Menu
Security & Policy HomePolicies & InformationACIS PoliciesACIS Policy #10

Policies on the Use of Computer Systems and Facilities (ACIS Policy #10)

Revision effective date: May 3, 2009

The following policies apply to the use of Lehigh University's computing and networking facilities and systems which include, but are not limited to, the computers, terminals, networks, printers and other peripherals, modems, data files, and software owned, maintained or managed by the University (the "Computer Systems and Facilities"). These policies also apply to the use of the Computer Systems and Facilities whether such use is initiated on the University’s campus or off campus. Any network traffic exiting the University is subject to the acceptable use policies of the networks through which it flows, as well as to the policies listed here.

Access to the University's Computer Systems and Facilities is a privilege granted solely to the University’s registered faculty, staff, students, alumni, and guest users. Accordingly, the University reserves the right to limit, restrict or extend computing and networking privileges and access to its Computer Systems and Facilities. Unauthorized use of any Lehigh University computer system, including use of an account not specifically assigned to you by the University is subject to monitoring (Electronic Communications and Privacy Act, 18 USC 2701-2711).

The Computer Systems and Facilities are to be used to support University-related activities, such as Lehigh University courses, research projects, departmental activities, professional and scholarly activities, and related personal communications. Nothing in this policy is meant to limit legitimate faculty-supervised academic activities. All users of the Computer Systems and Facilities must act responsibly and maintain the integrity of these resources. All non-departmental servers (World-Wide Web, ftp, etc.) which are connected directly to any University network resource must be approved by Library and Technology Services prior to accessing the external network.

External computer and network ID's, for use on University Computer Systems and Facilities, must be authorized by the University.

Prohibited Uses

Examples of prohibited uses include, but are not limited to, the following:

  1. Disclosing the password of a computer or network ID entrusted to you or using a computer or network ID that was not assigned to you by the University to access Computer Systems and Facilities, unless the University has authorized multiple access for the ID.
  2. Obtaining or attempting to obtain unauthorized access to another's computer or network ID.
  3. Disguising or attempting to disguise the identity of the account or machine you are using.
  4. Impersonating any individual or entity or otherwise misrepresenting your affiliation with the University through the use of a Lehigh computer or network ID.
  5. Using the Computer Systems and Facilities to gain or attempt to gain unauthorized access to remote computers.
  6. Deliberately performing an act that will interfere with the normal operation of the Computer Systems and Facilities. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed backbone network, creating excessive network traffic or otherwise blocking communication lines, or interfering with the operational readiness of a computer.
  7. Running or installing a program (or providing another person with a program to run or install) on any Computer System or Facility which could damage a file or computer system and/or reproduce itself. Such programs include but are not limited to, computer viruses, spyware, and worms.
  8. Deliberately circumventing or attempting to circumvent data protection schemes or exploiting or failing to promptly report any security loopholes.
  9. Violating the terms of applicable software licensing agreements and copyright laws. Such violations include but are not limited to making unauthorized copies of software.
  10. Deliberately performing any act which is wasteful to the Computer Systems and Facilities or which unfairly monopolizes the Computer Systems and Facilities to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, creating unnecessary multiple jobs or processes, or obtaining unnecessary output or printed material. Printing excessive copies of any documents, including resumes, theses, and dissertations, on Library and Technology Services printers is also prohibited.
  11. Placing the following types of information or software on any Computer System or Facility or on any system connected directly to the Computer Systems and Facilities:

    • That which infringes upon the rights of another person;
    • That which violates the privacy of another person;
    • That which is abusive, profane, or sexually offensive to the average person;
    • That which consists of information which may injure someone else and/or lead to a lawsuit or criminal charges. Examples of such information include libelous statements, pirated software, destructive software, pornographic materials, or copyrighted images and information without permission; or
    • That which consists of any advertisements for commercial enterprises.
  12. Using the Computer Systems and Facilities to harass others. Harassment may include but is not necessarily limited to sending annoying, threatening, libelous, or sexually, racially, or religiously offensive messages through electronic means.
  13. Monitoring or attempting to monitor another user's data communications.
  14. Reading, copying, changing, or deleting another user's files or software (or attempting to do any of the foregoing), without permission from the owner.
  15. Using the Computer Systems and Facilities for personal or financial gain; provided, however that the Computer Systems and Facilities may be used either directly or indirectly for personal or financial gain if such use is related to a valid University function and the user has obtained any necessary approvals.
  16. Installing unauthorized wireless access points. All wireless access points on the Lehigh campus must be coordinated through Library and Technology Services and must conform to specified standards. Library and Technology Services reserves the right to block network access to any wireless access point not conforming to these standards.
  17. Using the Computer Systems and Facilities in violation of the policies of the University or in violation of the University Code of Conduct.
  18. Using the Computer Systems and Facilities for academic dishonesty including plagiarism.
  19. Using the Computer Systems and Facilities in any way that violates any applicable law, rule, or regulation or in any way that subjects the University to liability.
  20. Misuse of Library resources. Electronic resources licensed by the Lehigh Libraries are governed by agreements that restrict access to the Lehigh University community and to visitors in the library buildings. Use is limited to individual, noncommercial purposes, without systematic downloading, distribution, or retention of substantial portions of information.

The above policies supplement the University Code of Conduct, which covers such acts as theft of computer services (including copyrighted computer programs), theft or mutilation of the University’s property such as equipment, and the unacknowledged or unauthorized appropriation of another’s computer program, or the results of that program, in whole or in part, for a computer-related exercise or assignment.

Privacy and Confidentiality

If any Computer System or Facility is threatened, the Computer Systems and Facilities may be monitored and user files may be examined under the direction of the Vice Provost for Library and Technology Services. In addition, the University will comply with all governmental and law enforcement subpoenas, warrants, or orders requiring the examination of user files.

Enforcement

Users are expected to notify Library and Technology Services about violations of applicable laws and policies and potential loopholes in the security of the Computer Systems and Facilities. Users are also expected to cooperate with Library and Technology Services in its operation of the Computer Systems and Facilities and in the investigation of misuse or abuse of the Computer Systems and Facilities.

Those who do not abide by these policies should expect at least suspension of computer privileges and possible action under standard University rules for misconduct and existing disciplinary, personnel, or judicial processes.

Offenders may also be subject to criminal prosecution under federal or state law, and should expect Library and Technology Services to pursue such action. As an example, under Pennsylvania law, it is a felony punishable by a fine of up to $15,000 and imprisonment up to seven years for any person to access, alter or damage any computer system, network, software or database, or any part thereof, with the intent to interrupt the normal functioning of a person (18 Pa.C.S. 7611(a)(1)). Disclosing a password to a computer system, network, etc., knowingly and without authorization, is a felony punishable by a fine of up to $15,000 and imprisonment of up to seven years, as is intentional and unauthorized access to a computer, interference with the operation of a computer or network, or alteration of computer software (18 Pa.C.S. 7611(a)(2) and (3)).

Last modified on: by sws4.