(310) 782-4987

Call Us Now

Computer User Agreement Policy

Reed College`s IT resources are provided by all reed students, teachers and staff. Alumni and other individuals may use computer facilities with special permission to be university guests. All authorized persons wishing to use computer resources must read and accept this agreement and must follow the acceptable computer usage guidelines described below. Parental Contract (to be signed by parents of all students under the age of 18) The college respects everyone`s right to privacy and takes steps to prevent unauthorized access to electronic devices stored or transmitted through university computers or networks. However, the college reserves the right, in some cases, to review these materials at its sole discretion; z.B. in the event of a possible violation of a university law or policy. CIS staff may not at any time verify the contents of an email or other user files in response to a third-party access request, unless ordered by the Chief Information Officer, a senior College official or a college legal counsel. In cases where an application is made as part of an eDiscovery process, the above response is governed by the Reed College eDiscovery guidelines. The purpose of this directive is to protect [organization`s name] electronic information from the accidental compromise of authorized personnel through a telephone connection.

Reed prohibits the illegal use of copyrighted material. In accordance with the provisions of the Digital Millennium Copyright Act (DMCA), the College is committed to responding to legitimate inquiries. Reed does not protect or defend a user against any criminal investigation or legal action resulting from a deliberate copyright infringement. (For more information, see Reed`s copyright policy and the Reed Library Copyright – Fair Use website.) I, I, have read and understood the above-mentioned legal provisions and restrictions as well as other guidelines relating to the use of college computing resources referred to in this Memorandum of Understanding. As far as I know, the agreement includes all of the college`s computer resources as well as remote computing resources accessible through the college`s electronic communications equipment. Copyright violations and unauthorized access to digital material can lead to legal action. The use of illegally copied software or other materials undermines Reed`s ability to negotiate cheap software agreements and can take legal action against the user and the university. Passwords are used for different purposes under [organization name]. Some of the most common uses include user-level accounts, web accounts, email accounts, screen protection, voicemail, and local router requests. Since very few systems support unique tokens (i.e.

dynamic passwords that are used only once), everyone needs to know how to choose secure passwords. Any staff member who is found to have violated this directive may be disciplined, including termination of the employment relationship. Stolen or damaged computers: under certain circumstances, teachers and staff may charge a fee in the event of loss, theft or irreparable damage to computer equipment provided by the college. A policy describing the details of possible employee liability is available on the Internet at: pass pass phrases are generally used for authentication with public and private keys. A public/private key system defines a mathematical relationship between the public key, known to all, and the private key, which is known only by the user.