Skip to main content

Acceptable Use for Technology Resources

LMC Revised Date

Office of Origin: Information Technologies
Date Adopted: 02-20-96
Date Reviewed: 01-15-12
Last Date Modified & Approved: 01-15-12

Policy Statement:

Lake Michigan College (LMC or the College) has made available to its students, faculty, staff, and guests a variety of technology resources for the pursuit of supporting academic programs and operational goals. Technology resources include desktop computers, laptops, internet access, Local Area Network (LAN), Wide Area Network (WAN), wireless network access, printers, data projectors, email, electronic media, electronic records, phones, video, audio, scanners, software applications, photocopiers, cameras, digital signs and portable digital devices.

The use of technology resources at LMC is a privilege and must fall within acceptable use as outlined in the rules of this policy. LMC has the right to monitor the use of the technology resources. LMC may revoke individual access any time appropriate use is violated. Nothing in this policy shall preclude separate "conditions of use" from being implemented by units of LMC or by LMC with respect to portions of its electronic technology resources. Such conditions of use shall be deemed to supplement, rather than replace, this policy. 

LMC reserves the right to log internet use, inspect electronic records, and monitor electronic communication that reside on College assets or that utilize College networks. This means that there should be no expectation of privacy with respect to use of computer systems. LMC may, at its discretion, review sites and programs accessed by students, faculty, staff, and guests, including messages sent or received. Such monitoring may be conducted without notice.

Acceptable use must be legal; ethical; show respect for intellectual property and an individual’s right to privacy, freedom from intimidation, harassment, and unwarranted annoyance; reflect academic honesty; and show restraint in the consumption of shared network resources.

In addition to the conduct set forth below, LMC specifically deems as just cause for disciplinary action up to and including non-reappointment, discharge, dismissal, suspension, expulsion, termination, and/or legal action for:

  1. Violation of copyright, patent, license agreement, or contract.

  2. Interference with intended use of technology resources by denial of service attacks or other hacking activities.

  3. Any attempt to gain unauthorized access to information.

  4. Any unauthorized invasion (or attempted invasion) of the privacy of others.

The following activities are prohibited using LMC’s technology resources:

  1. Violating any federal, state, local, or common law, or statute, including FERPA (See Student and Employee Handbook.)

  2. Violating any libel or slander laws.

  3. Installing institutionally owned software on personally owned computer unless College’s software agreement with licensor permits such use.

  4. Sharing account numbers or passwords with someone else.

  5. Publicly disclosing or violating privacy of an individual by sharing personal, confidential or private information such as home addresses, phone numbers, student id, etc.

  6. Communicating a false identity or that they are representing someone else.

  7. Using any College network or other communication system to obtain or disseminate pornography.

  8. Using technology for private business or product advertisement or political lobbying.

  9. Seeking to gain unauthorized access to computing resources or data.

  10. Changing an official record using the identity of another in an unauthorized manner.

  11. Loading software on College owned computers unless approved by Information Technologies.

  12. Using peer to peer networking, illegal downloading or other means to violate copyright laws through the sharing of copyright restricted material.

  13. Using College technology resources to violate copyright laws, such as copying software for which one is not the registered owner, or by illegally distributing or consuming copyright protected software or digital content.

  14. Engaging in activities that damage or disrupt hardware, software, or communications, such as virus creation and propagation, wasting system resources, and overloading the network with excessive data requests.

  15. Transmitting or making accessible offensive, annoying, or harassing material, such as broadcasting unsolicited messages (SPAM) or sending mass emails.

  16. Intentionally accessing or damaging systems or information or using any system for illegal activities.

  17. Attaching any computer or network device that is not owned by LMC to LMC wired Ethernet infrastructure.

  18. Enabling or otherwise implementing any wireless radio equipment which interferes or has the potential to interfere with the College’s existing IEEE 802.11 wireless network.

  19. Implementing any wireless networking equipment or application for the purpose of relaying or retransmitting any LMC data network communication.

Responsibility: Executive Director, Information Technology


Formerly Titled: Information Resources, Technology and Networks - Proper Use

Back to Top Apply Now