Policies

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy

Purpose

Lindenwood University is committed to providing a safe and secure information technology infrastructure. Acceptable use expectations are defined and enforced to support such an environment.

Scope

This policy applies to all students, faculty, staff, and individuals employed by Lindenwood University that utilizes the institution’s equipment, network, or systems.

Policy

This policy applies to all individuals actively or passively connecting technology devices  to the Lindenwood University network, whether they are student, faculty, staff, or University owned. At its discretion, the University reserves the right to restrict or deny the use of its network facilities and capabilities.

Lindenwood Network and Technology Resources

The Lindenwood-Guest and Residential networks are UNSECURED networks, and Lindenwood University makes no representations or warranties concerning the availability or security of the guest or residential networks, and all use is provided on an as-is basis. By using these networks, you agree to defend, indemnify, and hold harmless Lindenwood University for any losses or damages that may result from your use of these networks.

Individuals who access to university computer facilities and to the system-wide communications network assume responsibility for their appropriate use. Lindenwood University expects individuals to be careful, honest, responsible, and civil in the use of the University’s networks, computers, and information technology. Computer, technology, and network facilities are primarily for educational and administrative use. These facilities have tangible value. Attempts to circumvent accounting/information systems or to use the accounts of others will be treated as forms of attempted theft and prosecuted accordingly.

Individuals assume personal responsibility for the use of their accounts. Users must not disclose their passwords or otherwise make Lindenwood University facilities available to unauthorized individuals or groups. Moreover, the possession or collection of others’ passwords is prohibited.

Users with personal computers and technology devices on the Lindenwood University network are expected to take reasonable precautions to ensure the security of their systems. All computers require a valid, up-to-date virus-scanning program. Individuals may be held responsible for any misuse that occur on their systems.

Users are not permitted to register external domain names that reference systems on the Lindenwood University network. Using the Lindenwood University network for commercial purposes is strictly prohibited. Connecting any secondary physical network to the Lindenwood network without written authorization by the Chief Information Officer is strictly prohibited.

Providing services or running applications that consume excessive bandwidth on the Lindenwood network is prohibited.

No Lindenwood University network, system, or device is to be used for any illegal or criminal purpose. Users must observe intellectual property rights including copyright laws as they apply to software and electronic forms of information.

Users are expected to report any evidence of actual suspected violation of this policy to their residence directors or the Vice President for Information Technology and Chief Information Officer.

File Sharing

File sharing software is prohibited on the Lindenwood network, including (but not limited to),

  • Aimster
  • Ares (all versions)
  • BearShare
  • Bittorrent
  • Bulbster
  • Gnutella
  • Hotline
  • Imesh
  • Kazaa (all versions)
  • LimeWire
  • Madster
  • Monolito
  • Napster
  • NeoNapster
  • WinMX
  • UTorrent
  • QBittorrent

All are prohibited on the Lindenwood University network (including residence halls, apartments, classrooms, public spaces, and faculty/staff offices).

Because the Lindenwood University network and Internet connections are shared by many University services (the University Library, Lindenwood University website, electronic mail, etc.),  Lindenwood Information Technology Department actively monitors network traffic to ensure reliable service for everyone. File sharing software can account for a large portion of traffic on the University network. As such, network traffic shaping may be used to address instances of misuse or policy violation.

Streaming media (such as streaming video, streaming audio programs, etc.) are permitted, as they use significantly less bandwidth. However, during peak hours, any bandwidth-intensive application may be terminated to ensure continued services to the University community.

If you have file sharing applications on your computer, you must remove them. Simply disabling these applications may not mitigate their effect on the Lindenwood University network, as these applications share your computer with the entire Internet in the background, generating an enormous amount of traffic.

If you have any questions, please contact the Lindenwood University Information Technology Help Desk at helpdesk@lindenwood.edu or (636) 255- 5100. .

Obscene or Harassing Electronic Communications

Obscene or harassing electronic communication is prohibited, as are messages that target individuals in a threatening manner. Individuals who send such communications will be reported to the proper authorities. The Lindenwood University Information Technology department reserves the right to monitor all activity on  any computer/technology device connected to the Lindenwood University network. University managed accounts and service activity may be monitored as well.

Policy Violation

The Lindenwood University  Information Technology department reserves the right to deny system or network access on a temporary or permanent basis to anyone who violates this policy. This includes the ability to terminate processes or connections that threaten system or network security, performance, or integrity. Lindenwood University  Information Technology department  will attempt to notify the user of any such action.