Computing and Network Use Policy for Students and Guests

Preamble

This policy governs access and use of computing resources including computers and related equipment, as well as local area networks and connections to larger networks such as, but not limited to, the internet. It applies to Concordia Lutheran Seminary Courses (the Moodle installation maintained by the Seminary for the purpose of supporting and delivering the academic programs at CLS), the components of systems used for distance education and video conferencing, and any other third-party services that may be required to support the curriculum or administration from time to time.

Policy

CLS' Commitment

1.     Access to information technology facilities or services owned, operated, managed, or licensed by CLS imposes certain responsibilities and obligations and is granted subject to CLS policies and the applicable provincial and federal laws.

2.     In order to provide for the best interactions, the technology fee covers the following as part of the seminary experience. CLS expects responsible use of each aspect.

    1. Each student is expected to have a working, functional laptop or comparable tool for classroom and home use.
    2. Each student will be given a CLS email account that will be one of the official means of communication and is linked to a Google Drive and Google Calendar. It is issued for life as an alumnus.
    3. Each student will be given and expected to use the latest Microsoft operating system and the Microsoft Office Suite of products. These are to be utilized for assignment submissions.
    4. Each student will be given access to our Moodle online Learning Management System (LMS).
    5. Each student will also be given a lifetime “Logos 8 Lutheran Starter for purchase of ebooks and resources and access to the CLS Remote Research Library from Logos bible software.
    6. Each student will have access to the CLS library and its connected resources through NEOS and TAL.

3.     CLS honours and respects the privacy and academic freedom of its members and strives to permit maximum freedom of use consistent with this policy.

a.     In general, information stored on seminary computers is considered confidential and proprietary, whether protected or not, unless the owner communicates that such information is available to others.

b.     The Director of Technology Services may observe but will not track or monitor internal and external electronic access and use unless there is just cause, which may include the administration and protection of computing and networking systems. The Director of Technology Services will hold this information confidential except in reporting to the supervisor when it becomes necessary to investigate breaches of security or policy.

c.     CLS reserves the right to copy, remove, inspect, or otherwise alter data files, system resources, or user files to maintain computing facilities.  All individual privileges and rights to privacy will be preserved to the greatest extent possible.

4.     CLS provides timely access and orientation to all necessary third-party computer accounts for all students.

5.     CLS attempts to maintain a secure system that is reliable and constantly available. Scheduled maintenance times will be announced, but there will always be the chance of unforeseen system failures.

a.     Network performance, connectivity, and data retention is not guaranteed. The Director of Technology Services at CLS will use reasonable efforts to ensure that those services over which the institution has direct control are functioning properly. CLS is not responsible for personal loss arising out of the use of network services or inability to use those services.

b.     If a user encounters or observes a potential breach, vulnerability, or discontinuity in system or network security, the user must report the problem to the Director of Technology Services.

6.     CLS maintains software licenses for software that is provided on institution-owned computing resources.

a.     The Director of Technology Services supports only software purchased by the institution.

User Responsibility

1.     Use of CLS's information technology resources implies that the user has agreed to comply with and be subject to this policy.

2.     Computing resources are to be used to further the seminary's broad mission, including its curricular goals, research, communications, and the official work of approved external responsibilities and affiliations.

3.     Users are responsible for ensuring that computing resources are used in an effective, ethical, and legal manner.

4.     Users have a responsibility not to abuse the network and resources, and to respect the privacy rights of others.

5.     Official CLS user accounts (Moodle, Adobe Connect, etc.) are for use only by the person to whom the account is assigned and for appropriate purposes. A user having any CLS computer account is responsible for the use made of that account.

6.     Each user is expected to maintain security and confidentiality in appropriate ways such as:

a.     selecting a strong password (i.e. alpha-numeric with upper and lower case characters) and changing it frequently;

b.     keeping passwords and other types of authorization secure;

c.     understanding the level of protection each computer system automatically applies to data files and supplementing it, if necessary, for sensitive information;

d.     being aware of computer viruses and other destructive computer programs, and taking steps to avoid being a victim or carrier;

e.     maintaining a schedule to ensure that important data is backed up securely.

7.     Computing resources are provided for everyone's use.  Any activity is prohibited that:

a.     adversely affects the overall availability of these resources;

b.     abuses these resources; or

c.     knowingly compromises the security of the network or the security of other computers on the Internet.

8.     Additions, removal, or transfer of software on CLS-owned hardware without authorization is prohibited. Intentional ownership or possession of illegal or damaging software is a violation of this policy

9.     Ultimate responsibility for the security and confidentiality of programs, data, and other information rests with the users. Therefore, users must understand and be personally responsible for utilizing the security features of the computing environment. Users accessing the network on private equipment may seek recommendations and limited support from the Director of Technology Services.


Last modified: Monday, 9 November 2020, 3:00 PM