Policies
Louisburg College provides computing resources to support the education, research,
and work of its students, faculty, and staff. The priorities for use of these resources
are listed below:
- All education, research, and administrative purposes of Louisburg College
- Other uses indirectly related to Louisburg College purposes with educational or research benefit, including personal communications
- Recreation, including gaming, streaming media, Netflix, and other legal streaming activity
Prohibited activity includes (but is not limited to):
- Selling Louisburg College resources
- Commercial activities not sanctioned by the President's office
- Intentionally denying or interfering with service
- Unauthorized use or access
- Reading or modifying files without proper authorization
- Using the technology to impersonate another
- Downloading from illegal or copyrighted sources
- Violation of local, state, or federal law or Louisburg College policies
Network Use Guidelines
To ensure continued compliance with computer usage guidelines, Louisburg College designates certain personnel to investigate alleged computer abuses. These personnel reserve the right to examine files in such cases.
To ensure continued compliance with computer usage guidelines, Louisburg College designates certain personnel to investigate alleged computer abuses. These personnel reserve the right to examine files in such cases.
A. Use of Louisburg College Computing Facilities (Labs)All users (students, faculty, staff and authorized others):
- Should report any malfunction to the person on duty or to the organization responsible for the facility immediately (do not attempt to move repair, reconfigure, modify or attach devices to the systems)
- Must finish any food or drink before using computing facilities
- Are to recognize that academic use of the workstations have priority over all other uses
- Recreational use in computing facilities is permitted during periods of light usage; however, you may not play games or engage in other recreational activities when others are waiting to use the workstations for academic purposes
- Must realize that individual computing center facilities and other facilities may post additional operational rules and restrictions that are considered part of this policy
- Must not load or modify any software onto any hard drive without specific prior permission of the system administrator or custodian of the files.
B. Authorization and SecurityFor each user, authorization to utilize computer resources includes but is not limited to electronic mail, administrative records, library services, and departmental-specific programs.
Each user:
- Must have a valid, authorized account and may only use those computer resources which are specifically authorized
- May only use his/her account in accordance with its authorized purpose
- Is responsible for safeguarding his/her computing accounts and should change passwords often to ensure privacy and security
C. Honor CodeAll users:
- Must not use the computer systems to violate any rules in the Employee Handbook or the Louisburg College Student Handbook or any local, state, or federal laws
- Should disclose to the appropriate authorities any misuse of the computing resources or potential loopholes in computer systems security and cooperate with the systems administrator in the investigations of abuses
Common Forms of Computer Abuse
Misuse or abuse of Louisburg College's computers, computer systems, computer networks,
programs and data is prohibited. Violations in the areas listed below will be considered
academic misconduct, misdemeanor, or felony as appropriate to the situation and will
be dealt with accordingly (see Penalties section).
A. PrivacyViolations of Louisburg College or another user's privacy include but are not limited to:
- Attempting to access another user's computer files without permission
- Supplying or attempting to supply false and misleading information or identification in order to access another user's account
- The unauthorized "borrowing" or examination of another user's output
- Deliberate, unauthorized attempts to access or use the College's computers, computer facilities, networks, programs, data, or any system files other than those designated for public access
- Connecting a wireless access point to the network without authorization by the Information Technology department
- The unauthorized manipulation of the College's computer systems, programs, or data
- The unauthorized capturing of computer network data directly from the network backbone or networking media
B. TheftViolations in this area include but are not limited to:
- Abusing specific computer resources such as the Internet
- Attempting unauthorized access to computers outside the network using the College's computers or communication facilities
- Removing any computer equipment (hardware, software, data, pictures, articles, or books) without proper authorization
- Copying, attempting to copy, or distributing copyrighted or licensed software, data, pictures, articles, or books without proper authorization
- Abusing printing resources such as printing material that is not academically related or pertaining to business
C. VandalismAlteration or attempted alteration of programs, digital data or other files, as well as resource or equipment destruction or disruption is considered vandalism. Violations include, but are not limited to:
- The installation of software or the intentional spreading of viruses which causes harm to computer systems or to another user's account
- Tampering with or obstructing the College's computer systems
- Inspecting, modifying or distributing data or software without proper authorization or attempting to do so
- Damaging computer hardware and software
Any intentional attempt to harm or destroy data or equipment will result in immediate cancellation of user privileges, require restitution, and may result in sanctions imposed by the Office of Student Conduct.D. Copyright IssuesThe College owns licenses to a number of proprietary programs. Users who redistribute software from the computing systems break agreements with the College's software suppliers as well as applicable federal copyright patent and trade secret laws. Therefore, the redistribution of any software from computing systems is strictly prohibited except in the case of software which is clearly marked as being in the public domain. Louisburg College will not provide legal defense for individuals who may be accused of making unauthorized copies. If the College is sued or fined because of unauthorized copying or use by students, faculty or staff it may seek payment from the individuals as well as subject them to disciplinary action that may include expulsion or dismissal. Violations include but are not limited to copying, transmitting, or disclosing data, software or documentation without proper authorization.E. HarassmentHarassment of others may be the sending, viewing or printing of unwanted messages or files. Violations include, but are not limited to:
- Interfering with the legitimate work of another user
- The sending of abusive or obscene messages via computers
- The use of computer resources to engage in abuse of computer personnel or other users
F. Games, Chain Letters and MiscellaneousUnethical, inappropriate, or illegal use is prohibited. Uses commonly considered unethical include but are not limited to:
- Sending chain letters or unauthorized mass mailings. Chain letters and unauthorized mass mailings may be prohibited by state and federal law
- Using the network for non-professional or illegal activities, which may include obscenity, pornography, threats, harassment, copyright infringement, defamation, theft, or unauthorized access
Penalties
Misuse or abuse of computing services is not simply unethical; it can be a violation
of user responsibility as well as federal law. Therefore, Louisburg College will take
appropriate action in response to user misuses, unethical use, or abuse of computing
services. Actions may include but are not limited to the following:
- Access to all facilities and systems may be suspended temporarily or removed permanently
- Legal action may be taken to recover the damages
- Referral to law enforcement authorities
Alleged abuse or misuse of computing services by students, faculty or staff will be referred to
the Director of Information Technology. If evidence of a violation is found, the matter
will be dealt with by the Director of Information Technology or referred to the Vice
President of Academic Affairs and/or the Vice President of Student Life and be treated
as misconduct, misdemeanor, or felony as appropriate. After referral to the appropriate
office violations, depending upon their gravity will result in sanctions ranging from
the following:
- Suspension of the user's account until the user has a conference with the Director of Information Technology
- Suspension of the user's account for a period of one week
- Suspension of the user's account for the remainder of the semester
- Suspension from the college
- Or expulsion from the college
An accused user has the right to a hearing as outlined in the Student Conduct Process
concerning the policy violation and the disciplinary action recommended.
Distribution of this Policy
Louisburg College will ensure that all users are aware of the policy by publishing
and distributing it in appropriate media to reach all faculty, staff and students.