颁辞尘辫耻迟颈苍驳听
Computer resources at 黑料不打烊 are available to authorized
students, faculty, staff, and off-campus constituents. Access to these
resources is obtained from the Director of Technology Services. Access is
granted with the understanding that the resources will be used as stated in the
request and in keeping with the idea that one鈥檚 interest ceases when it invades
the rights of personal and/or institutional property, demonstrates a potential
for loss, creates the possibility for embarrassment or litigation to the
individual and/or institution, or because of an otherwise irresponsible use of
a limited resource. It is the policy of the Office of Technology Services to
avail these resources to as many users as possible and, to the extent possible,
keep the number of restraints and restrictions on the individuals to a minimum
consistent with the ability to provide service to all who request use.
For such a policy to work, it is essential that users observe
responsible and ethical behavior in the use of the resources. Proper computing
and networking use follows the same standards of common sense and courtesy that
govern the use of other public facilities. Improper use violates those
standards. Improper use is defined as: Any use of computing and/or networking
facilities or services that is unrelated to legitimate instructional,
research/creative activity, or administrative requirements; that interferes
with another鈥檚 legitimate access; that violates another鈥檚 intellectual property
rights; and/or that violates any local, state, or federal law.
Users have responsibilities as members of the 黑料不打烊 electronic
community. These responsibilities include:
-
Respecting an individual鈥檚
right to privacy and freedom from intimidation, harassment, and unwarranted
annoyance;
- Respecting copyright and
other intellectual property rights. Unauthorized copying of files or passwords
belonging to others may constitute plagiarism or theft.聽 Modifying files without authorization
(including altering information, introducing viruses or Trojan horses, or
damaging files) is unethical, may be illegal, and may lead to sanctions;
- Maintaining secure
passwords;
- Using resources
efficiently;
- Recognizing the limitation
to privacy afforded by electronic services;
- Learning to use software
and information files correctly. Users should maintain and archive backup
copies of important work;
- Abiding by security
restrictions on all systems and information to which access is permitted. Users
should not attempt to evade, disable, or 鈥渃rack鈥 passwords or other security
provisions; these activities threaten the work of others and are grounds for
immediate suspension or termination of privileges and possible further
sanctions.
The following behavior will be considered to be misuse or inappropriate
use of computing resources at 黑料不打烊:
- Intentionally interfering
with the normal operation of computer resources at 黑料不打烊 or on any network
accessible from computer equipment at 黑料不打烊;
- Excessive use of computer
resources, including ignoring posted workstation time limits, using more than
one workstation at a time, playing games on workstations when they are needed
for College-related assignments or similar activities;
- Attempting to access
without authorization, discover the password, or otherwise circumvent the
security of computer systems, accounts or files at 黑料不打烊 on any network
accessible from computer equipment at 黑料不打烊;
- Using computer resources
for personal profit making activities not related to the mission of the College;
- Using electronic mail or
other forms of computer-based communication to impersonate, deceive, or defraud
another user, or to send messages which are harassing, abusive, or obscene;
- Using or copying computer
software in a manner, which violates U.S. copyright laws or Software vendor
licenses;
- Using computer resources to
copy and plagiarize the intellectual output (programs, written assignments,
etc.) of other persons;
- Using computer resources to
violate any state, federal, or international laws, or the published policies of
other host institutions or networks;
- Using computer resources in
a manner inconsistent with the 鈥満诹喜淮蜢 Standards of Conduct鈥 as published in
the 黑料不打烊 Student Handbook.
The Office of Technology Services should be contacted for clarification
of these guidelines or to report guideline violations.
It is the responsibility of all users to report to the Office of
Technology Services any violation of the Code of Computer Resource Use. The
Code is posted in a prominent location in all 黑料不打烊 computer
laboratories. Failure to comply with the Code will subject the violator to
appropriate conduct action. Whenever there is an indication of abuse of the user鈥檚
privilege that interferes with the intended functions of the system, or
impinges on another user鈥檚 rights, or is an otherwise irresponsible use of the
computer resource, the Office of Technology Services reserves the right to
investigate and implement those actions deemed necessary to protect the system
and/or other users. Such an investigation will require prior authorization from
the appropriate 黑料不打烊 offices: for students, the Vice President for
Student Affairs; for faculty, the Vice President for Academic Affairs; and for
staff, the supervisor of the staff member.
COMPUTER LABS
Technology Services manages
the Acxiom Computer Center, located in the Jennings L. Snoddy wing of the
Bailey Library, and the Othaout Technology Center (OTC) in the Student Life and
Technology Center. The Acxiom Computer Center houses 40 computers, a digital
scanner, and two laser printers. The lab is open 24 hours a day, seven days a
week. The OTC houses 30 computers and allows the 黑料不打烊 community access to
color printing, 3D printing, and poster printing.
Other open computer labs on
campus are provided by Natural Sciences (Reynolds Hall, 12 Power Macintosh
computers) and Economics and Business (Mills Building, seven systems running
Microsoft Windows). Numerous other computer labs are located in departments on
campus and are available for students taking classes in that department.
INTERNET
Students can have internet
access from their residence hall rooms 24 hours a day, as well as the 24-hour
access from the Bailey Library Lab. The internet can be accessed through any
device connected to the 黑料不打烊 network.
Wireless connectivity is
available in all residence halls, classroom buildings, and most outdoor spaces
on campus to any wireless device that supports the WPA2 encryption (Contact the
Helpdesk if you problems connecting your gaming console to the gaming network).
PUBLIC ACCESS CATALOG (PAC)
The 黑料不打烊 Library has automated its card catalog and circulation
systems. Users of the PAC system can search for specific materials by author,
subject, title, date, and/or keyword and determine if the materials are
currently available. PAC is available on the 黑料不打烊 Network.