REGULATIONS GOVERNING THE USE OF ICT LABOLATORIES

 Introduction

The ICT Lab policy is determined by the University in order to allow students access to the Internet in a manner that is most congenial to the Campus community. In formulating this policy the Administration wishes to strike a balance between the desires of individual member to access Internet and the resources which are available.

These details are the individual operating procedures for the internet Café or ICT Lab of the College and are meant to supplement the University of Livingstonia’s Computer and Information Technology Policy.

Opening Hours

The ICT Lab shall open as follows:

During Semester

Monday to Friday08:00 – 21:00 hours
Saturday08:00 – 12:00hours
SundaysClosed

During Vacation

Monday to Friday08:00 – 17:00 hours
SaturdaysClosed
SundaysClosed

Registration

  • ICT Lab facilities are accessible to University of Livingstonia bona fide students, staff and researchers affiliated to the institution
  • Registration to use ICT Lab facilities constitutes acceptance of ICT Regulations
  • Users must not use another user’s username or password, nor, allow any password issued to them to become known to any other person, nor having logged in, leave ICT Lab facilities unattended and potentially usable by some other person.
  • Users shall register with the Lab Technician when checking in and out of the Lab
  • Users are forbidden access to the Lab or to any wireless signal outside of their allotted timeframe for access of outside of operating hours

Student Contribution

Already included in the Tuition Fees

  • Priority of users

If a situation arises at any time that the demand of users is more than the quality of computers the following conditions shall be observed:

  • Students who hold their original cards shall have priority over those students who have used up/finished their original cards
  • Students will have priority over guest (non-university members) in use of the internet
  • Lecturers (including visiting adjunct lecturers) shall have priority to the computers when accessing materials for presentation in class.
  • Students shall respect that these are shared computers and shall have maximum time of one hour to use the Internet if there are other people waiting to use any of the computers.

General rules

As already indicated under 5.3, ICT Lab facilities are available only to members of the University community (staff, students and researchers) and intendedsolely for University related purposes. In other words, they are not for business or other profit production or for recreational purposes.

  • Smoking, eating, and drinking are NOT allowed in the ICT Lab
  • All persons in the ICT Lab are expected to have their Unilia ID with them while in the Labs. Without the ID, the user shall be requested to leave the room immediately
  • Mobile phones must be switched off at all times.
  • Users are expected to conduct themselves in a responsible and courteous manner while Lab.
  • Games are strictly prohibited on all ICT Lab resources. Users running games shall be asked to close the game and leave the Lab, or the Student ID shall be taken for reporting to the appropriate Disciplinary Committee..
  • Users should not prevent or disrupt other users from using of any computer and other facility in the  ICT Lab
  • The paper in the ICT Lab is supplied for use in the Lab printers. Any other use is theft
  • Copying of copyrighted software is illegal and is prohibited in the academic computing facilities or elsewhere on Campus.
  • The ICT personnel will not support user in debugging the user’s programs/application, analyze output, help with homework, etc. Please consult your instructor or Lecturer for this type of help.
  • Bags and other personal effects shall be left at the shelf available at the Lab Entrance at the owners’ risk. The University or College shall not be held responsible and liable to any loss of personal belonging in the ICT Lab

Required activities

In making acceptable use of resources, you must:

  • Use resources only for authorized purposes
  • Agree and adhere to policies regarding use
  • Access only files and data that are your own, which are publicly available, or to which you have been authorized access
  • Be considerate in your use of shared resources, refrain from monopolizing systems, overloading networks with excessive data, or wasting compute time, connect time, disk space, printer paper, manuals, or other resources

Forbidden activities

In making acceptable use of resources, you must NOT:

  • Access materials that are inconsistent with the values of the University of Livingstonia, including, but not limited to, pornographic or sexually explicit materials
  • Use copyrighted images, text, or software without permission or in violation of the copyright laws or violate terms of applicable software licensing agreement.
  • Use resources to violate the University rules or engage in any illegal activity
  • Use resources for private financial gain or compensation or for partisan political purposes
  • Use resources to intimidate or single out individuals or groups for degradation or harassment
  • Use resources to provide materials whose nature or volume compromise the ability of the sever to serve other user’ documents
  • Knowingly perform an act that will interfere with the normal operation of computers, terminals, peripherals, or networks, including (but not limited to) knowingly running or installing on any computer system or network. Or, given to another user a program intended to damage or to place excessive load on a computer system or network. This includes programs known as computer viruses, Trojan horses, and worms.

Penalties

Misuse of computing, networking, information, or World Wide Web resources may result in the loss of computing privileges. Users may be held accountable for their conduct under any University or College policies. Violation of any procedures may be referred to an appropriate College or University Disciplinary Committee, to the Dean of Students, or to other Administration officials for action and depending upon the nature of the violation.