Contact Information

Information Technology Services

IIT Chicago-Kent College of Law
565 W. Adams St., Suite 540
Chicago, IL 60661
P: (312) 906-5300
F: (312) 906-5177

A A | Email | Print | Share

Computer Use Policy

The Chicago-Kent College of Law (CK) computer network consists of a campus-wide network, local area networks, and personal computers. The Information Technology Services department provides access to the network for CK students, faculty, and staff in support of the educational mission of the university. CK does not monitor or review material prior to transmission on university-owned networks.


All members of the community have the right to privacy in their electronic mail. Electronic communications are not secure and users must recognize that during the course of ordinary management of computing and network services, network administrators may view user files. In addition, if a user is suspected of violations of this policy or other university policies, or of criminal activity, that user's right to privacy may be superseded by CK's desire to protect members of the CK community and its commitment to maintain the network's integrity. Should a violation be reported, user files may be examined under the direction of ITS staff or other authorized personnel.


While unwanted or unsolicited contact cannot be controlled on the network, network users who receive threatening communications should bring them to the attention of the ITS, the appropriate network administrator, or the Office of Student Affairs. Users must be aware that there are many services on the internet that may be considered offensive to groups of users, and therefore, network users must take responsibility for their own navigation of the network.


Opinions expressed on the network may not be represented as the views of CK. Student users of the network are subject to the CK Code of Conduct set forth in the student handbook, as well as the policies on sexual harassment, unlawful discrimination, academic honesty, and other applicable policies. CK faculty and staff users are subject to all CK policies, including those prohibiting unlawful discrimination and harassment, and other disciplinary procedures as set forth in the CK Procedures Manual. All users are subject to applicable state and federal laws.


There are responsibilities that must be met as part of the privilege of network access. Network users are expected to live up to these responsibilities. A user who knowingly violates a network responsibility may have his/her network access suspended. It is the responsibility of the user to inquire about the appropriateness of an action or use prior to execution.

  • Users may not give anyone else access to their account.
  • Users may not use a CK computer account that was not assigned to them.
  • Users may not try in any way to obtain the password for another user's computer account.
  • Users may not attempt to disguise the identity of their account or the machine they are using.
  • Users may not represent themselves to be another user.
  • Users are responsible for the security of their passwords. This includes changing one's password on a regular basis and ensuring no one else knows it.
  • Users must not use CK computer resources to gain or attempt to gain unauthorized access to remote computers.
  • Users must not deliberately perform an act that will disrupt the normal operation of computers, terminals, peripherals, or networks. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed backbone network, otherwise blocking communication lines, or interfering with the operational readiness of a computer.
  • Users must not run or install on any of CK's computer systems, or give to another, a program that is intended to or likely to result in the eventual damage of a file or computer system and/or reproduction of itself. This includes, but is not limited to, the classes of programs known as computer viruses, bots, Trojan horses, and worms.
  • Users must not attempt to circumvent data protection schemes or exploit security loopholes.
  • Users must abide by the terms of all software licensing agreements and copyright laws, and may not make copies of or make available on the network copyrighted material, unless permitted by a licensing agreement.
  • Users must not perform acts which are deliberately wasteful of computing resources or which unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, distribution and/or redistribution of multimedia files, sending unsolicited bulk email (UBE), chain letters, creating unnecessary multiple jobs or processes, obtaining unnecessary output/printing or creating unnecessary network traffic.
  • Users must not attempt to monitor another user's data communications, nor read, copy, change, or delete another user's files or software without permission of the user.
  • CK computer resources are not to be used for commercial purposes.

The ITS and other appropriate CK authorities should be notified about violations of computer laws and policies, as well as about potential loopholes in the security of its computer systems and networks.

When violations are reported, network administrators may suspend network privileges pending investigation. Account holders will be notified as soon as reasonably possible.

If the violation involves a CK student, the ITS will refer the matter to the Office of Student Affairs. The Office of Student affairs may investigate the alleged violation and determine the sanction, or may refer the matter to the Campus Judicial Board for adjudication.

If a member of the staff or faculty commits the alleged violation, then the offense will be treated as misconduct under the appropriate section of the CK Procedures Manual or Faculty Handbook.

Violators of this policy may be denied access to the CK computer network, in addition to other applicable disciplinary procedures.