Computing & Information Services

Computing Planning & Policies

Governance and Planning

Information technology governance may be viewed as a three-tier hierarchy consisting of strategies, policies, and operations.

A comprehensive strategic plan for information technology is developed every five years.  The 2009-2014 strategic planning process is currently underway.

Policies

Policies governing the use of Reed's technology resources are developed by the Computing Policy Committee (CPC). The purpose of these policies is to help ensure that students, faculty, staff, and other members of the Reed community have maximum access to computers and network services and are aware of the rights and responsibilities associated with computer usage.

The Web Coordinating Committee (WCC) handles operational issues related to the reed.edu domain. Examples of concerns that the WCC manages include proposed structural and navigational changes to the Reed website, issues related to marketing on the website, and the integration of social media or other evolving forms of web-based communication.  When policy changes or questions arise that are beyond the scope of the WCC, the committee will pass those to the Computing Policy Committee for discussion, decision, or direction.

User Agreement

Computer User Agreement
Procedures for Handling Violations of the User Agreement
Reed's Response to Copyright Infringement Claims

Web & Copyright Policies 

Reed College Web Policy Home Page
Reed's web policy
Student body web server policy
Web privacy policy

Other Computing Policies 

Account Creation and Termination
Cloud Computing Policy
Computer Theft, Loss or Damage
Computers for Student Organizations
Computing Allocation Policy
Computing Equipment Retrieval
Copyright law, file sharing, and the DMCA
Copyright Guidelines for Using Digital Materials in Courses

eDiscovery Guidelines
Electronic Data Backup and Retention
Email Address Policy
eReader Policy
Emeriti policy
Mass Mailing Policy
New Technology Adoption Guidelines
Peer-to-Peer (P2P) File Sharing Policy
Remote Desktop User Support
Support for Third Party Printers and Peripherals
Virtual Private Network (VPN) Policy

Electronic Data Security - Incident Response Plan
InCommon Participant Operational Practices (POP)
HEOA P2P File Sharing Requirements Compliance