Technology Use Policy

As members of a Christian community, we are called to standards that are usually greater than those expected by the legal authorities. Examples of some of these higher standards would include good stewardship, love and respect for all of God's creatures, and avoiding being a stumbling block for our brothers and sisters. Although it may be obvious that such behavior is necessary when on a school function, it may not be as obvious that such behavior is necessary when using computer networks.

With these standards in mind, the following are specific prohibitions on e-mail and website use at Lee University. This list is NOT exhaustive, but is only offered as a reminder of how legal and Christian standards affect our computer use at Lee. If you are considering engaging in an activity that you feel might be questionable, please contact Information Technology and/or your supervising faculty member. Misuse of your computer account could result in consequences ranging from a permanent ban from network use to criminal charges.

COMMERCIAL USE: E-mail and website use is only for personal or educational purposes. You may not use your account at Lee to sell or advertise commercial services or products. You may not use your e-mail to send out mass mailings, initiate chain letters or propagate scams or hoaxes.

COPYRIGHTED MATERIALS: You may not distribute copyrighted material (e.g., text, digital media, programs, etc. . .) via any file sharing method, including peer-to-peer file sharing, email, or web hosting. Breaking this rule is a federal offense that could result in imprisonment. The only exception to this rule is if you have written permission from the copyright holder to disseminate the information via your website.

UNKIND COMMUNICATIONS: You may not use your e-mail or website to harass, attack, threaten or liable another person or organization. You can be sued for placing misleading or untrue information on a website. Also, due to the impersonal nature and speed of e-mail, it is easier to get into verbal arguments, sometimes known as "flame mail." Please communicate with kindness and respect.

INDECENCY: Indecent materials are prohibited. Definition of indecent: if it would offend the typical grandparent, it probably should not be on your web page. This includes placing links on your website that may lead others to indecent material. You should also avoid language or images that could be construed as racist, sexist or otherwise discriminatory.

OVERUSE OF RESOURCES: Websites that are getting an abnormally large number of hits or e-mail accounts with an abnormal amount of traffic may be temporarily suspended in order to preserve system resources.

PASSWORD SECURITY: You may not give other people your password. You should avoid using passwords that are easy to guess or that spell a word in the dictionary. If you believe that your account has been compromised, change your password and contact Information Systems immediately.

PRIVACY: While e-mail will not normally be read by administration, you should not have an expectation of privacy. Your e-mail will pass through multiple computer systems throughout the world, some that are less secure than others. If your e-mail is confidential, consider using an encryption program. Lee University reserves the right to examine e-mail files and archives if misuse is suspected.

IDENTITY: You may not misrepresent your identity on either your website or e-mail. Specifically, your website MUST clearly identify your true identity. You may NOT represent your views as being the official position of Lee University.

VIRUSES: You may not purposefully distribute a computer virus via e-mail or your website, even if that virus does not do any malicious damage (e.g., practical jokes). If you believe that you have accidentally sent a computer virus via e-mail or your website, contact Information Systems immediately.

INVASION OF PRIVACY: You may not attempt to break into another account, even if you only intend to play a joke. Attempts to access resources belonging to other users can result in a suspension of network privileges as well as other consequences as decided by Student Life.

By completing the application process for computer resources, you agree that you have read this document and agree to abide by the rules and principles contained within it. You also agree that you will report violations of these principles to Information Systems or an appropriate faculty member.

Explore The Campus Through
Our Interactive 3D Map