User menu


Main menu


International Long Distance Rates

International rates and time periods apply to all campus users. International rates and times are in effect seven days a week. All times are shown in Eastern Standard Time (EST).
Calls to any location within the United States (including Alaska and Hawaii) are 9.5 cents per minute.

Local Telephone Calls

Lehigh offers an expanded local calling area for students, faculty and staff.

Calls to the following communities are all free: Allentown, Bath, Bethlehem, Catasauqua, Coopersburg, Easton, Emmaus, Hellertown, Ironton, Kutztown, Nazareth, New Smithville, New Tripoli, Northampton, Riegelsville, Slatington, Springtown, Topton, and Upper Black Eddy.

Forward Lehigh Email to a Different Email Account

You have the capability to forward email addressed to your Lehigh account to another account at Lehigh or to an account at another service provider (ISP). Certain communications which contain confidential information may be sent to your Lehigh address. If you set up automatic forwarding to another ISP, its confidentiality and delivery are not assured, and you accept the responsibility and the risks associated with doing so.

Computer User Space and Quotas

All users with Lehigh computing accounts potentially have access to different areas where they may store files, each with its own quota (shown below). Users can check their current disk usage these areas by pointing to and following the Display Account Info link.

Virus Hoaxes

While the Internet allows world-wide access to information, it also provides a means by which individuals can spread fear and doubt, often through computer virus hoaxes in electronic mail or newsgroups. A typical hoax warns that anyone reading email with a particular subject will release a computer virus which will destroy the files on the computer or even destroy the computer itself. It goes on to say that you should forward the message to as many people as possible to "warn" them too.

Never forward unconfirmed warnings to your friends!

Overpayment Scams & Internet Fraud

An unfortunate fact of life is that fraud is all around us; there is always someone trying to take advantage of someone else for his or her personal gain. The Internet is no different; people have been trying to perpetrate fraud over the Internet since its inception. The "Nigerian Letter" scam is sufficiently well known to make it into comic strips. Attempts at identity theft arrive almost daily in email (for additional details, see

Identifying Fraudulent Email (a.k.a 'Phishing')

Phishing is the practice of sending falsified emails with the aim of stealing personal information such as passwords, credit cards, or other sensitive data. Since the basic format of email is highly malleable and copyable, it's relatively easy to make a message look and sound official, and since email is used for many formal and official communications, it's possible to be duped into sharing information with the wrong people, or opening your computer to attack. It's also possible though, and often fairly easy, to spot a number of things that give away the fraud.

Encrypting / Securing Your Files

Faculty and staff members who work with sensitive data at Lehigh, such as confidential student personal or health records, staff personal or employment data (including performance appraisals), and employee identification numbers, should store this information securely on their workstation, laptop, or in a secure location on a network. Client Services recommends that sensitive data be stored on a secure network location (such as a user's H: Drive). In cases where sensitive data needs to be stored on a workstation or laptop, it is recommended that Whole Disk Encryption be used.

Securing Your Printer

With ever increasing sophistication, printers are becoming more computer-like every day. High-end printers effectively contain computers; with processors, lots of memory, and even disk drives, these printers need to be secured in a manner similar to typical computers. While the need to secure printers is aimed primarily at those printers which connect directly to a network, even printers connected directly to a desktop computer may be vulnerable (depending on any resource sharing which may be set up on that particular computer).

Securing Data and Devices

An unprotected computer or device that holds data is especially vulnerable to the destructive actions of unauthorized users who pose a threat to computer hardware and the information it contains. Cyber attacks, SPAM, identity theft, and the compromising of private information are just a few of these preventable consequences. LTS recommends you be proactive and take steps to secure your data and devices both on campus and off.


Subscribe to RSS - Staff