Information Technology: Appropriate Use of Technology






Information Technology


(541) 463-3341

Primary Contact

Fred Rankin

Contact Email

Responsible Executive Authority

Vice President of Information Technology


To detail the collective responsibility for ensuring the safety of students and staff by enforcing regular security measures, including patches, updates, and scans, on Lane-issued, technology equipment, as well as to provide examples of appropriate and inappropriate uses of technology.


Lane Community College provides a technology infrastructure which includes wired and wireless networks, internet access, servers, work stations, printers, information systems, websites, etc. The infrastructure is provided for students, faculty and staff to perform the work of the college.

Appropriate Use:

All technology is to be used in keeping with the laws of the state and the country. College technology should be used primarily for college related works such as student assignments, development of curriculum, and to fulfill job duties, etc. See also the Equipment: Personal Use Policy

Inappropriate and Prohibited uses include:

  • Cheating, plagiarism, gambling, pornography, furnishing false information or other acts of academic dishonesty of its computer users
  • Fraudulent, harassing or obscene messages and/or materials as defined by contemporary court decisions are not to be received, sent or stored.
  • Copying or distributing copyrighted software or licensed electronic content that does not expressly give permission to do so (e.g. using a Creative Commons license). See also the Copyrighted Materials: Reproduction procedure.
  • Network use which creates unnecessary network traffic.
  • Broadcast of unsolicited electronic mail and messages to an unnecessarily large audience.
  • Transmission of electronic chain letters or other requests for money, or distribution or circulation of media known to contain computer viruses.
  • Using the Campus Network to gain unauthorized access to any computer systems.
  • Knowingly performing an act which will interfere with the normal operation of computers, thin clients, peripherals, or networks. This includes, but is not limited to, deliberately circumventing security software.
  • Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms.
  • Attempting to circumvent data protection schemes or uncover security loopholes.
  • Violating terms of applicable software licensing agreements or copyright laws.
  • Deliberately wasting computing resources (e.g. bitcoin mining).
  • Installing peer-to-peer software to enable illegal distribution of software or other electronic content.
  • Sharing or providing access to college provided hardware to others, including family members.
  • Defacing college equipment or engaging in any form of vandalism is strictly prohibited and constitutes a violation of our policies. This includes, but is not limited to, the use of unauthorized stickers on laptops or other hardware. Members of the college community should report any instances of equipment tampering or damage promptly.

Failure to comply with these policies and procedures will result in the revocation of system access until the hardware is brought into compliance.

Please report any violations of this procedure to the helpdesk via the ticketing system.

Date Adopted

Tuesday, September 30, 2014

Date Last Reviewed

Thursday, April 4, 2024