Information Technology

Network Usage Guidelines

Concordia Theological Seminary provides electronic resources and access to those resources for its students.  These resources include computers in Walther Library for word processing and accessing electronic resources on the campus intranet and the Internet.  Also included are data ports in the seminary dormitories and classrooms, as well as wireless access across most of the campus.  Because "Concordia Theological Seminary exists to form servants in Jesus Christ who teach the faithful, reach the lost, and care for all," the priorities for use of computing resources at the seminary are the following:


Highest Uses that directly support the educational, research,and service missions of the seminary.  In support of international students and missionaries studying at the seminary, some activities, such as use of email, are considered in this priority, instead of in the following "medium" priority.
Medium Other uses that indirectly benefit the education, research, and service missions of the seminary, as well as and including reasonable and limited personal communications.
Lowest Recreation, including game playing.
Forbidden All activities in violation of applicable Federal, State, or local laws, as well as activities not in accordance with good Christian behavior.

The seminary may enforce these priorities by restricting or limiting usages of lower priority in circumstances where their demand and limitations of capacity affect or threaten to affect usages of higher priority.

Implied Consent

Each person with access to the seminary's computing resources is responsible for their appropriate use and by his use agrees to comply with all applicable seminary and departmental policies and regulations, and with applicable City, State and Federal laws and regulations, as well as with the acceptable use policies of affiliated networks and systems.

General Standards for the Acceptable Use of Computing Resources

In using the seminary's computing resources, students and those associated with the seminary will display responsible civil and Christian behavior.  It is expected that each individual will use good moral judgment in conducting himself in the use of the computing resources. Violations of these general standards will be handled by departmental policies and procedures. The examples which follow are not exclusive, but are only indicative of the standards which the seminary expects in the use of its computing resources. As citizens of (or residents in) the United States, the users of the seminary's computing resources:

  • must respect property right laws, especially copyright laws, in the use of software. Illegal copying of copyrighted software or of textual material is not permitted, since it is against the law. In addition, it is a violation of the seventh commandment regarding stealing.
  • must respect laws regarding the creating, displaying or transmitting of threatening, racist or harassing materials. Material which may be protected by federal law, but violates Christian ethics because it tends to injure or bear false witness (violations of the fifth and eigth commandments) is not permitted.
  • must respect laws regarding obscenity and child pornography. Because behavior governed by the sixth commandment is much broader than applicable laws, however, seminary users are expected to avoid the display of any site which might be considered obscene or pornographic.

Network Setup and Access

Please refer to the following document for an explanation of your CTSFW sign-ons.
Understanding your CTSFW Sign-ons

Seminary-owned computers are available for you to access the Internet and your various accounts in the following locations:

  • The Library

Personal Computers

If you would like to use a personal computer on the campus network, you must first have your computer setup by the IT office. This can include the installation of the campus-approved anti-virus software, if you so desire., as well as granting access to the wired and wireless networks across campus.


Click Here and fill out the setup request form to setup your computer for network access


Wireless Network Availability

Wireless access is available in all public spaces (classrooms, library, Commons, etc.).  Your laptop must be configured by IT to access the wireless network.  *Your wireless network must support WPA-PSK network authentication.