Account Creation and Termination


LockAll students, faculty, and staff will have computer access and email accounts created and maintained for their individual use while they are enrolled at or employed by the University.

Upon separation from the University, appropriate security restrictions will be placed on the account to limit access to the University’s network and computing resources.


 

Student Access

New student computer access and email accounts are created after registration and will be maintained as long as the student is enrolled at the University. The University presently allows current students to keep access to the email system after graduation.

email Accounts

Email accounts are provided to students, faculty, and staff in support of the University’s mission. Email is the University’s official means of communication. Failure to read email messages sent from Lawrence Tech to its users does not absolve the user of responsibility for knowing the content of these messages. It is the user’s responsibility to monitor the content of their Lawrence Tech email account.

Email messages are neither personal nor private. While IT Services will not routinely monitor individual email and will take reasonable precautions to protect the privacy of email, program managers and technical staff may access a student’s or employee’s email:

  1. For a legitimate business purpose (e.g., the need to access information when an employee is absent).
  2. To diagnose and resolve technical problems involving the system.
  3. To investigate possible misuse of email when a reasonable suspicion of abuse exists or in conjunction with an approved investigation.
  4. Under the provisions of the USA Patriot Act in order to provide requested information to authorized personnel.

University email and voice communications systems and their content are the property of Lawrence Tech and are subject to its review and control. Email and voice messaging systems may be subject to discovery proceedings in legal actions.

On appropriate administrative approval, IT Services may monitor any official communications, including email and voice communications, if there is a reasonable suspicion of abuse or violation of University policies.

Email messages sent from a Lawrence Tech email account must have the user’s name associated with the message. Anonymous email messages may not be sent from University email addresses and are prohibited.

Password Policy

All passwords used to access Lawrence Tech computer and network resources must be kept private. They must not be shared with others.

Passwords must be changed regularly according to a schedule determined by IT Services.

Data Security

The University provides reasonable security against intrusion and damage to files stored on central storage facilities, and provides for the archiving of files based upon the operational needs of the University. The University has the right to limit system access if reasonable efforts are not made to protect the LTU information systems and network.

All individual users have access to a limited amount of protected storage on University servers. Data files stored on protected central storage facilities are regularly archived and may be restored on request of the user to the most recent version available.

However, the University is not responsible for the loss of users’ files or data when stored on desktop PCs, laptops, or any other non-centrally located and/or unprotected storage media. Users should take their own steps to back up and protect important information.

All computer systems accessing the Lawrence Tech network must have up-to-date antivirus software installed and running. IT Services will install University approved antivirus software on all University owned systems currently in production and on new systems prior to delivery to the end user.

Encrypted files, documents, and messages may be accessed by the University if suspected of breaching acceptable use guidelines. Under the provisions of the USA Patriot Act, the University is under no obligation to notify any user who may be the subject of an investigation.