Student Center Computer Lab
Hours***
Monday thru Friday 7:30am - 6pm
***Subject to change at any time
Features
Computers donated by your Student Government Association (PCs and Macs)
Print outs single or double sided ($0.15 per page)
³Ô¹Ï±¬ÁÏ Student Computer Use Policy
³Ô¹Ï±¬ÁÏ provides student access to computer resources through the wireless, JagMail (email),
web servers, and departmental labs located throughout campus. Students using these
resources must adhere to all policies of the University of South Alabama regarding
the use of computers and computer networks.
Lab privileges can be denied to anyone using University equipment for illegal or unethical
purposes. Any illegal behavior observed in the labs will be reported to appropriate
University officials or law enforcement agencies. Anyone using the lab computers in
this way, or any other generally inconsiderate manner, will be subject to appropriate
disciplinary action. Such behaviors/activities include, but are not necessarily limited
to, the following:
Illegal Activity
- Uploading or downloading copyrighted material, violating the intellectual property
rights of others, or illegally sharing trade secrets. (Please note that MP3 and other
music files frequently fall into this category.) Accessing, downloading, or printing
out articles solely for educational and research purposes, however, may be permissible
under the fair use clause of the Copyright Law. See ³Ô¹Ï±¬ÁÏ Software Policy for more specific
guidelines on using copyrighted software.
- Illegally sharing computer software via Internet, the local network, personal disks
or any other media
- Copying or transmitting material contained in copyrighted databases such as Infotrac,
without permission from the source.
- Buying or selling weapons or illegal substances via computer network.
- Threatening or "stalking" others via computer network.
- Knowingly replicating or transmitting computer viruses, or otherwise deliberately
damaging the systems or files of other people.
Strictly Prohibited Behaviors/Activities
- Trafficking in pornography of any kind via computer network. Please note that redistribution
of pornography, even through web page links, is often illegal.
- Activity that violates state or federal law. This may include viewing, downloading,
posting, printing or sending pornography, or other sexually explicit, profane, obscene,
hostile, or blatantly offensive and intimidating material, including hate speech,
threats, harassing communications (as defined by law), or information that violates
any state or federal laws.
- "Spam", the practice of indiscriminately sending unsolicited email (e.g., commercial
advertisements, chain mail, pornographic materials, political lobbying, hate speech,
racial diatribes, and religious proselytizing) to persons who have not indicated interest
in receiving such materials.
- "Hacking" or "Cracking", i.e., deliberately invading the privacy of others by attempting
to gain unauthorized access to any account or system.
- Obtaining/distributing confidential information. Deliberately and inappropriately
observing, recording, accessing, using or transmitting passwords, account numbers,
e-mail addresses, phone numbers or credit card numbers belonging to other people is
prohibited.
- Downloading executable programs, which might interject computer viruses into lab computers,
is generally prohibited. Further guidance with regard to safe sites and appropriate
downloads should be sought from the lab facilitator. (The University takes no responsibility
for damage to your work or your own equipment resulting from viruses or files you
might download via the Internet.)
- Using University equipment, including the University's Internet lines, servers or
web pages, for commercial gain .
- Unauthorized wiring, altering or damaging of University-owned computer equipment ,
including hardware and software.
- Tampering with lab machine settings.
Violations/Consequences
In addition to all guidelines in the policies stated here, all ³Ô¹Ï±¬ÁÏ students are subject
to the rules outlined in the Code of Student Conduct and the Student Academic Conduct
Policy, which are both published in The Lowdown. Violations of any ³Ô¹Ï±¬ÁÏ computer policies incur the same types of disciplinary measures
as other University policies or state or federal laws (up to and including criminal
prosecution).