Computer Lab Policies

Tykeson Hall Computer Lab (Rm 102)

The OSU-Cascades drop-in computer lab is specifically designed for student academic use. The lab is a “reduced noise” or quiet area where students are asked to show respect for others using the lab. The lab is a first-come-first-served facility. During heavy use periods, students are asked to be as efficient as possible in using computer time and to limit personal use (non-school email, Facebook, etc.). The computer lab is not an “open study” area. Students should use other designated areas of Tykeson Hall for individual and group study.

Food and Drink

No food or drink is allowed at any computer station.

Cell Phones

Cell phones are not to be used in the lab. Set phones to silent or vibrate while in the lab. Students are asked to step outside the lab to make or receive phone calls.

Music Devices

Students wishing to use personal music devices while in the lab should use some type of headphones (earbuds) and keep the volume at a level which cannot be heard by adjacent individuals.

Please do not use the computer’s speakers so as not to disturb those students around you.

OSU Acceptable Use of University Computing Resources

Oregon State University supports an environment of learning and sharing of information through the acquisition and maintenance of computers, computer systems, networks, and associated computing resources and infrastructure. University computing resources are intended to support the University's missions, administrative operations and activities, student and campus life activities, and the free exchange of ideas and information between the University and the greater community in which it operates locally, nationally, and internationally.

Computing resources and facilities of Oregon State University are the property of the university and shall be used for legitimate University instructional, research, administrative, public service, and approved contract purposes. Personal use of computing resources may be permitted if it does not interfere with the university's or the employee's ability to carry out University business, and does not violate the terms of this policy. The use of university computing resources is subject to the generally accepted tenets of legal and ethical behavior within the university community. The computing resources system shall not be used for material or activities that reasonably could be considered harassing, obscene, or threatening by the recipient or another viewer.

This policy applies to all users of university computing resources, whether affiliated with the university or not, and to all use of those resources, whether on campus or from remote locations. Additional policies may apply to computing resources provided or operated by individual units of the university or to uses within specific units.

 All users of university computing resources must: 

  • Comply with all federal, state and other applicable laws; all generally applicable Board of Higher Education and university rules and policies; and all applicable contracts and licenses. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
  • Use only those computing resources that they are authorized to use and use them only in the manner and to the extent authorized. Accounts and passwords may not, under any circumstances, be shared with or used by persons other than the individual(s) to whom they have been assigned by the university.
  • Refrain from unauthorized attempts to circumvent the security mechanisms of any university system.
  • Refrain from attempts to degrade system performance or capability, or attempts to damage systems, software or intellectual property of others.
  • Refrain from using university computing resources for commercial purposes, except as specifically authorized by the university in written approval of a request for approval of outside employment. Any such approval shall include full detail of the employee's financial obligation and the charge for such use, if any.
  • When using university computing resources to access non-University resources, observe the acceptable use policies of those non-university organizations.
  • Refrain from unauthorized viewing or use of another person's computer files, programs, accounts, and data.
  • Refrain from sharing a password or using another person's password. All such activity is strictly prohibited. Access to such information does not imply permission to view or use it. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding.
  • Refrain from using electronic mail systems for "broadcasting" of unsolicited mail or for any purpose prohibited by state or federal laws. Broadcast email is defined in "Guidelines for Release of Email Addresses," available at
  • Abide by federal copyright laws when using University computing resources for the use of or the copying of copyrighted material. The unauthorized publishing or use of copyrighted material on a University server is prohibited and users are personally liable for the consequences of such unauthorized use.
  • Abide by his/her supervisor's direction regarding personal use of university computing resources.

Users should be aware that their uses of university computing resources are not completely private. It is the policy of the university not to monitor individual usage of computing resources, unless there is a legitimate business reason to do so.

However, the university reserves the right to monitor and record the usage of all computing resources as necessary to evaluate and maintain system efficiency, and may further monitor and record the usage of individuals, including the disclosure of individual files:

  •  If it has reason to believe that activities are taking place contrary to this policy, or to Oregon University System policy, or state or federal law or policy
  • To respond to an administrative court or judicial court order
  • To respond to a request for discovery in the course of litigation
  • To respond to a public record request for files which are deemed public records under public records laws
  • For a legitimate business reason

The University may use information gained in this manner in disciplinary or criminal proceedings. In addition, state or federal law may require disclosure of individual computer files that are deemed public records under public records laws. Communications made by means of University computing resources are also generally subject to Oregon's Public Records law to the same extent as they would be if made on paper.

If a user is logged in for more than 4 hours with inactivity, the user will automatically be logged off.


Users who violate this policy may be denied access to university computing resources and may be subject to disciplinary actions and/or criminal and civil penalties. Violations will normally be handled through the university disciplinary procedures applicable to the relevant user and may include referring suspected violations of applicable law to appropriate law enforcement agencies. However, the university may immediately suspend or block access to an account, prior to the initiation or completion of such procedures, when it appears necessary to do so in order to protect the integrity, security or functionality of university or other computing resources or to protect the University from liability.


This policy is the university's complete acceptable use policy and replaces the Department of Administrative Services Statewide IT Policy 1.3, Acceptable Use of Information Related Technology.

Game Policy

When playing games, all users must abide by the following rules and guidelines:

  • Games have a low priority for facility use. If all machines are in use, or if another user needs to use special equipment on your machine, you will be required to give up the machine that you are currently using
  • Game players must play with the sound off, or use the headphones
  • Game players may not ask someone on a specially equipped machine to relocate so that they can play a game on their machine
  • You may not copy nor distribute any type of software that is not public domain
  • Game players must not disturb other users in the computer facility