Search
School of Informatics and Computing Menu

Computer Classroom Policies

The following policies are in effect in all of the computer classrooms staffed by the School of Informatics and Computing.

Any questions or comments about these policies will be addressed by the Director of Technology Services.

General Rules

Availability

Students not enrolled in the class must vacate the classroom before class begins.

Quiet

School of Informatics and Computing computer classrooms are quiet zones. Students are expected to use low voices when talking and headphones when listening to music or audible computer sounds. Instructor workstations may only be used during classroom time, or if approved by School of Informatics and Computing faculty or staff.

Food & drink

No food or drink is allowed in School of Informatics and Computing classrooms.

Lost & Found

Found items are available from the technology staff in IT 259 or IT 472.

Academic Use

School of Informatics and Computing computer classrooms are for academic use only.  Students using computers for academic work will be given preference to those who are not. This includes students waiting to use equipment; those not involved in academic work may be asked to give up their workstation.

Anyone disturbing the academic environment will be asked to leave.

Access

All School of Informatics and Computing students will have access to designated computer classrooms during open hours on a first come, first served basis. The designated rooms will be available while the building is open. When the building is closed some students may be granted access via their CrimsonCard.  Interested students must fill out a Facility Access Request Form.

The student’s CrimsonCard must be scanned to enable access.  A card scanner is available in IT 259 when the room is open for equipment check-out.  There is a special kiosk on the fourth-floor of the IT building at the reception desk that has a self-service card scanner.  Some special use rooms have on-line electronic locks that require the student’s 10-digit student ID to be submitted to Campus Police so the lock(s) can be programmed.

Each person entering the room must swipe their Crimson Card, even if the door is opened from the inside, or if several people are entering at one time.  The university and the school take the security of people and equipment very seriously.   Propping doors open and allowing unauthorized persons to enter the building and classrooms compromises that security.

At the end of the semester, all card access is revoked. Students must re-apply for the next semester.

Persons not affiliated with IUPUI

Access to School of Informatics and Computing technology resources is a privilege granted to School of Informatics and Computing faculty, staff, and students. Access may also be granted to individuals outside of the school, for purposes consistent with the school’s mission. However, sponsorship of these accounts by a faculty member (or department administrator) is required.

File Storage

No file storage is a substitute for a good backup routine. All users should back up files while working, preferably to removable media such as Box or USB flash drive.

The C: drive of every Windows computer and the Macintosh HD of every iMac computer will be cleared of user data periodically throughout the semester.  All personal files on those drives (including profiles and files on the desktop) will be deleted in the process.

Software

Computers in SOIC classrooms are maintained by SOIC technology staff.  SOIC uses the latest stable version of the Windows and Mac OSX operating systems.   Updates and patches are applied as recommended by the OS vendors and IU’s Security Office.  Operating systems and software used in support of the school’s teaching mission are updated during the summer.  The school rarely does mid-school-year upgrades unless there are problems with versions already installed.

Students may not install software or utilities on any computer in SOIC classrooms, unless directed by faculty or staff. Please submit a service request if software is missing (or needed) (http://soic.iupui.edu/technology/request/)

Violation of this policy will be considered malicious intent (see below).

Malicious intent

Anyone found intentionally and/or maliciously destroying system files on any School of Informatics and Computing computers will be disciplined, including loss of computing privileges and possible academic action.

Printing

IUPUI has a campus-wide pay-for-print policy that went into effect in Fall 2006. The School of Informatics and Computing is covered by this policy.

More information about this policy is available in the Knowledge Base. The KB also has more information about the CrimsonCard that you should read as well.

Special paper

Special paper may not be used in printers without assistance of technology staff. Transparencies may not be printed under any circumstances.

Schedule Posting

SOIC classroom schedules are maintained in Ad Astra.  Search One for the Ad Astra tile.  If, for any reason, a room must be closed during a normally open time, a note will be posted on the door. This practice is not intended to inconvenience students, and will not occur often.