Policies

Louisburg College provides computing resources to support the education, research, and work of its students, faculty, and staff. The priorities for use of these resources are listed below:
  • All education, research, and administrative purposes of Louisburg College
  • Other uses indirectly related to Louisburg College purposes with educational or research benefit, including personal communications
  • Recreation, including gaming, streaming media, Netflix, and other legal streaming activity
 
Prohibited activity includes (but is not limited to):
  • Selling Louisburg College resources
  • Commercial activities not sanctioned by the President's office
  • Intentionally denying or interfering with service
  • Unauthorized use or access
  • Reading or modifying files without proper authorization
  • Using the technology to impersonate another
  • Downloading from illegal or copyrighted sources
  • Violation of local, state, or federal law or Louisburg College policies
 
 
Network Use Guidelines
To ensure continued compliance with computer usage guidelines, Louisburg College designates certain personnel to investigate alleged computer abuses. These personnel reserve the right to examine files in such cases.
 
A. Use of Louisburg College Computing Facilities (Labs)
All users (students, faculty, staff and authorized others):
  • Should report any malfunction to the person on duty or to the organization responsible for the facility immediately (do not attempt to move repair, reconfigure, modify or attach devices to the systems)
  • Must finish any food or drink before using computing facilities
  • Are to recognize that academic use of the workstations have priority over all other uses
  • Recreational use in computing facilities is permitted during periods of light usage; however, you may not play games or engage in other recreational activities when others are waiting to use the workstations for academic purposes
  • Must realize that individual computing center facilities and other facilities may post additional operational rules and restrictions that are considered part of this policy
  • Must not load or modify any software onto any hard drive without specific prior permission of the system administrator or custodian of the files.
 
B. Authorization and Security
For each user, authorization to utilize computer resources includes but is not limited to electronic mail, administrative records, library services, and departmental-specific programs.
Each user:
  • Must have a valid, authorized account and may only use those computer resources which are specifically authorized
  • May only use his/her account in accordance with its authorized purpose
  • Is responsible for safeguarding his/her computing accounts and should change passwords often to ensure privacy and security
 
C. Honor Code
All users:
  • Must not use the computer systems to violate any rules in the Employee Handbook or the Louisburg College Student Handbook or any local, state, or federal laws
  • Should disclose to the appropriate authorities any misuse of the computing resources or potential loopholes in computer systems security and cooperate with the systems administrator in the investigations of abuses
 
 
Common Forms of Computer Abuse
Misuse or abuse of Louisburg College's computers, computer systems, computer networks, programs and data is prohibited. Violations in the areas listed below will be considered academic misconduct, misdemeanor, or felony as appropriate to the situation and will be dealt with accordingly (see Penalties section).
 
A. Privacy
Violations of Louisburg College or another user's privacy include but are not limited to:
  • Attempting to access another user's computer files without permission
  • Supplying or attempting to supply false and misleading information or identification in order to access another user's account
  • The unauthorized "borrowing" or examination of another user's output
  • Deliberate, unauthorized attempts to access or use the College's computers, computer facilities, networks, programs, data, or any system files other than those designated for public access
  • Connecting a wireless access point to the network without authorization by the Information Technology department
  • The unauthorized manipulation of the College's computer systems, programs, or data
  • The unauthorized capturing of computer network data directly from the network backbone or networking media
 
B. Theft
Violations in this area include but are not limited to:
  • Abusing specific computer resources such as the Internet
  • Attempting unauthorized access to computers outside the network using the College's computers or communication facilities
  • Removing any computer equipment (hardware, software, data, pictures, articles, or books) without proper authorization
  • Copying, attempting to copy, or distributing copyrighted or licensed software, data, pictures, articles, or books without proper authorization
  • Abusing printing resources such as printing material that is not academically related or pertaining to business
 
C. Vandalism
Alteration or attempted alteration of programs, digital data or other files, as well as resource or equipment destruction or disruption is considered vandalism. Violations include, but are not limited to:
  • The installation of software or the intentional spreading of viruses which causes harm to computer systems or to another user's account
  • Tampering with or obstructing the College's computer systems
  • Inspecting, modifying or distributing data or software without proper authorization or attempting to do so
  • Damaging computer hardware and software
Any intentional attempt to harm or destroy data or equipment will result in immediate cancellation of user privileges, require restitution, and may result in sanctions imposed by the Office of Student Conduct.
 
D. Copyright Issues
The College owns licenses to a number of proprietary programs. Users who redistribute software from the computing systems break agreements with the College's software suppliers as well as applicable federal copyright patent and trade secret laws. Therefore, the redistribution of any software from computing systems is strictly prohibited except in the case of software which is clearly marked as being in the public domain. Louisburg College will not provide legal defense for individuals who may be accused of making unauthorized copies. If the College is sued or fined because of unauthorized copying or use by students, faculty or staff it may seek payment from the individuals as well as subject them to disciplinary action that may include expulsion or dismissal. Violations include but are not limited to copying, transmitting, or disclosing data, software or documentation without proper authorization.
 
E. Harassment
Harassment of others may be the sending, viewing or printing of unwanted messages or files. Violations include, but are not limited to:
  • Interfering with the legitimate work of another user
  • The sending of abusive or obscene messages via computers
  • The use of computer resources to engage in abuse of computer personnel or other users
 
F. Games, Chain Letters and Miscellaneous
Unethical, inappropriate, or illegal use is prohibited. Uses commonly considered unethical include but are not limited to:
  • Sending chain letters or unauthorized mass mailings. Chain letters and unauthorized mass mailings may be prohibited by state and federal law
  • Using the network for non-professional or illegal activities, which may include obscenity, pornography, threats, harassment, copyright infringement, defamation, theft, or unauthorized access
 
 
Penalties
Misuse or abuse of computing services is not simply unethical; it can be a violation of user responsibility as well as federal law. Therefore, Louisburg College will take appropriate action in response to user misuses, unethical use, or abuse of computing services. Actions may include but are not limited to the following:
  • Access to all facilities and systems may be suspended temporarily or removed permanently
  • Legal action may be taken to recover the damages
  • Referral to law enforcement authorities
 
Alleged abuse or misuse of computing services by students, faculty or staff will be referred to the Director of Information Technology. If evidence of a violation is found, the matter will be dealt with by the Director of Information Technology or referred to the Vice President of Academic Affairs and/or the Vice President of Student Life and be treated as misconduct, misdemeanor, or felony as appropriate. After referral to the appropriate office violations, depending upon their gravity will result in sanctions ranging from the following:
  • Suspension of the user's account until the user has a conference with the Director of Information Technology
  • Suspension of the user's account for a period of one week
  • Suspension of the user's account for the remainder of the semester
  • Suspension from the college
  • Or expulsion from the college
An accused user has the right to a hearing as outlined in the Student Conduct Process concerning the policy violation and the disciplinary action recommended.
 
 
Distribution of this Policy
Louisburg College will ensure that all users are aware of the policy by publishing and distributing it in appropriate media to reach all faculty, staff and students.