General Use Policy

Pacific Lutheran University students, faculty, and staff are responsible for legal and ethical use of computers and the network.

Activities considered to be in conflict with this policy include, but are not limited to, the following:
Spreading viruses or causing disruptions on the network.

  • Unauthorized access to restricted or personal computers, data, or programs or knowing use of restricted computers, data or programs accessed or acquired by someone else…
  • Sharing a password or account(s). Account holders are responsible and will be held accountable for all activity occurring on their accounts.
  • Creating, modifying, executing or re-transmitting any computer program or instructions intended to gain unauthorized access to, or make unauthorized use of, any computer facilities or software.
  • Violating copyright laws or software license agreements.
  • Installing software, including freeware, shareware, public-domain or commercial software on any university-owned computer equipment without appropriate authority.
  • Using computers or networks with the intent to compromise any other computers or networks or to commit crimes or other unethical acts.
  • Using computers or networks for unauthorized non-University-related commercial or for-profit activity.
  • Sending or forwarding electronic mail for unauthorized purposes (i.e., spam). This includes but is not limited to unsolicited and unsanctioned mass mailings. University officials authorized to send or approve mass electronic mailings are the President, Provost and V.P. for Admission and Student Life
  • Viewing, printing, storage, display, or playing of sounds of any sexually explicit or potentially offensive materials in a way that may create an offensive working or learning environment.
  • Excessive use of paper, toner, disk space, or other resources.
  • Monopolizing systems so that others are prevented from use.
  • Overloading computers or networks with excessive data.
  • Activities in violation of faculty and staff employment handbooks or student conduct policies (the PLU Code of Conduct).
  • Using email or other electronic methods for purposes of harassment or stalking.
  • Activities which violate local, state, or federal laws.
  • Removing any PLU owned computer software or hardware from campus without written permission of the appropriate administrator.

Updated 8/2006