³Ô¹Ï±¬ÁÏ

Student Center Computer Lab

student center computer lab with computer workstations and projection tv

Hours***

Monday thru Friday 7:30am - 6pm

***Subject to change at any time

Features

Computers donated by your Student Government Association (PCs and Macs)
Print outs single or double sided ($0.15 per page) 


³Ô¹Ï±¬ÁÏ Student Computer Use Policy

³Ô¹Ï±¬ÁÏ provides student access to computer resources through the wireless, JagMail (email), web servers, and departmental labs located throughout campus. Students using these resources must adhere to all policies of the University of South Alabama regarding the use of computers and computer networks.

Lab privileges can be denied to anyone using University equipment for illegal or unethical purposes. Any illegal behavior observed in the labs will be reported to appropriate University officials or law enforcement agencies. Anyone using the lab computers in this way, or any other generally inconsiderate manner, will be subject to appropriate disciplinary action. Such behaviors/activities include, but are not necessarily limited to, the following:

Illegal Activity

  • Uploading or downloading copyrighted material, violating the intellectual property rights of others, or illegally sharing trade secrets. (Please note that MP3 and other music files frequently fall into this category.) Accessing, downloading, or printing out articles solely for educational and research purposes, however, may be permissible under the fair use clause of the Copyright Law. See ³Ô¹Ï±¬ÁÏ Software Policy for more specific guidelines on using copyrighted software.
  • Illegally sharing computer software via Internet, the local network, personal disks or any other media
  • Copying or transmitting material contained in copyrighted databases such as Infotrac, without permission from the source.
  • Buying or selling weapons or illegal substances via computer network.
  • Threatening or "stalking" others via computer network.
  • Knowingly replicating or transmitting computer viruses, or otherwise deliberately damaging the systems or files of other people.

Strictly Prohibited Behaviors/Activities

  • Trafficking in pornography of any kind via computer network. Please note that redistribution of pornography, even through web page links, is often illegal.
  • Activity that violates state or federal law. This may include viewing, downloading, posting, printing or sending pornography, or other sexually explicit, profane, obscene, hostile, or blatantly offensive and intimidating material, including hate speech, threats, harassing communications (as defined by law), or information that violates any state or federal laws.
  • "Spam", the practice of indiscriminately sending unsolicited email (e.g., commercial advertisements, chain mail, pornographic materials, political lobbying, hate speech, racial diatribes, and religious proselytizing) to persons who have not indicated interest in receiving such materials.
  • "Hacking" or "Cracking", i.e., deliberately invading the privacy of others by attempting to gain unauthorized access to any account or system.
  • Obtaining/distributing confidential information. Deliberately and inappropriately observing, recording, accessing, using or transmitting passwords, account numbers, e-mail addresses, phone numbers or credit card numbers belonging to other people is prohibited.
  • Downloading executable programs, which might interject computer viruses into lab computers, is generally prohibited. Further guidance with regard to safe sites and appropriate downloads should be sought from the lab facilitator. (The University takes no responsibility for damage to your work or your own equipment resulting from viruses or files you might download via the Internet.)
  • Using University equipment, including the University's Internet lines, servers or web pages, for commercial gain .
  • Unauthorized wiring, altering or damaging of University-owned computer equipment , including hardware and software.
  • Tampering with lab machine settings.

Violations/Consequences

In addition to all guidelines in the policies stated here, all ³Ô¹Ï±¬ÁÏ students are subject to the rules outlined in the Code of Student Conduct and the Student Academic Conduct Policy, which are both published in The Lowdown. Violations of any ³Ô¹Ï±¬ÁÏ computer policies incur the same types of disciplinary measures as other University policies or state or federal laws (up to and including criminal prosecution).