The Buff Agora

Milligan College



Policy and Procedure Manual

TDL – Derthick 301 – Lab that serves the students in the CIS classes

  1. Must have authorization for access to the lab from the faculty. This access will be an issued key card for the security lock on the door. The faculty member will request keys for the students needing to use the lab for special projects that require additional time in the lab other than class session. This request will be sent to the Dean of Academic Affairs for approval. From his/her desk the approved request will be sent to Jack Presnell for processing. The student is notified by the bookstore when the keys are ready for pickup.
  2. Authorized holder of the key card is the only person to have access to the lab. No unauthorized person can be in the lab.
  3. Access for students without a key card is provided by faculty. Classes that are required to use the lab facility must be accompanied by the faculty member teaching the class.
  4. For Internet access see Network Policy and Procedures.
  5. All computers and components are property of the TDL. It is prohibited to remove any item from the TDL without prior written permission from the Technology Administrator and the supervising faculty member.
  6. Inventory will be conducted at the end of each semester or with the arrival or disposal of TDL equipment.
  7. The TDL is dedicated to academic purposes only.

Network Policy and Procedures

  1. Internet access during classroom hours (8:00 a.m.  – 5:30 p.m.) will be limited to academic related sites and services.
  2. No unauthorized software is allowed to be downloaded and installed to any machine in the TDL.
  3. Authenticated log on is required. See the Technical Administrator.
  4. In order to maintain and evaluate this system efficiency, the administration of this lab reserves the right to monitor and record all network activity and report any activity taking place that is contrary to the policy of this facility, state, or federal law and regulation.
  5. Expressly forbidden list:

    a. Attempting to use computer programs or other means to decode passwords or access control information   

    b. Attempting to circumvent or subvert system or network security measures, including creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data

    c. Connection of unauthorized equipment to the campus network, including hubs, routers, and switches.· 

    d. Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon such as creating or propagating viruses, worms, or “Trojan horse” programs; disrupting services; damaging files; or making unauthorized modifications to college data.

    e. Making or using illegal copies of copyrighted materials or software, store such copies on College systems, or transmit them over the College network.

    f. Using mail or messaging services to harass, offend, or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else’s name or user ID.

Accordingly, each user is expected to behave in a manner that reflects our commitment to be a premier Christian liberal arts college where Jesus Christ is exalted and excellence is the standard.