内搜索:

信息技术服务

联络南方IT

欢迎

Instructional Technology Support is the launching point for anyone seeking information on various technological services and support offered at 南bet8九州登录入口. 联系 IT services at 740.533.4569. For work orders please create a ticket with the bet8九州登录入口 Technology Help Center.

任务

The mission of the 俄亥俄州 南部 Instructional Technology Support Team is to enable, promote and support use of technology for academic excellence. We will focus on providing training & support to faculty, staff and students.

服务台工作时间

星期一至星期五:上午8点.m. – 5 p.m.

校园电脑

俄亥俄州 UNIVERSITY SOUTHERN COMPUTER USAGE POLICY AND PROCEDURES

bet8九州登录入口 provides computers for bet8九州登录入口 students to use. bet8九州登录入口 students working on course related assignments will have priority in the labs over those using the computers for any non-university related purpose.

Students who need a computer to work on their assignments can come to the 南部 图书馆 located on the second floor of the Collins Center.

REQUIREMENT TO USE COMPUTERS ON CAMPUS:

You must be current student with a valid bet8九州登录入口 ID.

安全使用电脑

Sharing bet8九州登录入口 accounts and/or passwords

If you share your username and password with someone who uses a computer for illegal purposes, you will be considered a suspect during the investigation of those activities. 俄亥俄州 University uses several different programs to ensure legal usage of computers that access our network, 包括端口扫描器, which constantly monitor the activities of users on the 俄亥俄州 network. You can prevent involvement in these activities by using a strong, private password for your 俄亥俄州 account.

Leaving workstations unattended and saving passwords

Leaving your workstation unattended while logged in can be just as dangerous as sharing your username and password. In addition to all of the same repercussions for sharing your login information, you could potentially lose data on your local and shared drives if someone accesses your computer with malicious intent. You can press Ctrl+Alt+Delete to lock your workstation any time you're stepping out of your office or away from your workstation. Saving your e-mail passwords or wireless login information in your browser will only increase the likelihood of the loss of personal data.

Torrents and other Peer to Peer programs

While Peer to Peer (P2P) applications are legal, most of the content downloaded through these applications is not. Most data provided to users through P2P networks is compromised copyrighted data that could result in hefty fines and other legal action. In order to combat software, video, 还有音频盗版, 俄亥俄州 University has banned all P2P applications, 例如uTorrent, bt, and other popular torrent programs. While scanning for security vulnerabilities, the 俄亥俄州 network is also monitored for these types of applications. Computers running these applications will have their network capabilities disabled until 俄亥俄州 Information Security has gathered necessary user information and is provided with the necessary information to ensure all programs of these types have been removed.

Facebook, Twitter, and other 社交媒体 sites

Social media websites are one of the primary outlets for distributing worms, 木马, and other forms of malware to computers. While most users have no need to access these programs during the workday, those who do should be especially careful of links, 弹出窗口, 浏览器重定向. Shortened URLs using websites such as bitly.com和TINYUrl.com can further complicate matters, as these links can make potentially dangerous websites indistinguishable from safe ones until the user has already visited the site.

Phishing scams and e-mail attachments

Should you receive a suspicious e-mail from a friend, 的员工, or a complete stranger - avoid opening the message. These messages generally involve topics such as account activation or deactivation (especially with websites such as PayPal where money can be transferred), 在线彩票, 继承, 投资, 工作机会, 更健康的生活, or bogus petitions against non-existent laws. You should avoid any e-mails of this type unless you're expecting a message in regards to one of these specific topics from someone you know. More information on identifying malicious email and recognizing phishing attempts is available from the Office of Information Technology.

Web Browsing/弹出窗口/freeware/worms/malware/plug-ins

If browsing the web is a necessary component of your job details, please avoid installing any free software or web browser plug-ins. Many times these programs and plug-ins include additional worms, 木马, and other forms of malware. If you require a specific piece of software that you have not been provided with, please contact the IT department for assistance in locating and installing the correct software on your machine.

Sensitive and personal information on workstations

A savvy computer user can often recover sensitive information that you believe you've removed from your computer. Traces of files are left on your hard drive, even after they have been deleted. Data that has been deleted from hard drives for several years has been recovered in many cases. In order to reduce the likelihood of your private information being compromised, avoid using your work computer to access personal accounts, 银行, and other non-work related websites.

政策 & 程序

俄亥俄州 UNIVERSITY SOUTHERN COMPUTER USAGE POLICIES AND PROCEDURES

Including but not limited to equipment located in the following areas of 南bet8九州登录入口:

Academic Center- Teaching Computer Lab
Collins Center- 图书馆, Student Success Center
Dingus Center- Teaching Computer Labs
Riffe Center - Electronic Media, Media Computer Lab

bet8九州登录入口 provides computer labs for bet8九州登录入口 students. bet8九州登录入口 students working on course related assignments will have priority in the labs over those using the computers for any non-university related purpose.

Activities involving University communication and computing resources must be in accord with the University honor codes, 员工手册, 学生手册, 相关的地方, 状态, 联邦, and international laws and regulations.

bet8九州登录入口 is a 状态 supported school and will not compete with local enterprise. The University, therefore, prohibits the use of computer labs for any for-profit venture.

The spread of computer viruses is an ongoing problem. bet8九州登录入口-南部 provides the programs and procedures to maintain a virus-free environment. bet8九州登录入口 is not liable for any damage caused by computer virus infection.

bet8九州登录入口 supports the Software Publisher's Association. The duplication of copyrighted software is a 联邦 crime. Installation of personal software on any University-owned computer is prohibited and includes Downloading of programs from the Internet. Violators may be barred from the computer labs and University sanctions may be applied.

OTHER 俄亥俄州 UNIVERSITY SOUTHERN COMPUTER LABS POLICIES:

Be considerate of others working in the lab. 请保持安静. Remember other students are working.Noise should be kept to a minimum.Eating and drinking in the computer labs is prohibited.Use of tobacco products in the computer labs is prohibited.Utmost care of equipment is expected.You must check with the lab staff member on duty in order to use equipment. Computer switching must be approved with lab staff.If you leave your computer unattended, lab staff reserves the right to log you off. Lab staff cannot be held responsible for items left in the computer labs, or documents stored on the hard drives of lab computers. Lab users who disrupt operations, 打扰其他实验室用户, or fail to observe computer lab policies will be asked to leave the lab. Refusal to cooperate will result in removal by bet8九州登录入口 security and loss of privileges to use computer lab facilities on campus.

Lab assistants are instructed to enforce the above policies, 报告任何问题, and ask violators to leave.

SOUTHERN CAMPUS COMPUTER RULES

You must be enrolled as an 俄亥俄州 student or be a current bet8九州登录入口 faculty or staff member to use the computer lab. You must present a valid bet8九州登录入口 ID card to use the equipment in the lab. A driver's license will not be accepted. No children are allowed in the Computer Lab. If there is a waiting list for equipment, a two-hour time limit automatically goes into effect.

图书馆里的电脑

Are intended for 图书馆 Research. A responsible adult must accompany anyone under the age of 13.

COMPUTERS IN THE LEARNING CENTER

Above rules apply with the exception that individuals who are not students may obtain permission to use computers under specific circumstances.

COMPUTERS IN ELECTRONIC MEDIA

所有的规则都适用. Lab is restricted to Electronic Media 专业.