
Life Time Work Policies
For all of Life Time's Policies: Life Time Guest and Club Policies
If you are seeking addition information regarding getting started, technical support, the Life Time Work team, Life Time Work amenities and storage, please refer to our Life Time Work Handbook.
General Policies
Guest Policies
- You may host two guests for two hours at a time. If you would like to host groups (more than two people for longer than two hours), you may book a conference room to accommodate your guests for the duration of the meeting.
- Guests can visit Life Time Work one time per week without paying a guest fee. Should a guest wish to visit more than once per week, guest fees apply. Speak to your Life Time Work manager for details.
- Guests are required to check in using the electronic guest registration at the Front Desk. Once registered, you will be notified of your guests' arrival and asked to receive them at the Life Time Work Service Desk.
- Outside of Life Time Work's Service Desk hours (Monday-Friday, 9am-5pm), members will be asked to receive their guests at the building front entrance.
- You are responsible for your guests while at Life Time Work, and you should always accompany them while on the Life Time Work premises.
Access Cards and Keys
- Each Life Time Work member receives a health club membership card to access the club and an RFID fob to access the Life Time Work space.
- Office Residents receive the above and an office key.
- Open Resident restricted area can be accessed with a key fob.
Replacing Keys
- One complimentary membership card can be ordered if the club card gets lost. Each additional card is $5.
- If an Office Resident loses an office key, the first key replacement is complimentary, the second replacement is $25.
- To replace the RFID key fob, the first and any following incidences are $25 per key fob.
Equipment Checkout
- Life Time Work offers a variety of chargers, adapters, cords and other technology resources available for checkout at the Service Desk.
- All equipment is available on a first-come, first-served basis. Please see the Life Time Work Service Desk for availability and to initiate checkout.
- All equipment must be returned by 5pm the day you check it out.
- Once an item has been checked out to you, you are responsible for the equipment.
- When returning equipment, borrowers must hand deliver the item to a Life Time Work staff member at the Service Desk. We ask that you do not leave equipment if the desk is unattended.
- A staff member will check the equipment’s condition before completing the check-in process. Until the item is checked in, the borrower remains responsible for the equipment.
Member Usage Agreement
- Life Time is not an agent for service of process. All Life Time Work members agree and acknowledge that Life Time is not an agent for service of process. To the extent Life Time permits members to use its address as an amenity or that Life Time offers to accept mail as a service, such amenity or service shall constitute a Use of Life Time’s Premises and Services pursuant to the Member Usage Agreement. Members agree that Life Time is not responsible for any lost or mislabeled mail and service of process. Members further understand that you are responsible for forwarding your mailing address, and that Life Time is not responsible for forwarding or holding your mail upon your termination or expiration of your membership. Life Time can only accept packages that do not exceed 24” x 24”.
- All mail, prior to delivery to a member, will be logged and stored securely in a locked drawer/cabinet behind the Service Desk or in the Life Time Work Manager’s office. Members will be alerted to incoming mail by email and asked to collect it at the Service Desk.
Printing Policy
All memberships include a generous free allocation of printing credits every month. Additional charges will apply after exhausting your free allocation. Charges will appear on the first month’s charge for previous-month usage. At the end of the billing cycle (calendar month), unused printing credits do not roll over. These credits have no cash value; there are no refunds or transfers for unused quotas.
Quota Allocations
All members of Life Time Work will receive 800 printing credits (“paper sheets”) every month. A “paper sheet” consists of a single piece of paper, printed single or double sided. As such, members can choose an environmentally friendly and cost-effective printing option by selecting double-sided (duplex) printing.
- Allocation of credits is debited when you release your job at the printer.
- If members run out of credits in the middle of a print job, you will be charged for the remaining pages.
- Members will receive an email alerting you when you are approaching the end of your monthly allocation of credits. Note: the email alert will come from PaperCut, our printing system.
- Once the maximum monthly allocation of credits has been reached, further notifications will be sent for each additional 100 pages beyond the base allocation.
- There is no cash value to the printing quota. At the end of the quota cycle, any remaining free quota is deleted; there are no refunds or transfers for unused quotas.
- Quotas are subject to change.
Paid Printing
After members have exceeded the allocated quota, you will be charged $0.10 per sheet.
Technology Policies
Wifi Policies
Speed
Life Time Work is pleased to provide secure, high-speed WiFi to our members. While our network is capable of reaching speeds of up to 940 mbps, the speed you will experience varies based on your device's age, model, configuration, content provider, network congestion and other factors. Please note: speeds through a hardwired connection are inherently faster than speeds over WiFi due to potential wireless interference. Please see our WiFi addendum for more information on speed expectations and recommendations for optimal performance.
Usage
Life Time Work provides up to 1 TB of free WiFi per month included in the cost of membership. This limit applies to all uploaded and downloaded data for members. Less than 1 percent of our current members use over 1 TB of data over WiFi per month. With 1 TB of WiFi, you can:
- Stream between 600 and 700 hours of HD video
- Game online for over 12,000 hours
- Stream 15,000 hours of music
- Upload or download 60,000 hi-res photos
We understand that your business might require more than the allotted provisions. As such, Life Time Work charges $50 for WiFi usage that exceeds 1 TB in one month.
Network Management
Our goal is to provide a smooth experience and fair distribution of network resources to our community. As such, we proactively monitor the network to maintain optimal performance and to avoid congestion. Depending on the needs of our members and the network, Life Time Work has the right to manage the network to obtain optimal efficiency. This includes bandwidth limitations on high-end users, peer-to-peer blocking and website filtering to help keep the network healthy.
Acceptable Use Policy
Purpose 1.0
The technology resources at Life Time Work support the collaboration, research and administrative activities, and the use of these resources is a privilege that is extended to all members of the Life Time Work community. As a user of these services and facilities, you have access to valuable resources and to internal and external networks. Consequently, it is important for you to act in a responsible, ethical and legal manner.
In general, acceptable use means respecting the rights of other members, the integrity of the physical facilities and all contractual agreements. If an individual is found to be in violation of the Acceptable Use Policy, action will be taken including the restriction and possible loss of Life Time Work privileges. Individuals are also subject to federal, state and local laws governing many interactions that occur on the Internet. These policies and laws are subject to change as state and federal laws develop and change.
This document establishes specific requirements for the use of all computing, networking, facility resources at Life Time Work.
Scope 2.0
This policy applies to all members and guests using resources managed by Life Time Work. Individuals covered by the policy include (but are not limited to) Life Time Work members and guests, guests or agents of the Life Time Work, external individuals and organizations accessing network services via Life Time Work facilities.
Technology resources include all Life Time Work owned, licensed or managed hardware and software, and use of the facility network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
These policies apply to technology administered in individual and open Life Time Work space, personally owned computers and devices connected by wire or wireless to the network.
Your Rights and Responsibilities 2.1
Our goal is to provide a smooth experience and fair distribution of network resources to our community. As such, we proactively monitor the network to maintain optimal performance and to avoid congestion. Depending on the needs of our members and the network, Life Time Work has the right to manage the network to obtain optimal efficiency. This includes bandwidth limitations on high-end users, peer-to-peer blocking and website filtering to help keep the network healthy.
In turn, you are responsible for knowing the regulations and policies of Life Time Work that apply to appropriate use of Life Time Work technologies and resources. You are responsible for exercising good judgment in the use of all technological and information resources available at Life Time. Just because an action is technically possible does not mean that it is appropriate to perform that action.
Policy 3.0
Acceptable Use 3.1
- You may use only the computers, mobile devices, accessories, computer accounts and computer files for which you have authorization.
- You may not use another individual's account or attempt to capture or guess other users' passwords.
- You are individually responsible for appropriate use of all resources assigned to you, including the computer, the network address or port, software and hardware. Therefore, you are accountable to Life Time Work for all use of such resources.
- Life Time Work is bound by its contractual and license agreements respecting certain third-party resources; you are expected to comply with all such agreements when using such resources.
- You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing Life Time Work network and computing resources.
- You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
- You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
- You must not use Life Time Work computing and/or network resources in conjunction with the execution of programs, software, processes or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system.
- On Life Time Work network and/or computing systems, do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password “crackers,” vulnerability scanners, network sniffers, etc.)
Fair Share of Resources 3.2
Technology services, and other Life Time Work departments which operate and maintain computers, network systems and external hardware, expect to maintain an acceptable level of performance and must assure that frivolous, excessive or inappropriate use of the resources by one person or a few people does not degrade performance for others. The Life Time Work network, printing, shared space and other technology resources are shared widely and are limited, requiring that resources be utilized with consideration for others who also use them. Therefore, the use of any automated processes to gain technical advantage over others in the Life Time Work community is explicitly forbidden.
Life Time Work may choose to set limits on an individual's use of a resource through quotas, time limits and other mechanisms to ensure that these resources can be used by anyone who needs them.
Adherence with Federal, State and Local Laws 3.3
As a member of the Life Time Work community, you are expected to uphold local ordinances and state and federal law. Some Life Time Work guidelines related to use of technologies derive from that concern, including laws regarding license and copyright, and the protection of intellectual property.
As a user of Life Time Work computing and network resources, you must:
- Abide by all federal, state and local laws.
- Abide by all applicable copyright laws and licenses. Life Time Work has entered into legal agreements or contracts for many of our software and network resources, which require each individual using them to comply with those agreements.
- Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified and sent over the internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy and copyright infringement.
- Do not use, copy or distribute copyrighted works (including but not limited to web page graphics, sound files, film clips, trademarks, software and logos) unless you have a legal right to use, copy, distribute or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.
Personal and Private Rights 3.4
- All users of the Life Time Work network and computing resources are expected to respect the privacy and personal rights of others.
- Be professional and respectful when using computing systems to communicate with others. The use of computing resources to libel, slander or harass any other person is not allowed and could lead to action taken by Life Time Work as well as legal action by those who are the recipient of these actions.
While Life Time Work does not generally monitor or limit content of information transmitted on our network, it reserves the right to access and review such information under certain conditions. These include: investigating performance deviations and system problems (with reasonable cause), determining if an individual is in violation of this policy or, as may be necessary, to ensure that Life Time Work is not subject to claims of misconduct.
User Compliance 3.5
When you use Life Time Work technology and computing services you agree to comply with this and all other computing-related policies. You have the responsibility to keep up to date on changes in the Life Time Work environment, as published, via electronic and print mechanisms, and to adapt to those changes as necessary.
Bandwidth Use Policy
Purpose 1.0
This Acceptable Use Policy (“AUP” or “Policy”) describes actions by members that are prohibited by Life Time Work and its affiliates and subsidiaries. Members means any membership attendee or guest of any and all Life Time Work provided services (“Service” and/or “Services”) that are provided by Life Time Work pursuant to any applicable customer AGREEMENT, including, without limitation, any applicable terms of service and/or supplements to any applicable AGREEMENT(s) (which Users must accept as a condition to receiving any Services from Life Time).
This Acceptable Use Policy is subject to change from time to time with such changes effective upon posting. Life Time Work encourages members to review this Policy regularly: Life Time Guest and Club Policies
Scope 2.0
In using Life Time Work bandwidth via wired or wireless, the use/application is as follows:
- Use/application of bandwidth may be used only for lawful, proper and appropriate purposes.
- Members must use/apply any bandwidth only in a manner that, in Life Time’s sole discretion, is consistent with the purposes of such use and application. Users will not engage in any legal or illegal activity that either (i) harms Life Time Work, the network operated by Life Time Work, the Services and/or any members, or (ii) interferes with the network operated by Life Time Work and/or the provision or use of the Services by Life Time Work or any member.
- Use/application of bandwidth may not be used for illegal, improper and/or inappropriate purposes.
- Illegal purposes include, but are not limited to:
- using any Service to violate any law, rule or regulation
- engaging in threatening, abusive, harassing, defamatory, libelous, deceptive or fraudulent behavior
- Improper and/or inappropriate uses include, but are not limited to:
- Posting multiple messages similar in content to Usenet or other newsgroups, listservs, forums, email mailing lists or other similar groups or lists;
- Calling, messaging, storing, posting or transmitting harassing, threatening or abusive materials, email or information;
- Posting or transmitting any information or software that contains a virus worm, malware, or any harmful material.
- Without permission from Life Time Work, doing any of the following: (a) accessing the system or network, (b) monitoring data or traffic, (c) probing, scanning, and/or testing firewalls, (d) testing the vulnerability of a system or network or (e) breaching the security or authentication routines of a system or network.
- Conducting or forwarding surveys, contests, pyramid schemes, charity requests or chain letters.
- Relaying email in an anonymous fashion or forging any TCP-IP packet header
- Flooding, overloading, attacking or otherwise interfering with a system or network;
- Sending unsolicited calls, messaging, emailings (including, without limitation, commercial advertising and informational announcements) if such unsolicited activities could reasonably be expected to or do in fact provoke complaints;
- Operating a server in connection with the services in an “open relay” configuration (a configuration whereby a mail server processes email messages where neither the sender nor the recipient is a local user);
- Falsifying user or other identifying information provided to bandwidth or to other users of the services;
- Use of any Life Time Work bandwidth in violation or any trademark, copyright, or any other intellectual property protection law or provision, or AUP policy of any third party provider;
- Use of any Life Time Work bandwidth for the purposes of engaging in an activity in connection or conjunction with any pornographic and/or adult entertainment industry purpose, regardless of whether such activity is lawfully permitted;
- Auto-dialing or predictive-dialing over VIOP, such as Skype.
- Illegal purposes include, but are not limited to:
Hardware, Software and Media Policy
Purpose 1.0
This policy sets out the general rules for the use of Life Time Work hardware, software and media. Facility hardware, software, media is coordinated and managed by Life Time Work. Personal hardware, software and media use is the responsibility of each individual member in accordance with all Life Time Work policies and current laws.
Scope 2.0
This policy applies to all members and guests using hardware, software and media managed by Life Time Work. Personal hardware, software and media also fall under this policy to ensure accordance of Life Time Work policies and current law. Individuals covered by the policy include (but are not limited to) Life Time Work members and guests, guests or agents of Life Time Work, external individuals and organizations accessing either person or Life Time Work hardware/software.
Software and Media 3.0
- Software Licensing and Media 3.1
Most software and media purchased/leased by Life Time Work is obtained through our vendor and is likely to include restrictions on its use. Software and media licenses vary considerably in their terms and conditions so Life Time Work will check these carefully to ensure compliance at all times. It is a requirement of these agreements that Life Time Work keep centralized records of all installations of the product, including their location. These agreements also permit the software vendors and Life Time Work to undertake audits at short notice to confirm activation/registration.
All media and license keys will be kept and managed by Life Time Work. Members of Life Time Work are not permitted to obtain, make or create a copy of any media/license keys in possession of Life Time Work. Also, Life Time Work staff is not permitted to share, copy or create copies of media/license keys for public consumption. All media and license keys fall under Life Time Work software and media policy.
All software and media installed on Life Time Work hardware must have a current and appropriate type of license. Software and media without a license, pre-approval by Life Time Work or proof or purchase must not be installed on Life Time work hardware/mobile devices. A pre-authorization is required for any installation of software/media on Life Time Work equipment. See form SLM Auth 1 for details.
Life Time Work has the authority to restrict administrative rights and carry out software and media audits on all company-owned devices, both networked and standalone, to ensure unauthorized or unlicensed software is not installed. It is the responsibility of Life Time Work staff to inform I.T. of any changes to material use of licensed and media software that may result in change of licensing agreement. If software or media is moved from one machine to another, Life Time Work staff must be informed to ensure that records are kept up to date. - Software and Media Standardization 3.2
Life Time Work will keep under review and approve the list of core software/media which will deploy to all staff and members. A published list of software and media will be available at Life Time Work with a copy for members by request only. - Software and Media User Documentation 3.3
Life Time Work will only provide user documentation that is licensed with the software/media provided. Where printed materials are not provided by software vendors, Life Time Work will help to provide access to online user materials. Life Time Work preserves the right to limit replication of printed materials due to limitations in such replication (Ex., printing 500-page instructional booklet). If printed user materials are needed Life Time Work will follow license agreement provided by software/media vendor. - Member Software and Media Standardization 3.4
All members software/media regarding licensing, activation, replication, deploying, and maintaining falls under policies agreed by the members per their own individual agreement. Life Time Work does not maintain, support, activate or replicate any software/media that does not fall under our own personal licensing agreement. Any support of such action must receive pre-approval and authorization (see form CSMR 1).
Hardware 4.0
- Hardware Use and Maintenance 4.1
Hardware use and maintenance will be supported by Life Time Work on all company owned/leased equipment. This shall include applications and systems that are subject to their own proprietary maintenance and upgrade policies. Service, maintenance and support shall be properly staffed and managed through a ticket management system and help desk within Life Time Work. Members will be notified of any prolonged delays in hardware maintenance and repair.
Members and guests in use of Life Time Work hardware agree to member hardware use policy (see form CHUP 1). Use of hardware includes all desktop, laptop, mobile, visual, accessories, adapters and peripherals. An in-use guide will be posted at Life Time Work with a standard guide also available by request. Members also agree to report any hardware and software issues while in use/possession of equipment. - Hardware Use Requirements 4.1.2
In general use of hardware, Life Time Work use requirements are as follows:- Life Time Work hardware, including desktop, accessories, mobile and peripherals, must be safeguarded from damage, abuse, loss and degradation of capacity due to inappropriate use.
- No person shall load computer games, screen savers or background software onto Life Time Work hardware.
- No person shall remove Life Time Work desktop, mobile, accessories, peripheral equipment or documentation (e.g., computer or software manuals) from Life Time Work premises without express permission from the Life Time Work Manager.
- No person shall, for personal use, copy software, data, files, etc., using hardware owned by Life Time Work without the express written permission by the Life Time Work Manager.
- Computer viruses, defective programs and corrupted data pose a threat to Life Time Work hardware, including the potential to damage or degrade entire networks. As a result of this risk:
- No person shall use on Life Time Work hardware a computer file from a non-verified source without first scanning the file for viruses, including files received from external agencies or taken from an employee’s personal computer.
- No person shall install or copy personally owned or licensed files or programs to Life Time Work owned hardware without the approval of the Director of the Information Systems Department or designee.
- Members using Life Time Work hardware that requires a login must be assigned a guest user account. By no means shall a non-Life Time Work employee be given full administrative access to hardware without the written permission of the Life Time Work Manager.
Network Connection Policy
Purpose 1.0
The purpose of this policy is to define the standards for connecting computers, mobile devices or other devices to the Life Time Work network. The standards are designed to minimize the potential exposure to Life Time Work and our community from damages (including financial, loss of work, and loss of data) that could result from computers and mobile devices that are not configured or maintained properly. Ensuring devices on the network are not taking actions that could adversely affect network performance. Life Time Work must provide a secure network for our members and guests for their technology needs. An unsecured computer on the network allows denial of service attacks, viruses, Trojans and other compromises to enter the Life Time Work network, thereby affecting many computers as well as the network's integrity. Damages from these exploits could include the loss of sensitive and confidential data, interruption of network services and damage to critical Life Time Work internal systems.
Scope 2.0
This policy applies to all members, guests and visitors of Life Time Work who have any device connected to the Life Time Work network, including, but not limited to, desktop computers, laptops, servers, wireless computers, mobile devices, specialized equipment, cameras and telephone system components.
Policy 3.0
- Appropriate Connection Methods 3.1
You may connect devices to the Life Time Work network at appropriate connectivity points including voice/data jacks, through a wireless network, via a VPN or SSH tunnel, or through remote access mechanisms such as DSL, cable modems and traditional modems over phone lines.
Modifications or extensions to the network can frequently cause undesired effects, including loss of connectivity. These effects are not always immediate, nor are they always located at the site of modifications. As a result, extending or modifying the Life Time Work is not permitted without the written permission of management. - Network Registration 3.2
Life Time Work members will be required to authenticate when connecting to our network. Members will use network passwords to connect to our Wireless network. Connecting to our wired network may include installing an agent to authenticate membership with Life Time Work. The role of such an agent would be to audit membership and compliance of the acceptable use policy.
Life Time Work maintains a database of unique machine identification, network address and owner for the purposes of contacting the owner of a computer when it is necessary. For example, Life Time Work would contact the registered owner of a computer when his or her computer has been compromised and is launching a denial of service attack or if a copyright violation notice has been issued for the IP address used by that person. - Responsibility for Security 3.3
Every computer or other device connected to the network, including a desktop computer, has an associated owner (e.g., a Life Time Work member who has a personal computer) or caretaker (e.g., a staff member who has a computer in her office). For the sake of this policy, owners and caretakers are both referred to as owners. Owners are responsible for ensuring that their machines meet the relevant security standards and for managing the security of the equipment and the services that run on it. Every owner and guest should know who is responsible for maintaining his or her machine(s). - Security Standards 3.4
These security standards apply to all devices that connect to the Life Time Work network through standard ports and wireless services.
- Owners must ensure that all computers and other devices capable of running anti-virus/anti-malware software (or other appropriate virus protection products) have it installed and running. Owners should update definition files at least once per week.
- Computer owners must install the most recent security patches when necessary. Where machines cannot be patched, other actions may need to be taken to secure the machine appropriately.
- Owners of computers that contain sensitive data should apply extra protections. Life Time Work will provide consultations on request to computer owners who would like more information on further security measures. For instance, individuals who are maintaining files with Social Security information or sensitive personal information should take extra care in managing their equipment and securing it appropriately.
- Protection of Network 3.5
Life Time Work uses multiple methods to protect network and member data, including:- monitoring for external intruders
- scanning hosts on the network for suspicious anomalies
- blocking harmful traffic
Life Time Work reserves the right to take necessary steps to contain security exposures to the Life Time Work environment and or improper network traffic. We will take action to contain devices that exhibit the behaviors indicated below, and allow normal traffic and central services to resume.
- imposing an exceptional load on Life Time work network environment
- exhibiting a pattern of network traffic that disrupts centrally provided services
- exhibiting a pattern of malicious network traffic associated with scanning or attacking others
- exhibiting behavior consistent with host compromise
By connecting to the network, you acknowledge that a computer or device that exhibits any of the behaviors listed above is in violation of this policy and will be removed from the network until it meets compliancy standards.