Library & Technology Services policies cover the appropriate use of library, computing, networking, and telecommunications resources at Lehigh University. All users of LTS facilities, resources, and technology are expected to be familiar with these policies and the consequence of violation.
Advisory Council for Information Services (ACIS) Policies
The Advisory Council for Information Services (ACIS) is an appointed body which is representative of the major academic and administrative divisions of the university. ACIS was created to advise the provost on campus policies relating to Library and Technology Services' (LTS) responsibilities. ACIS reviews and approves policies developed by Library & Technology Services staff. These policies are also circulated to the campus community for comment for a period of thirty days before they receive final ACIS approval and are then forwarded to the provost for adoption.
- Service Standards Policy
- Cyberinfrastructure Standards Policy
- Data Administration Policy
- Web Services
- User Accounts Security
- Acceptable Use of Computer Systems and Facilities
- Cloud Computing
- Desktop and Mobile Device Data Encryption
- Software Acquisition, Development, Upgrade and Distribution
- Information Security Policy
- Vendor Compliance Policy
For information about ACIS, please see LTS Governance - Advisory Council for Information Services (ACIS) (authentication required)
Other LTS Policies
- Privacy Policy
- Remote Access Policy
- Lehigh's Printing Policy
- Copyright Compliance
- Classification of Data
- Mobile and Communications Device Policy
- Lehigh Libraries Gift and Transfer Policy
- Policy on Posting Flyers/Posters/Ads in LTS Spaces
LTS Standards
The Library & Technology Services (LTS) adheres to a comprehensive set of operational standards. These standards encompass various critical areas, such as backups, cloud computing, incident response, and vulnerability management. By adhering to these operational standards within and outside of LTS, Lehigh demonstrates its commitment to maintaining the highest levels of security, reliability, and availability for its technology infrastructure.
For information about the LTS Standards, please see LTS Standards, Procedures, and Guidance (authentication required)