of cell phones and smartphones in connection with conducting the operations of the college that defrays the cost of purchasing and operating these devices. It also recognizes that these devices are used for personal as well as business use.
Linfield College’s goal is to provide the most consistent, convenient and cost effective cellular/smart phone and data plan services possible to its employees. The objectives of this policy are to:
This policy applies to all faculty and staff of the college.
College cellular/smart phones may be an appropriate tool to conduct college business when it is demonstrated that an employee’s communication needs cannot be met with other available alternatives such as a standard telephone or computing (laptop/desktop) equipment.
Cell phones/smartphones are authorized for a limited number of Linfield College employees based on the responsibilities associated with their positions. The following criteria are provided in order to determine an employee’s need for a cellular phone, smart phone, and/or data plan:
To facilitate the above objectives, the college may at its discretion enter into contracts with telephone and data service providers. During the period when one or more of these contracts is in force, the college will only purchase cellular telephones and data service agreements for employee use on the basis of these contracts, unless a specific exception is granted by the appropriate Vice President in consultation with the Chief Technology Officer.
Information Technology Services (ITS) manages all cellular devices and contracts owned by the college. The college will not directly pay a provider for private cell phone charge, nor reimburse a department for a cell phone contract that is not arranged by ITS. The college will not take over a private cell phone contract from an employee.
Employees who use a smart phone for college business must set up a password to protect the information stored on the device from unauthorized use. Email on the device should be limited to 4 weeks of historical data. For all Linfield owned devices, the Help Desk will be able to remotely wipe the device in the event that the device is lost or stolen.
All cellular contracts will utilize a local Oregon telephone number.
The college may either provide a college owned device to an employee or elect to contribute an allowance towards the cost of the employee’s cell phone contract. The Vice President will determine the appropriate level of cell phone support that is needed to meet the business needs of the department, and must approve the expense.
College Owned Devices:
Any employee who receives a college owned cell phone or an allowance is required to register their cell phone number with the college’s emergency notification system.
Employees must take appropriate safety precautions when using their cellular telephone. If your job requires that you keep your cell phone turned on while driving, you must use a hands-free device. Under no circumstances should employees place calls or read or write emails or text messages while operating a motor vehicle for college business and/or during college time.
The allowance or cell phone provided to employees is subject to annual review by the appropriate Vice President. Changes in employment status, reassignments and moves of employees between the divisions of the college, and job functions may affect continued eligibility for this program.
Allowances expire June 1st each year and must be renewed in order to ensure continuous reimbursement disbursement.
Residential internet data plans are not covered under this policy and will not be reimbursed by the College.