91̽»¨

Search within:

IT Services

Welcome

Instructional Technology Support is the launching point for anyone seeking information on various technological services and support offered at 91̽»¨ Southern. Contact IT services at 740.533.4569. For work orders please create a ticket with the .

Mission

The mission of the OHIO Southern Instructional Technology Support Team is to enable, promote and support use of technology for academic excellence. We will focus on providing training & support to faculty, staff and students.

Help Desk Hours

Monday – Friday: 8 a.m. – 5 p.m.

Computers On Campus

OHIO UNIVERSITY SOUTHERN COMPUTER USAGE POLICY AND PROCEDURES

91̽»¨ Southern provides computers for 91̽»¨ students to use. 91̽»¨ students working on course related assignments will have priority in the labs over those using the computers for any non-university related purpose.

Students who need a computer to work on their assignments can come to the Southern Library located on the second floor of the Collins Center.

REQUIREMENT TO USE COMPUTERS ON CAMPUS:

You must be current student with a valid 91̽»¨ ID.

Safe Computer Usage

Sharing 91̽»¨ accounts and/or passwords

If you share your username and password with someone who uses a computer for illegal purposes, you will be considered a suspect during the investigation of those activities. OHIO University uses several different programs to ensure legal usage of computers that access our network, including port scanners, which constantly monitor the activities of users on the OHIO network. You can prevent involvement in these activities by using a strong, private password for your OHIO account.

Leaving workstations unattended and saving passwords

Leaving your workstation unattended while logged in can be just as dangerous as sharing your username and password. In addition to all of the same repercussions for sharing your login information, you could potentially lose data on your local and shared drives if someone accesses your computer with malicious intent. You can press Ctrl+Alt+Delete to lock your workstation any time you're stepping out of your office or away from your workstation. Saving your e-mail passwords or wireless login information in your browser will only increase the likelihood of the loss of personal data.

Torrents and other Peer to Peer programs

While Peer to Peer (P2P) applications are legal, most of the content downloaded through these applications is not. Most data provided to users through P2P networks is compromised copyrighted data that could result in hefty fines and other legal action. In order to combat software, video, and audio piracy, OHIO University has banned all P2P applications, such as uTorrent, Bittorrent, and other popular torrent programs. While scanning for security vulnerabilities, the OHIO network is also monitored for these types of applications. Computers running these applications will have their network capabilities disabled until OHIO Information Security has gathered necessary user information and is provided with the necessary information to ensure all programs of these types have been removed.

Facebook, Twitter, and other Social Media sites

Social media websites are one of the primary outlets for distributing worms, trojans, and other forms of malware to computers. While most users have no need to access these programs during the workday, those who do should be especially careful of links, pop-ups, and browser redirection. Shortened URLs using websites such as bitly.com and TINYUrl.com can further complicate matters, as these links can make potentially dangerous websites indistinguishable from safe ones until the user has already visited the site.

Phishing scams and e-mail attachments

Should you receive a suspicious e-mail from a friend, fellow employee, or a complete stranger - avoid opening the message. These messages generally involve topics such as account activation or deactivation (especially with websites such as PayPal where money can be transferred), online lotteries, inheritance, investments, job offers, healthier living, or bogus petitions against non-existent laws. You should avoid any e-mails of this type unless you're expecting a message in regards to one of these specific topics from someone you know. More information on identifying malicious email and recognizing phishing attempts is available from the Office of Information Technology.

Web Browsing/pop-ups/freeware/worms/malware/plug-ins

If browsing the web is a necessary component of your job details, please avoid installing any free software or web browser plug-ins. Many times these programs and plug-ins include additional worms, trojans, and other forms of malware. If you require a specific piece of software that you have not been provided with, please contact the IT department for assistance in locating and installing the correct software on your machine.

Sensitive and personal information on workstations

A savvy computer user can often recover sensitive information that you believe you've removed from your computer. Traces of files are left on your hard drive, even after they have been deleted. Data that has been deleted from hard drives for several years has been recovered in many cases. In order to reduce the likelihood of your private information being compromised, avoid using your work computer to access personal accounts, banking, and other non-work related websites.

Policies & Procedures

OHIO UNIVERSITY SOUTHERN COMPUTER USAGE POLICIES AND PROCEDURES

Including but not limited to equipment located in the following areas of 91̽»¨ Southern:

Academic Center- Teaching Computer Lab
Collins Center- Library, Student Success Center
Dingus Center- Teaching Computer Labs
Riffe Center - Electronic Media, Media Computer Lab

91̽»¨ Southern provides computer labs for 91̽»¨ students. 91̽»¨ students working on course related assignments will have priority in the labs over those using the computers for any non-university related purpose.

Activities involving University communication and computing resources must be in accord with the University honor codes, employee handbook, student handbooks, and relevant local, state, federal, and international laws and regulations.

91̽»¨ is a state supported school and will not compete with local enterprise. The University, therefore, prohibits the use of computer labs for any for-profit venture.

The spread of computer viruses is an ongoing problem. 91̽»¨-Southern provides the programs and procedures to maintain a virus-free environment. 91̽»¨ is not liable for any damage caused by computer virus infection.

91̽»¨ supports the Software Publisher's Association. The duplication of copyrighted software is a federal crime. Installation of personal software on any University-owned computer is prohibited and includes Downloading of programs from the Internet. Violators may be barred from the computer labs and University sanctions may be applied.

OTHER OHIO UNIVERSITY SOUTHERN COMPUTER LABS POLICIES:

Be considerate of others working in the lab. Please remain quiet. Remember other students are working.Noise should be kept to a minimum.Eating and drinking in the computer labs is prohibited.Use of tobacco products in the computer labs is prohibited.Utmost care of equipment is expected.You must check with the lab staff member on duty in order to use equipment. Computer switching must be approved with lab staff.If you leave your computer unattended, lab staff reserves the right to log you off. Lab staff cannot be held responsible for items left in the computer labs, or documents stored on the hard drives of lab computers. Lab users who disrupt operations, disturb other lab users, or fail to observe computer lab policies will be asked to leave the lab. Refusal to cooperate will result in removal by 91̽»¨ security and loss of privileges to use computer lab facilities on campus.

Lab assistants are instructed to enforce the above policies, report any problems, and ask violators to leave.

SOUTHERN CAMPUS COMPUTER RULES

You must be enrolled as an OHIO student or be a current 91̽»¨ faculty or staff member to use the computer lab. You must present a valid 91̽»¨ ID card to use the equipment in the lab. A driver's license will not be accepted. No children are allowed in the Computer Lab. If there is a waiting list for equipment, a two-hour time limit automatically goes into effect.

COMPUTERS IN THE LIBRARY

Are intended for Library Research. A responsible adult must accompany anyone under the age of 13.

COMPUTERS IN THE LEARNING CENTER

Above rules apply with the exception that individuals who are not students may obtain permission to use computers under specific circumstances.

COMPUTERS IN ELECTRONIC MEDIA

All of the rules apply. Lab is restricted to Electronic Media Majors.