top of page

LW Technology Resource Center Use Policy

Purpose

This policy is in place to ensure that all users of the Leisure World Technology Resource Center) (hereafter “the Center”) use any of its technology systems responsibly, ethically, and legally. It is designed to protect both users and the integrity of the Center's resources.

 

Scope

This policy applies to all individuals who access and use the computers, printers, networks, and any other technology resources within the Center, including residents, guests, volunteers, and staff.

General Guidelines

  1. Respectful Use
    Users must treat the equipment, software, and other users with respect. Abusive, threatening, or inappropriate behavior will not be tolerated.

  2. Time Limits
    Computer use may be subject to time limits during periods of high demand. Users are expected to comply with any time restrictions set by staff. Users may ONLY use the center’s resources while a volunteer is on duty.

  3. Accountability
    Users are responsible for all activity conducted under their name or session. If login credentials are required, sharing them is strictly prohibited.

 

Prohibited Activities

The following five types of activities are strictly prohibited while using any of the Center's technology systems:

1. Illegal or Inappropriate Use

  •  Accessing or distributing obscene, pornographic, or sexually explicit material.

  •  Engaging in any form of illegal activity, including hacking, piracy, or distribution of copyrighted materials.

  •  Using the systems for fraudulent activities or identity theft.

  •  Violating local, state, or federal laws.

2. Security Violations

  •  Attempting to bypass or disable security software, firewalls, or administrative settings.

  •  Introducing or spreading malware, viruses, or any form of malicious code or accessing unauthorized systems, accounts, data.

3. Misuse of Resources

  •  Excessive bandwidth consumption (e.g., streaming high-definition video for long periods). 

  •  Installing or modifying software without permission from authorized staff.

4. Harassment and Discrimination

  •  Sending harassing, threatening, or abusive emails, social media posts, or messages.

  •  Accessing or distributing materials that promote hate, violence, or discrimination.

5. Privacy Violations

  •  Attempting to access or intercept any or all private communications or data.

  •  Taking photos or videos or making voice recordings of others in the center without their  consent.

  •  Using shared systems to store or process sensitive personal information.

 

Email, Social Media, and Communication

Users may access personal email or social media accounts, provided their use complies with this policy. However:

  • Messaging or social networking must not disrupt others.

  • Offensive or disruptive communications are not allowed.

 

Data Privacy and Indemnification

  • The Center’s systems are private and shared. Users should not store sensitive or personal data on these systems.

  • All sessions are automatically cleared, and files deleted after logout.

  • The Center, including all volunteers and monitors, is not responsible for any loss of data, unsaved work, or corrupted files while using the Center's equipment.

  • By using the Center’s equipment, users agree to indemnify and hold harmless the Center, its staff, and volunteers from any claims arising from loss of data, device issues, or failure to provide support.

 

Printing

  • Printing is available for residents and their guests with a small fee per copy. Limits may apply to prevent abuse.

  • Staff and volunteers may assist with basic print-related tasks but are not responsible for formatting, data loss, or content review.

  • Users are expected to preview documents and verify accuracy before printing.

 

Accessibility

  • The Center is committed to supporting users with disabilities.

  • Basic accommodations such as screen magnifiers or larger fonts can be provided.

  • Users needing specialized accessibility support should contact the Center in advance.

 

Volunteer Monitoring

  • Staff and authorized volunteers may monitor usage to ensure compliance with this policy.

  • Monitoring may include periodic walk-throughs, software logs, or session history reviews.

  • This oversight is in place solely to protect the integrity and safety of the Center’s resources.

 

Personal Devices and Technical Assistance

  • Users may bring personal devices (e.g., laptops, tablets, smartphones, etc.) into the Center for assistance.

  • Volunteers and monitors may offer informal help but cannot guarantee successful results or issue permanent fixes.

  • Users are solely responsible for the security, configuration, and performance of their own devices.

  • The Center, its volunteers, and monitors shall not be held liable for any damage, data loss, misconfiguration, or performance issues related to such assistance.

 

Enforcement and Consequences

Violations of this policy may result in the following actions:

  • Immediate termination of the current session.

  • Temporary or permanent suspension of access to the Center and or its technology systems.

  • Reporting to law enforcement authorities for serious violations.

 

Policy Acknowledgment

By using any computer or device at the Leisure World Technology Resource Center, users acknowledge that they have read, understood, and agreed to abide by this Center Use Policy.

 

Questions or Concerns?

Please contact the volunteers at the Center’s reception desk or email us at leisureworld.tech@gmail.com for assistance or to report misuse.

Unique

Total

©2025 by LW Computer Center - DBA Leisure World Technology Resource Center. Proudly created with Wix.com

bottom of page