Acceptable Use Policy
Who and What This Policy Covers:
The information technology resources this policy covers include, but are not limited to, hardware (including telephones, computers, and media equipment) either owned or leased by the College, software, and consulting time (and expertise) of the staff of Information Technology Services, or other technology support staff of the College. Additionally, owners of personal equipment that is connected to the data or telecommunications infrastructure of the College are also subject to the policy below.
Any person with a valid Linfield ID card is authorized to use Linfield information technology. By using Linfield College information technology, all users accept the conditions of this policy.
Certain guests and departed members of the Linfield community may also use Linfield information technology:
(1)The Chief Technology Officer is authorized to grant "guest" access to Linfield email services. In general, this access is for a specific period of time and for a specified purpose related to the educational mission of the College.
(2) As a courtesy to departing students and employees, it is customary to grant continued access to the email server to the end of the next full semester following departure. Requests for an extension can be made to the Chief Technology Officer and should include both purpose and length of requested extension. Neither this extension or "guest" access to email services implies access to other services such as lab equipment, consulting services, etc.
(3) Retiring employees may keep their email access indefinitely.
An officer of the College (President, Dean or Vice President) can direct the Chief Technology Officer to immediately terminate server access for any person who has left Linfield.
In accordance with the guiding principles of this policy, uses of Linfield information technology that support the educational and scholarly mission of the college are acceptable and encouraged. Some examples of these primary activities are:
- Coursework and course management, seminars and training sessions
- Thesis preparation
- Independent research and self-teaching projects
- Communication with others in support of teaching, learning and scholarly pursuits
Other uses of information technology not in support of the educational and scholarly mission of the college are allowed so long as they do not interfere with primary activities. For example, interference might occur when access to equipment is needed for primary activities, or secondary activities are done in such a way to consume too many resources such as memory, storage, bandwidth or support staff time. Examples of secondary activities are:
- Email and other messages of a personal nature
- Personal Web page creation
- Entertainment activities such as game playing and Web browsing
Activities that violate individual rights are prohibited as are activities that interfere with community use. Violations of laws and other Linfield policies are, as a matter of course, also prohibited; those with relevance to information technology are included in the examples below. Examples of prohibited activities are:
- Unauthorized reading, copying, or modification of someone else's files or electronic mail.
- Unauthorized use of someone else's password or distribution of your password for any purpose.
- Intentional damage to hardware, software, security devices or codes or the intentional creation or distribution of viruses, worms or other forms of electronic mayhem.
- Unauthorized Internet access to computers at other locations.
- Sending or posting threatening, obscene, harassing, abusive or libelous messages
- Commercial activities, such as development of software for sale, work undertaken to support any company, or other contracted work.
- Violation of copyright laws.
- Impersonating other individuals or sending or posting of anonymous information.
- Knowing use of computing resources to the extent that it interferes with others use.
The use of any technology resource of the College implies acceptance of ALL current operational policies.