Preview

Computer Lab Rules & Regulations

Good Essays
Open Document
Open Document
855 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Lab Rules & Regulations
Computer Lab Rules & Regulations

Electronic workstations may only be used by current Swinburne University students and staffs. Swinburne identity card must be presented on request. Swinburne computing facilities should only be used for educational, research and administrative purposes of Swinburne. All other uses are strictly prohibited.
The following rules and terms apply to all computers on campus.

Terms and Conditions 1. All users must abide by the license requirements of any software or resources being used on the computer workstations. 2. The following activities are strictly prohibited and are deemed as a criminal offence : o Unless otherwise permitted by the Copyright Act, unauthorized copying, downloading or public performance of works or audiovisual material. This includes MP3, OGG, WMV, AVI, RM, MOV, MPEG files etc. o Removal and/or of computer workstations including its peripherals such as keyboard, mouse and monitor. o Causing damage to the computer workstation including its peripherals. o Altering of software settings and/or intentional introduction of malicious software in order to circumvent network security. o Installation of pirated and/or unauthorised software on the workstations.

1 Unauthorized and illegal copying of any licensed software.

3. Students must also abide by other rules and regulations shown on booking sheets, computer screens, and notices near the workstations or on the wall. 4. You need to have a current student ID or staff ID to use the computer labs. 5. You may only install academic related software (Non-Pirated) on the computer's hard drive while you are using the lab, but it MUST be removed when you leave. Your data should be saved on a Floppy disk, Handy drive or on your Home drive--not on the computer's hard drive. 6. The computer lab is provided as a service to the students to enhance and further education. You may not use the computer lab

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Create a Policy whereby users cannot install new software to a machine without opening a ticket with the helpdesk or requesting administrator access (ICECC, 2009). The student computers should be preloaded with all required…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Lab Report

    • 1088 Words
    • 5 Pages

    This lab requires that you answer questions, shoot screen shots, and perform other activities that you will document in a worksheet named for the lab. You will find the worksheet on Moodle. It is recommended that you use a USB flash drive to store your worksheets so you can submit them to your instructor for review. As you perform the exercises in each lab, open the…

    • 1088 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    To accommodate various types of classroom arrangements, each lab in this manual assumes that the student servers are in their baseline configuration, as described in Lab 1-2 “Preparing an Application Server.” If you have not done so already, complete the initial configuration tasks in Lab 1-2-1 before beginning this lab.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ilab Instructions

    • 2258 Words
    • 10 Pages

    c. If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home.…

    • 2258 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    In addition to those items listed above, personal downloads are to be strictly prohibited. If you should have need of a program or utility which is not accessible in your computer system, then you must submit a request to the IT department identifying the service or application requested, why the application is needed.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 John Pham

    • 2319 Words
    • 10 Pages

    In addition to the computers, you also require the software listed in Table 2-2 to complete Lab 2.…

    • 2319 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    syllabus

    • 1373 Words
    • 6 Pages

    The student must have access to a computer with internet access. If the student does not own a computer, the computer lab and library computers will work fine.…

    • 1373 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You must respect the legal protection provided by copyright and license to programs and data.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    form of media metrix

    • 2374 Words
    • 10 Pages

    Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 2374 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    This act covers hacking which is when someone illegally gains access to a computer with someone else's username or password which you do not have permission to use being unauthorised access, modify files or data without the consent of the creator, or commit illegal acts such as fraud while using the stolen username or password.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Learn Psychology

    • 1259 Words
    • 6 Pages

    Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 1259 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cisco Case Study Example

    • 291 Words
    • 2 Pages

    The LAN would handle student database management system, automated teacher/ classroom assignment system, and graduate school staff attendance monitoring system as well as web-based applications such as e-mail system, the XYZ Graduate School Portal, on-line enrolment system and on-line grade reporting system. Aside from these centralized systems, each graduate school would also have its own relevant applications.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays