Policies & Compliance

Home/Policies

Acceptable Use Policy

Last Updated: January 11, 2026

Purpose

This Acceptable Use Policy establishes guidelines for appropriate use of Elevate for Humanity's technology resources, learning platforms, equipment, and services. These guidelines protect our community, ensure system security, and maintain a productive learning environment for all users.

Scope

This policy applies to:

  • All students, staff, instructors, and authorized users
  • Learning management system (LMS) and online platforms
  • Computer labs, equipment, and devices
  • Internet and network access
  • Email and communication systems
  • Software, applications, and digital resources
  • Physical facilities and equipment

Acceptable Uses

Educational Activities

Technology and resources may be used for:

  • Completing coursework, assignments, and assessments
  • Accessing learning materials and educational content
  • Participating in online classes and discussions
  • Conducting research related to your program
  • Communicating with instructors and classmates about coursework
  • Accessing career services and job placement resources

Professional Development

Authorized uses include:

  • Building professional portfolios and resumes
  • Searching for employment opportunities
  • Networking with industry professionals
  • Accessing certification and licensing resources
  • Participating in professional development activities

Administrative Activities

Appropriate administrative uses:

  • Accessing student records and account information
  • Submitting required documentation and forms
  • Communicating with administrative staff
  • Managing enrollment and financial aid
  • Scheduling appointments and services

Prohibited Uses

Illegal Activities

Strictly prohibited:

  • Accessing, storing, or distributing illegal content
  • Pirating software, media, or copyrighted materials
  • Hacking, cracking, or unauthorized system access
  • Identity theft or fraud
  • Cyberbullying, harassment, or threats
  • Any activity that violates local, state, or federal law

Security Violations

Prohibited security activities:

  • Sharing passwords or login credentials
  • Accessing another user's account without permission
  • Attempting to bypass security measures
  • Installing unauthorized software or applications
  • Connecting unauthorized devices to the network
  • Downloading or distributing malware, viruses, or malicious code

Inappropriate Content

Do not access, create, or distribute:

  • Pornographic or sexually explicit material
  • Hate speech or discriminatory content
  • Violent or graphic content
  • Content promoting illegal activities
  • Spam, chain letters, or unsolicited advertising

System Abuse

Prohibited system activities:

  • Excessive use that degrades system performance
  • Monopolizing resources (bandwidth, storage, equipment)
  • Running unauthorized servers or services
  • Cryptocurrency mining or similar resource-intensive activities
  • Deliberately introducing system vulnerabilities
  • Interfering with other users' access or work

Commercial Activities

Unauthorized commercial uses:

  • Operating a business using our resources
  • Selling products or services to other users
  • Advertising or promoting commercial ventures
  • Using resources for personal financial gain
  • Fundraising without prior authorization

User Responsibilities

Account Security

Users must:

  • Keep passwords confidential and secure
  • Use strong, unique passwords
  • Log out when finished using shared computers
  • Report suspected security breaches immediately
  • Not share accounts or allow others to use your credentials

Equipment Care

When using equipment:

  • Handle all equipment with care
  • Report damage or malfunctions immediately
  • Do not remove equipment from designated areas
  • Do not eat or drink near computers or equipment
  • Leave workstations clean and organized
  • Follow all posted rules and instructions

Respectful Use

Maintain a respectful environment:

  • Respect others' privacy and personal space
  • Keep noise levels appropriate for the environment
  • Be considerate of others waiting to use resources
  • Follow time limits on shared equipment
  • Communicate professionally in all online interactions

Monitoring and Privacy

Elevate for Humanity reserves the right to monitor use of technology resources to:

  • Ensure compliance with this policy
  • Maintain system security and performance
  • Investigate suspected violations
  • Comply with legal requirements
  • Protect the safety and rights of our community

Users should have no expectation of privacy when using institutional technology resources. All activity may be logged and reviewed.

Consequences for Violations

Minor Violations

  • Verbal or written warning
  • Temporary suspension of access (1-7 days)
  • Required meeting with IT or administrative staff
  • Mandatory technology use training

Serious Violations

  • Extended suspension of access (1-6 months)
  • Academic probation
  • Financial responsibility for damages
  • Referral to Student Conduct Committee
  • Possible program suspension

Severe Violations

  • Permanent revocation of access privileges
  • Dismissal from program
  • Legal action and law enforcement referral
  • Financial liability for all damages and costs
  • Permanent ban from all facilities and services

Reporting Violations

Report suspected policy violations or security concerns:

  • Email: Contact Us
  • Phone: (317) 314-3757
  • In-Person: IT Help Desk or Administrative Office
  • Anonymous: Use the online reporting form in student portal

Technical Support

For technical assistance or questions about acceptable use:

  • IT Help Desk: our contact form
  • Phone: (317) 314-3757 ext. 2
  • Hours: Monday-Friday, 8:00 AM - 6:00 PM EST
  • Location: Main Campus, Room 105

Policy Updates

This policy may be updated to reflect changes in technology, legal requirements, or institutional needs. Users will be notified of significant changes via email and the student portal. Continued use of technology resources constitutes acceptance of policy updates.

Questions about our policies? Contact us at our contact form