Acceptable Use Policy

For Loyola Law School Information Technology Facilities

Computers and networks provide access to resources on and off campus, as well as the ability to communicate with other users worldwide.  Such open access is a privilege, and requires that individuals act responsibly.  Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.  In addition to these general principles, Loyola Law School (LLS) has adopted Acceptable Use Policies which follow.

These policies apply, where appropriate, to any person using Loyola Law School Information Technology Facilities.  In the event any of these policies conflicts with items contained in the Faculty Handbook, Student Handbook, departmental manuals, or individual contracts, the latter shall control except where they reference or incorporate these policies.  These policies do not apply to the activities of students, faculty, staff, or others where such activities do not involve the use of LLS Information Technology Facilities.

This document contains the general policies for use of LLS Information Technology Facilities.  More specific policies relating to Internet access, e-mail, and web publishing are contained elsewhere (e.g., users' manuals and standards manuals).  Users should consult and familiarize themselves with the policies and standards applicable to particular uses.

In addition to these policies, various state and federal laws govern the use of computers and computer networks.  These include (as of the time this document was written): The Copyright Act (17 U.S.C. § 101, et seq.); The Digital Millennium Copyright Act (Public Law 105-304); The Computer Crime and Abuse Act of 1986 (18 U.S.C. § 1030 (A)(5)(a)); The Family Educational Rights and Privacy Act of 1974 (20 U.S.C. § 1232g), The Electronic Communications Privacy Act of 1986 (18 U.S.C. § 2510, et. seq.), The Federal Trademark Dilution Act of 1995 (15 U.S.C. § 1125(c)); California Criminal Code §§ 502, 13848, and California Education Code § 94367.  This list is not intended to be all encompassing.

  1. Definitions

    As used in this document, the following terms have the meanings stated:

    Loyola Law School Information Technology Facilities [LLS IT Facilities]:  (1) all physical devices owned by and/or located on the campus of Loyola Law School relating to computing or data transmission, including but not limited to: desktop and portable computers; computer peripherals (such as printers); network cameras; the network-based public address system; network wiring, switches and connections; servers; telephone equipment connected to the campus network; and (2) data files, applications, and other software used in conjunction with the devices listed in (1).  Example: a privately owned computer connected to the LLS network or to the Internet, using an LLS on-campus hard-wired or wireless network connection or an off-campus connection to access an LLS server, is using LLS IT Facilities, even though the privately owned computer is not itself considered an LLS IT Facility.

    Loyola Law School Web Server: any computer connected to the campus network containing web pages, text files, graphic files, or other data accessible to others using Internet protocols (e.g., IP, HTTP, FTP).  A privately owned computer connected to the campus network that serves web pages over the Internet is considered an LLS Web Server for purposes of this Policy.

    Campus Network: the physical and virtual networks, both hard-wired and wireless, that connect two or more devices of LLS IT Facilities. This includes intercampus network connections between LLS and facilities located at Loyola Marymount University. It also includes the Law School's connection to its Internet service provider (ISP), currently Los Angeles Regional Network (Los Nettos).

    User: any person, including faculty, students, staff, guests, concessionaires, vendors, and licensees, using LLS IT Facilities.

    Codes of Conduct: requirements or restrictions contained in the Faculty Handbook, Student Handbook, or Departmental Manuals.

  2. Prohibited & Discouraged Uses

    Except as noted below, Loyola Law School does not impose content restrictions on the use of LLS IT Facilities.  LLS also respects the privacy of users, and expects them to do so for others.  Users are advised, however, to exercise good judgment in selecting content where access might be shared or available to others.  Users are further advised that the LLS Information Technology Department (ITD) performs routine statistical monitoring of Internet access to maintain an efficient gateway to the Internet for all users.  Particular sites, or species of sites, that are heavily used, may be flagged for analysis purposes.  Users should also be aware that computers used to connect to the Internet retain traces of Internet usage (e.g., "cookies," "cached" copies of images and files).  Often, these traces can be retrieved by trained technicians even if the user takes precautions, such as deleting downloaded files.
    1. The following uses of LLS IT Facilities are prohibited:
      1. Any use constituting a crime.
      2. Any use that would make the user or LLS liable in a civil action, or that could adversely affect the Law School’s eligibility for any grant, certificate, status, waiver, or benefit.
      3. Any use related to a violation of applicable codes of conduct including classroom usage that disrupts instruction or the ability of others to learn.
      4. Any fraudulent or deceptive use.
      5. Violating terms of applicable software purchase, licensing, or acquisition agreements or infringing any patent, copyright, trademark, or other intellectual property right.
      6. Publishing, altering or deleting code, content, or data without appropriate authorization.
      7. Publishing defamatory, scandalous, illegal, harassing, threatening, intimidating, or unlawfully obtained matter, or matter provoking violence.
      8. Willfully transmitting damaging agents (e.g., computer viruses, trojan horses, worms) or otherwise willfully damaging or disrupting any computer facility, software, or data.
      9. Willfully accessing or attempting to access protected data, files, web pages, or computers (wherever located) without appropriate access rights.
      10. Any attempt to circumvent security measures including, but not limited to, bypassing normal login methods and attempting to connect to restricted areas of the network.
      11. Willfully performing an act that is likely to interfere with the operation of computers, terminals, peripherals, or networks.
      12. Willfully wasting/overloading computing resources such as maintaining open connections or downloading large multimedia or other bandwidth intensive data for entertainment or other uses not directly related to Law School activities.
      13. Willfully acting in such a manner as to bring disrepute to Loyola Law School, or any of its faculty, students, staff, or others.
      14. Willfully publishing or displaying material that injures or invades the privacy of others.
      15. Willfully attempting to intercept or analyze data exchanges that occur over the Law School network.
      16. Setting up or maintaining private servers on campus without explicit written permission from ITD.
      17. Attaching wireless access points to the network
      18. Unauthorized experimentation with computer facilities and software.
      19. Any use specifically prohibited by the Dean or his or her designee after written notice. 
    2. The following activities relating to e-mail sent, received, or routed through LLS IT Facilities are prohibited:
      1. Willfully intercepting, altering, copying, disclosing, or deleting e-mail, except with the permission of the sender or recipient, or as authorized by law.  [This policy also applies to the administration of e-mail accounts and network systems by ITD, with the understanding that certain administrative functions may entail inspection, rerouting, archiving and maintenance of e-mail files, which shall be accomplished with the least amount of intrusion possible.]
      2. Sending e-mail using a false or misleading identity, or under another person’s name, for deceptive purposes.  E-mail may be sent anonymously where it does not otherwise violate law or these policies.  E-mail names and aliases shall not be misleading or offensive.  A Loyola e-mail account holder has no proprietary interest in his or her e-mail name.  Loyola reserves the right to rescind or reassign a user name.
      3. Illegal, harassing, threatening, or intimidating matter, or matter provoking violence.
      4. Pyramid schemes, chain letters, and mass mailings (“spam”).
      5. Personal e-mail accounts may not be shared or used by persons other than the account holder.  Personal passwords may not be given to others.
      6. E-mail sent via Loyola IT Facilities may carry the imprimatur of Loyola Law School (because of titles, return addresses, Internet routing protocols, etc.).  All such e-mail must refrain from misleading readers into believing that it represents official business or positions of the Law School, unless it does.
    3. The following uses of LLS IT Facilities are discouraged:
      1. Non-productive use of facilities.
      2. Excessive bandwidth-intensive activities such as large-scale transfers of digital video and audio over Internet connections.
      3. Excessive personal use of facilities.  The use of Loyola IT Facilities for purposes unrelated to Law School activities has the lowest priority, and shall yield to Loyola-related activities where necessary.
      4. The running of unusual scripts or other client-side applications.
      5. Any use inimical to the educational mission of the Law School.
    4. Commercial Use of LLS IT Facilities
      1. Commercial uses are prohibited where:
        1. They are unrelated to academic, professional or school activities (e.g., publishing, consulting, tutoring, secretarial services, work assignments, sale of used books);
        2. They impose burdensome demands on LLS IT Facilities;
        3. They are the dominant feature or significant use of an LLS Computer Facility (other than specially designated facilities); or
        4. They are inconsistent with the use of .edu and .org top-level domain names.
      2. Loyola Law School may require that particular commercial uses be limited to designated areas or services (e.g., for-sale items on electronic bulletin boards).
  3. Enforcement and Sanctions
    1. Each person using LLS IT Facilities has a duty to read, understand and acknowledge these Acceptable Use Policies.
    2. Each person using LLS IT Facilities is responsible for his or her own use, and use by others where the person has permitted or enabled that use.  Each user shall report to the ITD any known or obvious violation of these policies by any person.
    3. LLS and Loyola Marymount University, their employees, contractors and agents, make no representations concerning the security and integrity of IT Facilities, data, e-mail or other traffic on their networks, or third-party devices.  Under no circumstances, shall they be liable for misuse or damage to users or third-parties.  Efforts LLS makes to protect the security and integrity of its IT Facilities is for the benefit of those facilities.  Users are advised to take proper precaution for their own equipment and information.  Support services provided by LLS to users shall impose no liability upon LLS.
    4. Violations of any of the policies contained herein may result in any or all of the following, depending upon the severity of the violation: (1) warning; (2) restrictions on access; (3) loss of access privileges; (4) disciplinary action consistent with applicable disciplinary rules and procedures, or pursuant to contract; or (5) referral to law enforcement authorities.
    5. Procedures
      1. The sanctions described in Paragraph 3 will be implemented consistent with applicable requirements of due process.
      2. If a use of LLS IT Facilities is suspected of compromising the physical or functional integrity of the facilities, or of interfering with the productive use of facilities by others, or of violating any use prohibited by Section II, the Dean or his/her designate is authorized to isolate and suspend the operation of the offending use until such time as the use can be investigated and remedial measures taken

These policies may be amended from time to time, and shall apply to uses of LLS IT Facilities as if contained herein. All amendments will be announced through normal distribution channels.