Computing & Information Services
Computing Planning & Policies
Governance and Planning
Information technology governance may be viewed as a three-tier hierarchy consisting of strategies, policies, and operations.
A comprehensive strategic plan for information technology is developed every five years. The 2009-2014 strategic planning process is currently underway.
Policies
Policies governing the use of Reed's technology resources are developed by the Computing Policy Committee (CPC). The purpose of these policies is to help ensure that students, faculty, staff, and other members of the Reed community have maximum access to computers and network services and are aware of the rights and responsibilities associated with computer usage.
The Web Coordinating Committee (WCC) handles operational issues related to the reed.edu domain. Examples of concerns that the WCC manages include proposed structural and navigational changes to the Reed website, issues related to marketing on the website, and the integration of social media or other evolving forms of web-based communication. When policy changes or questions arise that are beyond the scope of the WCC, the committee will pass those to the Computing Policy Committee for discussion, decision, or direction.
User Agreement
Computer User Agreement
Procedures for Handling Violations of the User Agreement
Reed's Response to Copyright Infringement Claims
Web & Copyright Policies
Reed College Web Policy Home Page
Reed's web policy
Student body web server policy
Web privacy policy
Other Computing Policies
Account Creation and Termination
Cloud Computing Policy
Computer Theft, Loss or Damage
Computers for Student Organizations
Computing Allocation Policy
Computing Equipment Retrieval
Copyright law, file sharing, and the DMCA
Copyright Guidelines for Using Digital Materials in Courses
eDiscovery Guidelines
Electronic Data Backup and Retention
Email Address Policy
eReader Policy
Emeriti policy
Mass Mailing Policy
New Technology Adoption Guidelines
Remote Desktop User Support
Security/confidentiality agreement (PDF) for 3rd party (contractor) access to Reed's sensitive or confidential electronic data
Support for Third Party Printers and Peripherals
Virtual Private Network (VPN) Policy
Electronic Data Security - Incident Response Plan
InCommon Participant Operational Practices (POP)
HEOA P2P File Sharing Requirements Compliance