Computing and Network Use Policy for Students and Guests

Preamble

This policy governs access and use of computing resources including computers and related equipment, as well as local area networks and connections to larger networks such as, but not limited to, the internet. It applies to Concordia Lutheran Seminary Courses (the Moodle installation maintained by the Seminary for the purpose of supporting and delivering the academic programs at CLS), the components of systems used for distance education and video conferencing, and any other third-party services that may be required to support the curriculum or administration from time to time.

Policy

CLS' Commitment

  1. Access to the information technology facilities or services owned, operated, managed, or licensed by CLS imposes certain responsibilities and obligations and is granted subject to CLS policies and the applicable provincial and federal laws.
  2. CLS honours and respects the privacy and academic freedom of its members, and strives to permit maximum freedom of use consistent with this policy.
    1. In general, information stored on seminary computers is considered confidential and proprietary, whether protected or not, unless the owner communicates that such information is available to others.
    2. The Director of Technology Services may observe but will not track or monitor internal and external electronic access and use unless there is just cause, which would likely include the administration and protection of computing and networking systems. The Director of Technology Services will hold this information confidential except in reporting to the supervisor when it becomes necessary to investigate breaches of security or policy.
    3. CLS reserves the right to copy, remove, inspect, or otherwise alter data files, system resources, or user files to best maintain computing facilities.  All individual privileges and rights to privacy will be preserved to the greatest extent possible.
  3. CLS provides timely access and orientation to all necessary third-party computer accounts for all students.
  4. CLS attempts to maintain a secure system that is reliable and constantly available. Scheduled maintenance times will be announced, but there will always be the chance of unforeseen system failures.
    1. Network performance, connectivity, and data retention is not guaranteed. The Director of Technology Services at CLS will use reasonable efforts to ensure that those services over which the institution has direct control are functioning properly. CLS is not responsible for personal loss arising out of the use of network services or inability to use those services.
    2. If a user encounters or observes a potential breach, vulnerability, or discontinuity in system or network security, the user must report the problem to the Director of Technology Services.
  5. CLS maintains software licenses for software that is provided on institution-owned computing resources.
    1. The Director of Technology Services maintains an inventory of all CLS-owned hardware and software.
    2. The Director of Technology Services only supports software purchased by the institution.

 

User Responsibility

  1. Use of CLS's information technology resources implies that the user has agreed to comply with and be subject to this policy.
  2. Computing resources are to be used to further the seminary's broad mission, including its curricular goals, research, communications, and the official work of approved external responsibilities and affiliations.
  3. Users are responsible for ensuring that computing resources are used in an effective, ethical, and legal manner.
  4. Users have a responsibility not to abuse the network and resources, and to respect the privacy rights of others.
  5. Official CLS user accounts (Moodle, Adobe Connect, etc.) are for use only by the person to whom the account is assigned and for appropriate purposes. A user having any CLS computer account is responsible for the use made of that account.
  6. Each user is expected to maintain security and confidentiality in appropriate ways such as:
    1. selecting a strong password (i.e. alpha-numeric with upper and lower case characters) and changing it frequently;
    2. keeping passwords and other types of authorization secure;
    3. understanding the level of protection each computer system automatically applies to data files and supplementing it, if necessary, for sensitive information;
    4. being aware of computer viruses and other destructive computer programs, and taking steps to avoid being a victim or carrier;
    5. maintaining a schedule to ensure that important data is backed up securely.
  7. Computing resources are provided for everyone's use.  Any activity is prohibited that:
    1. adversely affects the overall availability of these resources;
    2. abuses these resources; or
    3. knowingly compromises the security of the network or the security of other computers on the Internet.
  8. Additions, removal, or transfer of software on CLS-owned hardware without authorization is prohibited. Intentional ownership or possession of illegal or damaging software is a violation of this policy
  9. Ultimate responsibility for the security and confidentiality of programs, data, and other information rests with the users. Therefore, users must understand and be personally responsible for utilizing the security features of the computing environment. Users accessing the network on private equipment may seek recommendations and limited support from the Director of Technology Services.
Last modified: Friday, 9 May 2014, 10:46 AM