Campus Computer Labs

UACCB has computer labs available for student use throughout campus, including an open computer lab, located in the Roy Row, Sr., and Imogene Row Johns Library and Academic Building which is supervised during normal hours by lab staff that are available to assist students who need computer help. Most of the computer labs provide internet access, and all the labs are loaded with software programs used in UACCB’s curriculum. In order to use any computer on campus, students must have a current student identification card that may be obtained in the Admissions Office located in the Main Classroom Building.

Use of Technology Recourses

This document constitutes a campus-wide policy intended to allow for the proper use of all UACCB computing and network resources, effective protection of individual users, equitable access and proper management of those resources. This document should be broadly interpreted. This policy applies to UACCB network usage even in situations where it would not apply to the computer(s) in use. These guidelines are intended to supplement, not replace, all existing laws, regulations, agreements, and contracts that currently apply to computing and networking services.

Access to the UACCB network is a privilege, not a right. Access to networks and computer systems owned or operated by UACCB requires certain user responsibilities and obligations and is subject to campus policies and local, state, and federal laws. Appropriate use should always be legal and ethical. Users should reflect academic honesty, mirror community standards, and show consideration and restraint in the consumption of shared resources. Users should also demonstrate respect for intellectual property; ownership of data; system security mechanisms; and individual rights to privacy and to freedom from intimidation, harassment, and annoyance. Appropriate use of computing and networking resources includes instruction; independent study; authorized research; independent research; communications; and recognized student and campus organizations, and agencies of the college.

Users of UACCB’s information technology resources are expected to abide by the following policies:

  1. Information technology resource usage is restricted to faculty, staff, and students currently enrolled in UACCB credit and non-credit classes, and authorized public.
  2. Network users will be allowed access to other networks and computers external to UACCB.  Because each network or system has its own set of policies and procedures, users must abide by the policies and procedures of networks/systems both internal and external to UACCB.
  3. UACCB is not responsible for information either transmitted or received by users of its computer network/system.
  4. The content and maintenance of a users electronic mailbox is the users responsibility.  As such, the user must take the following responsible action:
    1. Check electronic mail on a regular basis and delete unwanted messages immediately.
    2. Never assume that electronic mail messages are private; others may be able to read or access a users mail.
  5. The content and maintenance of a users storage area is the users responsibility. As such, the user must take the following responsible action:
    1. Keep the number of files to a minimum
    2. Routinely and frequently check for viruses.
    3. Make sure that data stored on the local computers is copied to a specified network location so that information is backed up. 
  6. Users are NOT AUTHORIZED TO:
    1. ​​​​​​​Copy, rename, alter, examine or delete the files or programs of another employee or a UACCB department without written permission. All files and programs are legal property of UACCB. 
    2. Use a computer to interfere with individual and/or institutional rights, including but not limited to the following:
      1. ​​​​​​​Sending of abusive or otherwise objectionable messages to others. 
      2. Sending of messages that are likely to result in the loss of recipient's work or systems. 
      3. Any type of use that would cause congestion of the networks or otherwise interfere with the work of others. 
      4. Use the computer resources for personal activities not related to the mission of UACCB.
      5. Posting of public service events not approved by the appropriate Vice Chancellor. 
    3. Create, disseminate, or tun a self-replicating program ("virus"), whether destructive in nature or not. 
    4. Use computers maintained by UACCB for non-college projects without the approval of the Vice Chancellor.
    5. Tamper with switch settings, move, reconfigure, or do anything that could damage files, terminals, computers, printers, or other equipment. 
    6. College, read, or destroy output other than their own work without permission unless the account is designated for group work. 
    7. Use the computer account of another person without permission  unless the account is designated for group work. 
    8. Copy any copyrighted software. Users should be aware that it is a criminal offense to copy any software that is protected by copyright. 
    9. Use licensed software in a manner inconsistent with the licensing agreement.
    10. Surf, view, or download an sexually explicit media in the computer labs. Sexually explicit media shall not be displayed on any UACCB terminals, microcomputers, printers, or any other equipment. 
    11. Access or attempt to access a host computer, either at UACCB or though a network, without the owner's permission. 
    12. Use lo-in information belonging to another person
    13. Use UACCB equipment for the purpose of playing non-instructional games. 
    14. Indiscriminately engage in talk session with on-or off-campus sites. 
    15. Use or download any peer-to-peer (P2P) file sharing programs on UACCB computer or UACCB "network resources."
  7. Summary of Civil and Criminal Penalties for Violation of Federal Copyright Lays Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights grated to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to preproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement. Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may aware up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505. Willful copyright infringement can also result in criminal penalties, including imprisonment for up to five years and fines of up to $250,000 per offense. For more information, please see the website of the U.S. Copyright Office at, especially their FAQ's at www.copyright.gove/help/faq.
  8. Harassment - No user, under any circumstances, should use UACCBs computers or networks to harass any other person. The following constitutes computer harassment: (1) Intentionally using the computer to annoy, harass, terrify, intimidate, threaten, offend, or bother another person by conveying obscene language, pictures, or other materials or threats of bodily harm to the recipient or the recipients immediate family; (2) Intentionally using the computer to contact another person repeatedly with the intent to annoy, harass, or bother, whether or not an actual message is communicated, and/or the purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease; (3) Intentionally using the computer to contact another person repeatedly regarding a matter for which one does not have a legal right to communicate, once the recipient has provided reasonable notice that he or she desires such communication to cease (such as debt collection); (4) Intentionally using the computer to disrupt or damage the academic, research, administrative, or related pursuits of another; and (5) Intentionally using the computer to invade the privacy, academic or otherwise, of another or to threaten invasion of the privacy of another.
  9. System administration access - A system administrator (i.e., the person responsible for the technical operations of a particular machine) may access others’ files for the maintenance of networks and computer and storage systems, such as to create backup copies of media. However, in all cases, all individuals privileges and rights of privacy are to be preserved to the greatest extent possible.
  10. Monitoring of usage, inspection of files - Users should also be aware that their use of UACCB computing resources is not completely private. While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College’s computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for maintaining network availability and performanceThe College may also specifically monitor the activity and accounts of individual users of the Institutes computing resources, including individual login sessions and communications, without notice. This monitoring may occur in the following instances:
    1. ​​​​​​​The user has voluntarily made these activities accessible to the public.
    2. It reasonably appears necessary to do so to protect the integrity, security, or functionality of the Institute or to protect the Institute from liability.
    3. There is reasonable cause to believe that the user has violated, or is violating, this policy.
    4. An account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns.
    5. Upon receipt of a legally served directive of appropriate law enforcement agencies.
    6. Any such individual monitoring, other than that specified in “(1)”, required by law, or necessary to respond to bona fide emergency situations, must be authorized in advance. The appropriate unit head will be informed as time and the situation will allow. In all cases, all individuals privileges and right of privacy are to be preserved to the greatest extent possible.
  11. Suspension of individual privileges - UACCB Information Services may suspend computer and network privileges of an individual for reasons relating to his/her physical or emotional safety and well-being, or for reasons relating to the safety and well-being of other members of the campus community or college property. Access will be promptly restored when safety and well- being can be reasonably assured, unless access is to remain suspended as a result of formal disciplinary action imposed by the Office of the Vice Chancellor for Student Affairs (for students) or the employees department in consultation with the Office of Human Resources (for employees). Anyone who breaches the policies and procedures of the UACCB computer usage policy will be subject to the following action (disciplinary action may also be taken through the Student Conduct Process):
    1. ​​​​​​​First offense: Individual is served a verbal warning
    2. Second offense: Individual is served a warning ticket, and computer usage is suspended for one week.
    3. Third offense: Individual is served a final warning ticket, and his or her account will be disabled for the remainder of the semester.
  12. No foods or drinks are allowed in the computer laboratories.
  13. UACCB reserves the right to close laboratories or curtail use of computing facilities if the above policies and/or procedures are violated.