It is the intent of Lock Haven University to provide all necessary computing facilities to its current students, faculty, and staff that will allow the LHU community access to all available, local, regional, national, and international information using their account. It is hoped that the university computing environment will encourage both knowledge and sharing of information. However it is expected that all users will use the facilities in a professional and responsible manner. Specifically, LHUPnet subscribers or users must adhere to the following:
Unauthorized Copying of Materials
Lock Haven University expects its guests, students, faculty and staff to obey Federal copyright laws. These laws generally prohibit the copying, without permission, of a copyrighted work. The tangible form of an original expression can take many forms, including computer programs and files. Even if not copyrighted, the unauthorized copying of computer materials is usually wrong. If the material is sold commercially, copying may violate either Federal or Pennsylvania laws prohibiting the theft of trade secrets, or the seller's registration or licensing agreements. Even if the material is not copyrighted or sold commercially, as in the case of another person's work, unauthorized copying almost certainly violates reasonable standards of ethical conduct and/or the University's academic honesty policies.
Disclosing One's Password
Lock Haven University expects its guests, students, faculty and staff to keep their network login and server passwords confidential. All users of the LHUPnet must never share their passwords with their best friends, colleagues, class project members, or even their own secretaries. Doing so puts the person at risk! Every user is accountable for all activities done on the Network through her/his account.
Computer and Network Usage
Lock Haven University expects its students, faculty and staff to use computers in an ethical and legal way. Unauthorized inspection, obstruction, or interference with the work of others is a serious offense, and may violate state and federal laws. Pennsylvania law specifically prohibits the intentional and unauthorized access, alteration, damage, or destruction of "any computer, computer system, computer network, computer software, computer program or data base, or any part thereof " (18 Pa. C.S.A. 532933).
The technological resources of the University are available for the authorized use of students, faculty and staff, in the pursuit of their academic and administrative endeavors. The extension of services to others is forbidden without prior written permission. The use of these resources, computers and networks for commercial enterprise, profit, or resale is expressly prohibited.
University business conducted by e-mail will be via the University's mail server, accessed via the "@lhup.edu" e-mail address. E-mail appropriateness and content will reflect the usage guidelines specified above.
Servers and Network Connection
Servers provide software or information to others. There are File transfer Protocol (FTP) servers, World Wide Web (WWW) servers, and mail servers, just to name a few. Any server, switch, router, hub, wireless hub, or multi-host connection device generates unique network traffic may create network management difficulties. The campus-wide servers and network device installations are managed by the Computing and Instructional Technology Center. No servers, switches, routers, hubs, wireless hubs or any other multi-host connection devices are permitted to be operated by any other users without express written permission.
Personal & Professional Materials
Data stored on University owned hosts and accessible by others (such as World Wide Web documents) may reflect on the University. Such information should be lawful and tasteful. Student data must directly suppport their academic endeavors.
User Computer Accounts
Accounts are created for individuals who are affiliated with the University in the categories listed below after completing a "Computer Account Request" form at the Computing and Instructional Technology Center, on the 5th floor of Robinson Hall. Once created, accounts expire and later are removed based on the category membership. Account creation, expiration, and removal apply to all hosts on which the individual has an account. These accounts are not permanent in nature and are created to facilitate University business.
Expire: An account is marked with a date after which you can no longer login. The files on your account remain unchanged, but you can not access them. The expiration must be changed or removed before you can login again.
Remove: An account is deleted from the system along with all files and mail associated with the account. An account must first be expired before it can be deleted. Student accounts which are removed are first backed up to tape. Tapes are maintained for five weeks, then they are reused.
Faculty and Staff
Faculty and staff accounts expire when no longer employed by the University or upon request using the following guidelines. Terminated or resigning faculty and staff accounts will be expired on last date of employment. Retiring or temporary assignment faculty and staff accounts will be expired 120 days from last employment date. Retiring faculty and staff wishing to retain their account should complete a guest account form. Accounts are removed completely 30 days from date expired.
Note: Email deleted from a user's "deleted items" folder are retained for a period of seven days (a practice known as tombstoning,) after which it is impossible to retrieve the messages.
The use of accounts by students is based on the registration status of the student. An account is expired 120 days after the last attended date (last day of the last session in which the student was regularly enrolled as a credit bearing student) and is eligible for removal 30 days after the expiration date. Eligible accounts are removed from the system as necessary to reclaim resources.
Note: Due to space limitations on the university's disks, email deleted from a student's "deleted items" folder are not retained (technically, a tombstone of zero days,) making it impossible to retrieve the messages.
The use of a computer account by an individual outside the University community (faculty, staff, and students) is a privilege extended to those individuals who are engaged in support of higher education or research or other special cases at the discretion of the Computing and Instructional Technology Center Director. Accounts are renewed annually by reapplying with a "Computer Account Request" form and then extending the expiration date to the next July 1st.
A set of accounts have been established to accommodate temporary training sessions. These accounts are cleared daily and expire at midnight on the day of the training session. Because of the limited number of training accounts, they must be scheduled for use in advance by the instructor.