Jan 15, 2025  
2023-2024 Student Handbook 
    
2023-2024 Student Handbook

Information Technology



The Office of Information Technology (IT) oversees the maintenance of college owned computers and printers. Computer labs are available in the Holden Center, Lincoln Library, and Garfield Center. Rooms in the Residence Halls are equipped with a wireless access point and two ethernet ports. Any attempt to remove an access point from the wall is prohibited. Students who damage an access point may be fined for any damages. Residences off of the main campus (Founders) are exclusively wireless. Printers are available in all labs: black and white prints are .03 per page, and the color is .30 per page. At the beginning of every semester, students are given $7.50 in printing funds. Whatever remains of the given $7.50 at the end of a semester will not carry over to the following semester. Students may add additional funds to their printing balance at the Cashier's office. To report a technical problem, please utilize the Help Desk (https://service.lec.edu). Individuals using the Lake Erie College computer network without authority or in excess of their authority are subject to having all of their activities on this system monitored and recorded by system personnel. Users understand that usage of the Lake Erie College network may be monitored and agree to such monitoring. If the monitoring reveals possible evidence of criminal activity, system personnel may provide this evidence to law enforcement officials. In addition, any violation of policy set by the Office of Information Technology may result in account lockout or a loss of computer and network privileges.

Computer System Use Policy

When you are granted access to a shared computer or network system, you become part of a community. The Lake Erie College system user policy applies to anyone who uses a computer or network resource. Violations to this policy may include, but are not limited to:

  1. Use of another person’s User ID/email credentials.
  2. Allowing another person to access your account or sharing your password.
  3. Attempt to circumvent or subvert system or network security measures.
  4. Engage in any activity that might be harmful to systems or to any information stored thereon, such as creating or propagating viruses.
  5. Attempt to add, modify or damage files or data on any College computer; make any unauthorized deletions of files or data on any College computer; damage, move or modify computer equipment or degrade system performance.
  6. Attempt to gain unauthorized access to local or remote computers.
  7. Use College Computing resources for private profiting of any type
  8. Make illegal copies of copyrighted software, published materials or music, store such copies on College systems, or transmit them over college networks.
  9. Intentionally impede the legitimate use of computing facilities by other people.
  10. Use Email to harass, intimidate, or otherwise annoy another person.
  11. Use facilities, including printers, for junk mail or mass mailings.
  12. Waste computing resources, including printing excessive amounts of paper.

In Addition:

  1. Email should be read, responded to, and deleted in a timely manner.
  2. Users who will not return to Lake Erie College during the next school semester will continue to have access to their email, documents, and account for no more than 60 days. After that time all data, including the student user account, will be removed from the system.
  3. Students who graduate from Lake Erie College and are enrolled in the Password Portal system may continue to access their accounts indefinitely. Graduated students may be required to update password information in order to maintain account access
  4. In addition, any violation of these rules set from by the Lake Erie College IT department may result in account lockout or a loss of computer and network privileges.

Computer programs, executable files, audio/video files, and large graphic files may not be stored on a computer hard drive unless approved by the I.T. department. System administrators reserve the right to delete these files without notice along with any files that were obtained or used in a violation of the law.