Apr 24, 2024  
Graduate Catalog 2023-2024 
    
Graduate Catalog 2023-2024

Lenoir-Rhyne Technology Use Policies



Purpose

Lenoir-Rhyne University strives to maintain access for its students, faculty and staff to local, national and international sources of information and to provide an atmosphere that encourages the sharing of knowledge, the creative process and collaborative efforts within the university’s educational, research and public service programs. For a complete list of policies and processes around technology, please visit the myLR portal, the Office of information Technology page, as well as The Lenoir-Rhyne University Student Handbook

Policy

Access to electronic information systems at Lenoir-Rhyne University is a privilege, not a right, and must be treated as such by all users of these systems. With this privilege come the following responsibilities:

  • Act honestly and responsibly.
  • Maintain the integrity of these information resources.
  • Protect accounts from access by others and keep passwords and ID’s private.
  • Respect the rights of other computer users.
  • Respect the integrity of the physical facilities and controls.
  • Act in accordance with relevant local, state and federal laws and regulations.
  • Abide by all federal copyright laws and the Digital Millennium Copyright Act (DMCA).

Unauthorized Access

Unauthorized access to information systems is prohibited. This includes, but is not limited to:

  • Use of or sharing another’s password or ID.
  • Trying to guess another’s password or ID.
  • Any attempt to circumvent system security.

Misuse of Information Systems

Misuse of university information systems are prohibited and shall include, but not be limited to:

  • Sending any harassing or threatening electronic communication.
  • Using electronic communications to violate the property rights of authors and copyright owners. Users should be especially aware of potential copyright infringement through the use of email.
  • Using electronic communications to send chain letters or to initiate or perpetuate Phishing attacks.
  • Forging, fraudulently altering or falsifying, or otherwise misusing university or non-university records (including computerized records, permits, identification cards or other documents or property).
  • Launching a computer virus or other malicious program.
  • Use of any university information system to access, download, print, store, forward, transmit or distribute obscene material.
  • Violating any local, state or federal law or regulation in connection with use of any information system.

Use of Computer Labs/Facilities

Users of computer labs are obligated to all policies herein and to any supplemental policies posted in that lab. Further regulations include but are not limited to:

  • Food, drink or tobacco use is not permitted in computer labs.
  • Users shall not attempt to add, delete or modify data, files or programs on classroom or lab technology equipment.
  • Primary use of all labs is for academic and educational purposes. Users must be respectful of this in behavior.
  • Users shall report any malfunction, or concern to the Help Desk as posted in the lab.

Privacy

When university information systems are functioning properly, a user can expect the files and data generated to be private information, unless the creator of the file or data takes action to reveal it to others. However, users should be aware that no information system is 100 percent secure. Persons within and outside of the university may find ways to access files. ACCORDINGLY, THE UNIVERSITY CANNOT AND DOES NOT GUARANTEE USER PRIVACY, and users should be continuously aware of this fact.

All policies stated herein are applicable to email. Users should never assume that no one other than the addressee would read the message(s). Users should also be cautious about attachments and broad publication of messages. Copyright laws and license agreements also apply to email.