Office of Technology Services
| LSC-North Harris OTS
| LSC-North Harris Procedures
Confidentiality and Privacy
Lone Star College-North Harris takes reasonable steps to protect users from unauthorized entry into their accounts or files, whether by other users or by system administrators, except in instances where a system-related problem requires such entry. A limited number of authorized OTS personnel must occasionally monitor information on the network and/or computer systems to maintain the integrity of the systems. This access is required for reasons that include, but are not limited to, trouble-shooting hardware and software problems; preventing unauthorized access and system misuse; providing for the overall efficiency and integrity of the systems; protecting the rights and property of the College; ensuring compliance with software and copyright, distribution, assuring that computer systems meet college requirements for virus protection and operating system updates before connecting to the campus network, and other College policies concerning the use of the computer network; and complying with legal and regulatory requests for information.
System monitoring is a mechanism for keeping track of computer system activities, rather than a method for accessing private information. OTS personnel also take reasonable steps to prevent the dissemination of information concerning individual user activities. It is the policy of OTS to disclose neither the contents of electronic mail and data files stored in or transmitted via the Lone Star College System network nor the activities of individuals on the campus network to other individuals within or outside the College community in the absence of a court order, or other legal mandate, or permission of the owner.
Private communication via computer is treated with the same degree of protection as private communication in other media. However, due to limits of current technologies, which are inadequate to protect against unauthorized access, the confidentiality of e-mail and other system files can not be assured. All users should be aware of this and use reasonable caution when transmitting confidential materials.