Louisburg College provides computer resources to support its students, faculty, and staff’s education, research, and work: the priorities for the use of these resources are:

  • Education, research, and administrative purposes of Louisburg College
  • Other uses indirectly related to Louisburg College purposes with educational or research benefit, including personal communications.
  • Recreation - including gaming, streaming media, Netflix, and other legal streaming activity


Prohibited activity includes - but is not limited to the following:

  • Selling of Louisburg College resources.
  • Commercial activities not sanctioned by the president's office
  • Intentionally denying or interfering with service
  • Unauthorized use or access
  • Reading or modifying files without proper authorization
  • Using the technology to impersonate another
  • Downloading from illegal or copyrighted sources
  • Violation of local, state, or federal law or Louisburg College policies


Network Use Guidelines

To ensure continued compliance with computer usage guidelines, Louisburg College designates certain personnel to investigate alleged computer abuses. This personnel reserve the right to examine files in such cases. 

Use of Louisburg College Computing Facilities and Labs

All users - students, faculty, staff, and authorized others:

  • Should report any malfunction to the person on duty or the organization responsible for the facility immediately. Do not attempt to move, repair, reconfigure, modify or attach devices to the systems.
  • Must finish any food or drink before using computing facilities
  • Are to recognize that academic use of the workstations have priority over all other uses
  • Be aware that the college permits recreational use in computing facilities during periods of light usage; however, you may not play games or engage in other recreational activities when others are waiting to use the workstations for academic purposes.
  • Must realize that individual computing center facilities and other facilities may post additional operational rules and restrictions that become  part of this policy
  • Must not load or modify any software onto any hard drive without specific prior permission of the system administrator or custodian of the files.


Authorization and Security

For each user, authorization to utilize computer resources includes but is not limited to electronic mail, administrative records, library services, and departmental-specific programs.

Each user:

  • Must have a valid, authorized account and may only use those computer resources which are specifically authorized
  • May only use their account following its authorized purpose.
  • Is responsible for safeguarding their computing accounts and should change passwords often to ensure privacy and security


Honor Code

All users:

  • Must not use the computer systems to violate any rules in the Employee Handbook or the Louisburg College Student Handbook or any local, state, or federal laws
  • Should disclose to the appropriate authorities any misuse of the computing resources or potential loopholes in computer systems security and cooperate with the systems administrator in the investigations of abuses


Common Forms of Computer Abuse

The college prohibits misuse or abuse of Louisburg College's computers, computer systems, computer networks, programs, and data. The college will consider violations in the areas listed below academic misconduct, misdemeanor, or felony as appropriate to the situation and deal with the situation accordingly. -see Penalties section


Violations of Louisburg College or another user's privacy include but are not limited to the following:

  • Attempting to access another user's computer files without permission
  • Supplying or trying to provide false and misleading information or identification to access another user's account
  • The unauthorized "borrowing" or examination of another user's output
  • Deliberate, unauthorized attempts to access or use the college's computers, computer facilities, networks, programs, data, or any system files other than those designated for public access
  • Connecting a wireless access point to the network without authorization by the Information Technology Department
  • The unauthorized manipulation of the college's computer systems, programs, or data
  • The unauthorized capturing of computer network data directly from the network backbone or networking media



Violations in this area include but are not limited to the following:

  • Abusing specific computer resources such as the internet
  • Attempting unauthorized access to computers outside the network using the college's computers or communication facilities
  • Removing any computer equipment - hardware, software, data, pictures, articles, or books without proper authorization
  • Copying, attempting to copy, or distributing copyrighted or licensed software, data, images, articles, or books without appropriate authorization
  • Abusing printing resources such as printing material that is not academic or business-related. 



The institution considers alteration or attempted alteration of programs - digital data or other files, resource or equipment destruction, or disruption vandalism. Violations include, but are not limited to the following:

  • The installation of software or the intentional spreading of viruses that cause harm to computer systems or another user's account
  • Tampering with or obstructing the college's computer systems
  • Inspecting, modifying, or distributing data or software without proper authorization or attempting to do so
  • Damaging computer hardware and software


Any intentional attempt to harm or destroy data or equipment will result in immediate cancellation of user privileges, a requirement of restitution, and may result in sanctions imposed by the Office of Student Conduct.  


Copyright Issues

Louisburg College owns licenses to several proprietary programs. Users who redistribute software from the computing systems break agreements with the college's software suppliers and applicable federal copyright patent and trade secret laws. Therefore, the college strictly prohibits the redistribution of any software from computing systems except software that publishers have clearly marked as public domain. Louisburg College will not provide legal defense for individuals accused of making unauthorized copies. Suppose a company sues the college, or the court fines the college because of unauthorized copying or use by students, faculty, or staff. In that case, it may seek payment from the individuals and subject them to disciplinary action that may include expulsion or dismissal. Violations include but are not limited to copying, transmitting, or disclosing data, software, or documentation without proper authorization.


Harassment of others may be the sending, viewing, or printing of unwanted messages or files. Violations include, but are not limited to the following:

  • Interfering with the legitimate work of another user
  • The sending of abusive or obscene messages via computers
  • The use of computer resources to engage in abuse of computer personnel or other users


Games, Chain Letters and Miscellaneous

The college prohibits unethical, inappropriate, or illegal use of the network. Uses commonly considered unethical include but are not limited to the following:

  • Sending chain letters or unauthorized mass mailings banned by state and federal law
  • Using the network for non-professional or illegal activities, which may include obscenity, pornography, threats, harassment, copyright infringement, defamation, theft, or unauthorized access



Louisburg College will take appropriate action in response to user misuses, unethical use, or abuse of computing services as they may violate user responsibility and federal law. These actions may include but are not limited to the following:

  • Permanent or temporary suspension of access to all facilities
  • Legal action to recover the damages
  • Referral to law enforcement authorities

The college will refer alleged student abuse or misuse of computing services by students, faculty, or staff to the Director of Information Technology. Suppose the director finds evidence of a violation. In that case, the Director of Information Technology, the Vice President of Academics, and the Vice President of Student Life will deal with the matter. They will appropriately determine if it is misconduct, a misdemeanor, or a felony. After a referral to the appropriate office, depending upon the gravity of the violations, they will determine the sanctions ranging from the following:

  • Suspension of the user's account until the user has a conference with the Director of Information Technology
  • Suspension of the user's account short term
  • Suspension of the user's account for the remainder of the semester
  • Suspension from the college
  • Or expulsion from the college

An accused user has the right to a hearing as outlined in the Student Conduct Process concerning the policy violation and the disciplinary action recommended.

Distribution of this Policy

Louisburg College will publish the policy and distribute it in the appropriate media to reach all students, staff, or faculty.