Loading...

Strayer University Computer Lab Use Policy

1. Introduction

Strayer University Computer labs have been setup to facilitate the pursuit of academic excellence as provided by the University's mission of academic merit. The following policy outlines the acceptable use of Strayer University computer labs.

2. Strayer University Computer Labs
2.1 Purpose

The primary purpose of Strayer University Computer Labs is to provide members of the university community with access to computing facilities, software, and technical support in support of their instructional, research, and administrative activities. Use of the computer labs is a privilege that may be revoked at any time for failure to comply with university policies, procedures, and regulations or for any illegal activity.

2. 2 Location and Hours of Operation

The computer labs are located on all campuses. The hours of operation are subject to change. Please refer to the website or contact the Help Desk for current hours of operation. All users must vacate the lab no later than fifteen minutes prior to closing time so that staff can properly secure the facility.

2. 3 Users

All users must have a current Strayer University identification card (ID). The ID card must be presented upon request to any staff member or security officer. Only currently enrolled students, faculty, and staff are allowed to use the computer labs. Alumni and other guests are not permitted to use the computers or printers in the computer labs unless otherwise approved by the Director of Information Technology or designee. All users must comply with all federal, state, and local laws while using university computing resources as well as all university policies and procedures.

2. 4 Policies
2.4.1 Federal and State Laws

Users are responsible for knowing and complying with all applicable federal and state laws while using university computing resources. These laws include, but are not limited to:
• Copyrights – It is illegal to copy or distribute copyrighted material without the permission of the copyright holder. This includes downloading or sharing music, movies, games, software, etc., from the internet without paying for it or without the copyright holder’s authorization.
• Child Pornography – It is illegal to download, view, possess, or distribute child pornography. Child pornography is defined as any images or videos depicting sexual activity involving someone under the age of 18 years old.
• Other Illegal Activities – Using university computing resources for any illegal activity is strictly prohibited and may result in criminal charges being filed against you in addition to disciplinary action from the university. Examples of illegal activities include but are not limited to: fraud, identity theft, harassment, cyberstalking, cyberbullying, hacking/cracking into systems (including another person’s account), etc.)
• Acceptable Use Policy – All users must comply with Strayer University’s Acceptable Use Policy which outlines acceptable and prohibited uses of university computing resources including but not limited to: personal use vs business use; authorized vs unauthorized access; storage & transmission of sensitive data; virus protection & prevention; spam & phishing emails; electronic communications & social media; etc.)
Violation of any federal or state law while using university computing resources may result in criminal penalties against you in addition to disciplinary action from Strayer University up to and including expulsion.

2. 4.2 Acceptable Use

All users must comply with Strayer University’s Acceptable Use Policy which is available online at https://www.strayer.edu/legal/acceptable-use-policy. Violation of the Acceptable Use Policy may result in disciplinary action from the university up to and including expulsion.

3. Use of Computer Labs by Guests

Guests are permitted to use the computer labs only if they have been authorized by the Director of Information Technology or designee and they have been given a guest pass by the Help Desk staff. Authorized guests must present their guest pass to any staff member or security officer upon request. All guests must comply with all federal, state, and local laws while using university computing resources as well as all university policies and procedures. Violation of any federal or state law while using university computing resources may result in criminal penalties against you in addition to disciplinary action from Strayer University up to and including expulsion.

4. Administrators and Faculty Use of Computer Labs

Administrators and faculty are permitted to use the computer labs for instructional purposes only. All administrators and faculty must comply with all federal, state, and local laws while using university computing resources as well as all university policies and procedures. Violation of any federal or state law while using university computing resources may result in criminal penalties against you in addition to disciplinary action from Strayer University up to and including expulsion.

5. Conclusion

The use of Strayer University computer labs is a privilege that may be revoked at any time for failure to comply with university policies, procedures, and regulations or for any illegal activity. All users must have a current Strayer University identification card (ID) and must present it upon request to any staff member or security officer. Only currently enrolled students, faculty, and staff are allowed to use the computer labs unless authorized by the Director of Information Technology or designee. Authorized guests must present their guest pass to any staff member or security officer upon request. All users must comply with all federal, state, and local laws while using university computing resources as well as all university policies and procedures. Violation of any federal or state law while using university computing resources may result in criminal penalties against you in addition to disciplinary action from Strayer University up to and including expulsion.

FAQ

Strayer University's Computer Labs Policy is designed to ensure that all students have an equal opportunity to use the computer labs on campus.

This policy benefits students by ensuring that they have access to the computer labs when they need them.

The consequences for not following the policy are that students may be denied access to the computer labs.

Students can make sure they are using the computer labs safely and effectively by following the policies and procedures set forth by Strayer University.

Cite this assignment

Free Essay Samples (December 2, 2022) Strayer University Computer Lab Use Policy. Retrieved from https://essayholic.com/strayer-university-computer-lab-use-policy/.
"Strayer University Computer Lab Use Policy." Free Essay Samples - December 2, 2022, https://essayholic.com/strayer-university-computer-lab-use-policy/
Free Essay Samples June 22, 2022 Strayer University Computer Lab Use Policy., viewed December 2, 2022,<https://essayholic.com/strayer-university-computer-lab-use-policy/>
Free Essay Samples - Strayer University Computer Lab Use Policy. [Internet]. [Accessed December 2, 2022]. Available from: https://essayholic.com/strayer-university-computer-lab-use-policy/
"Strayer University Computer Lab Use Policy." Free Essay Samples - Accessed December 2, 2022. https://essayholic.com/strayer-university-computer-lab-use-policy/
"Strayer University Computer Lab Use Policy." Free Essay Samples [Online]. Available: https://essayholic.com/strayer-university-computer-lab-use-policy/. [Accessed: December 2, 2022]

More Related papers

Top