Lafayette College’s information technology (IT) resources are intended to support the educational, administrative, and campus life activities of the College. The use of these resources is a privilege extended to members of the Lafayette community, who are expected to act in a responsible, ethical, and legal manner. In general, acceptable use entails behavior that respects the rights of others, does not compromise the security or integrity of IT resources, and complies with all applicable laws and license agreements.
This policy establishes specific requirements for the use of computing and network resources at Lafayette College. As with other College policies, violation of the Acceptable Use Policy can result in disciplinary action up to and including termination of employment.
This policy applies to all users of IT resources owned or managed by Lafayette College. IT resources include all College owned, licensed, or managed hardware and software, as well as the College network, regardless of the ownership of the device connected to the network, the means of connecting, or the locale from which the connection is made.
The College takes various measures to protect its information resources and users’ accounts. However, you should be aware that the College cannot guarantee privacy and that it is the responsibility of individual users to engage in prudent practices by establishing appropriate access restrictions for their accounts and safeguarding their passwords.
The normal operation of the College’s IT infrastructure requires backing up data, logging activity, monitoring general usage patterns, and other such activities. While the College does not generally review the content of information contained on a computer or transmitted over the network, exceptions are made under the following conditions:
Permission to review individual data can come only from the Vice President for ITS and CIO in conjunction with one other senior officer of the College. For more information on privacy issues, see the “Statement of Confidentiality, Privacy, and Security,” Appendix R in the Lafayette College Faculty Handbook.
Violations of this policy will be handled according to normal disciplinary procedures. However, a user’s IT use privileges may be temporarily suspended by Information Technology Services prior to the initiation or completion of these procedures when there is a reasonable basis to believe that an individual is in violation of this policy.