Information Technology: Appropriate Use of Technology






Information Technology


(541) 463-3341

Primary Contact

Fred Rankin

Contact Email

Responsible Executive Authority

Vice President of Information Technology


To describe examples of appropriate and inappropriate uses of technology.


Lane Community College provides a technology infrastructure which includes wired and wireless networks, internet access, servers, work stations, printers, information systems, websites, etc. The infrastructure is provided for students, faculty and staff to perform the work of the college.
Appropriate Use:
All technology is to be used in keeping with the laws of the state and the country. College technology should be used primarily for college related works such as student assignments, development of curriculum, and to fulfill job duties, etc.

Inappropriate and Prohibited uses include:

  •  Cheating, plagiarism, gambling, pornography, furnishing false information or other acts of academic dishonesty of its computer users
  •  Fraudulent, harassing or obscene messages and/or materials as defined by contemporary court decisions are not to be received, sent or stored.
  •  Copying or distributing copyrighted software or licensed electronic content that does not expressly give permission to do so (e.g. using a Creative Commons license).
  •  Network use which creates unnecessary network traffic.
  •  Broadcast of unsolicited electronic mail and messages to an unnecessarily large audience.
  •  Transmission of electronic chain letters or other requests for money, or distribution or circulation of media known to contain computer viruses.
  •  Using the Campus Network to gain unauthorized access to any computer systems.
  •  Knowingly performing an act which will interfere with the normal operation of computers, thin clients, peripherals, or networks.
  •  Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms.
  •  Attempting to circumvent data protection schemes or uncover security loopholes.
  •  Violating terms of applicable software licensing agreements or copyright laws.
  •  Deliberately wasting computing resources (e.g. bitcoin mining).
  •  Installing peer-to-peer software to enable illegal distribution of software or other electronic content.

Reporting Abuse: Please report abuse to the office of Student Affairs ext. 5732.

Date Adopted

Tuesday, September 30, 2014

Date Last Reviewed

Tuesday, December 1, 2015