Acceptable Use Policy
Last Updated: January 11, 2026
Purpose
This Acceptable Use Policy establishes guidelines for appropriate use of Elevate for Humanity's technology resources, learning platforms, equipment, and services. These guidelines protect our community, ensure system security, and maintain a productive learning environment for all users.
Scope
This policy applies to:
- All students, staff, instructors, and authorized users
- Learning management system (LMS) and online platforms
- Computer labs, equipment, and devices
- Internet and network access
- Email and communication systems
- Software, applications, and digital resources
- Physical facilities and equipment
Acceptable Uses
Educational Activities
Technology and resources may be used for:
- Completing coursework, assignments, and assessments
- Accessing learning materials and educational content
- Participating in online classes and discussions
- Conducting research related to your program
- Communicating with instructors and classmates about coursework
- Accessing career services and job placement resources
Professional Development
Authorized uses include:
- Building professional portfolios and resumes
- Searching for employment opportunities
- Networking with industry professionals
- Accessing certification and licensing resources
- Participating in professional development activities
Administrative Activities
Appropriate administrative uses:
- Accessing student records and account information
- Submitting required documentation and forms
- Communicating with administrative staff
- Managing enrollment and financial aid
- Scheduling appointments and services
Prohibited Uses
Illegal Activities
Strictly prohibited:
- Accessing, storing, or distributing illegal content
- Pirating software, media, or copyrighted materials
- Hacking, cracking, or unauthorized system access
- Identity theft or fraud
- Cyberbullying, harassment, or threats
- Any activity that violates local, state, or federal law
Security Violations
Prohibited security activities:
- Sharing passwords or login credentials
- Accessing another user's account without permission
- Attempting to bypass security measures
- Installing unauthorized software or applications
- Connecting unauthorized devices to the network
- Downloading or distributing malware, viruses, or malicious code
Inappropriate Content
Do not access, create, or distribute:
- Pornographic or sexually explicit material
- Hate speech or discriminatory content
- Violent or graphic content
- Content promoting illegal activities
- Spam, chain letters, or unsolicited advertising
System Abuse
Prohibited system activities:
- Excessive use that degrades system performance
- Monopolizing resources (bandwidth, storage, equipment)
- Running unauthorized servers or services
- Cryptocurrency mining or similar resource-intensive activities
- Deliberately introducing system vulnerabilities
- Interfering with other users' access or work
Commercial Activities
Unauthorized commercial uses:
- Operating a business using our resources
- Selling products or services to other users
- Advertising or promoting commercial ventures
- Using resources for personal financial gain
- Fundraising without prior authorization
User Responsibilities
Account Security
Users must:
- Keep passwords confidential and secure
- Use strong, unique passwords
- Log out when finished using shared computers
- Report suspected security breaches immediately
- Not share accounts or allow others to use your credentials
Equipment Care
When using equipment:
- Handle all equipment with care
- Report damage or malfunctions immediately
- Do not remove equipment from designated areas
- Do not eat or drink near computers or equipment
- Leave workstations clean and organized
- Follow all posted rules and instructions
Respectful Use
Maintain a respectful environment:
- Respect others' privacy and personal space
- Keep noise levels appropriate for the environment
- Be considerate of others waiting to use resources
- Follow time limits on shared equipment
- Communicate professionally in all online interactions
Monitoring and Privacy
Elevate for Humanity reserves the right to monitor use of technology resources to:
- Ensure compliance with this policy
- Maintain system security and performance
- Investigate suspected violations
- Comply with legal requirements
- Protect the safety and rights of our community
Users should have no expectation of privacy when using institutional technology resources. All activity may be logged and reviewed.
Consequences for Violations
Minor Violations
- Verbal or written warning
- Temporary suspension of access (1-7 days)
- Required meeting with IT or administrative staff
- Mandatory technology use training
Serious Violations
- Extended suspension of access (1-6 months)
- Academic probation
- Financial responsibility for damages
- Referral to Student Conduct Committee
- Possible program suspension
Severe Violations
- Permanent revocation of access privileges
- Dismissal from program
- Legal action and law enforcement referral
- Financial liability for all damages and costs
- Permanent ban from all facilities and services
Reporting Violations
Report suspected policy violations or security concerns:
- Email: Contact Us
- Phone: (317) 314-3757
- In-Person: IT Help Desk or Administrative Office
- Anonymous: Use the online reporting form in student portal
Technical Support
For technical assistance or questions about acceptable use:
- IT Help Desk: our contact form
- Phone: (317) 314-3757 ext. 2
- Hours: Monday-Friday, 8:00 AM - 6:00 PM EST
- Location: Main Campus, Room 105
Policy Updates
This policy may be updated to reflect changes in technology, legal requirements, or institutional needs. Users will be notified of significant changes via email and the student portal. Continued use of technology resources constitutes acceptance of policy updates.