The OSU-Cascades drop-in computer lab is specifically designed for student academic use. The lab is a “reduced noise” or quiet area where students are asked to show respect for others using the lab. The lab is a first-come-first-served facility. During heavy use periods, students are asked to be as efficient as possible in using computer time and to limit personal use (non-school email, Facebook, etc.). The computer lab is not an “open study” area. Students should use other designated areas of Tykeson Hall for individual and group study.
No food or drink is allowed at any computer station.
Cell phones are not to be used in the lab. Set phones to silent or vibrate while in the lab. Students are asked to step outside the lab to make or receive phone calls.
Students wishing to use personal music devices while in the lab should use some type of headphones (earbuds) and keep the volume at a level which cannot be heard by adjacent individuals.
Please do not use the computer’s speakers so as not to disturb those students around you.
Oregon State University supports an environment of learning and sharing of information through the acquisition and maintenance of computers, computer systems, networks, and associated computing resources and infrastructure. University computing resources are intended to support the University's missions, administrative operations and activities, student and campus life activities, and the free exchange of ideas and information between the University and the greater community in which it operates locally, nationally, and internationally.
Computing resources and facilities of Oregon State University are the property of the university and shall be used for legitimate University instructional, research, administrative, public service, and approved contract purposes. Personal use of computing resources may be permitted if it does not interfere with the university's or the employee's ability to carry out University business, and does not violate the terms of this policy. The use of university computing resources is subject to the generally accepted tenets of legal and ethical behavior within the university community. The computing resources system shall not be used for material or activities that reasonably could be considered harassing, obscene, or threatening by the recipient or another viewer.
This policy applies to all users of university computing resources, whether affiliated with the university or not, and to all use of those resources, whether on campus or from remote locations. Additional policies may apply to computing resources provided or operated by individual units of the university or to uses within specific units.
Users should be aware that their uses of university computing resources are not completely private. It is the policy of the university not to monitor individual usage of computing resources, unless there is a legitimate business reason to do so.
However, the university reserves the right to monitor and record the usage of all computing resources as necessary to evaluate and maintain system efficiency, and may further monitor and record the usage of individuals, including the disclosure of individual files:
The University may use information gained in this manner in disciplinary or criminal proceedings. In addition, state or federal law may require disclosure of individual computer files that are deemed public records under public records laws. Communications made by means of University computing resources are also generally subject to Oregon's Public Records law to the same extent as they would be if made on paper.
Users who violate this policy may be denied access to university computing resources and may be subject to disciplinary actions and/or criminal and civil penalties. Violations will normally be handled through the university disciplinary procedures applicable to the relevant user and may include referring suspected violations of applicable law to appropriate law enforcement agencies. However, the university may immediately suspend or block access to an account, prior to the initiation or completion of such procedures, when it appears necessary to do so in order to protect the integrity, security or functionality of university or other computing resources or to protect the University from liability.
This policy is the university's complete acceptable use policy and replaces the Department of Administrative Services Statewide IT Policy 1.3, Acceptable Use of Information Related Technology.
When playing games, all users must abide by the following rules and guidelines: