This section of the policy applies only to computers located in Olin 207 or the Great Oaks Hall public computer lab
Faculty members who need non-standard applications loaded on the lab computer image must bring an installation CD to the Help Center at least six weeks before they need the application on the machine.
Faculty members who need non-standard applications loaded on five or fewer lab computers must bring an installation CD to the Help Center at least two weeks before they need the application on the machine.
In either case, along with the installation CD, we must have evidence of licensing to install the software on an individual computer.
IT will follow the procedure below in the event that a user has compromised security precautions that have been installed on his or her machine.
IT staff will examine the machine to confirm that there actually is a security problem
In the case there is a problem, IT staff will inform users of the importance of security on the machine and advise them of ways they can avoid compromising the security feature again.
IT staff also may install computer security software to monitor for and/or prevent users from making inappropriate changes to their computers.
With authorization from the Vice President of Technology and the user’s supervisor, IT staff may monitor a user’s activity for attempts to change settings or circumvent computer security.
In the cases of repeated situations in which a user compromises security precautions on a Wofford-owned computer, IT will notify the user’s supervisor for appropriate disciplinary action.
If the behavior persists, IT will remove the user’s machine.
IT will follow the following procedure in the event that a user has improperly configured application software to the extent that it is unusable.
IT staff will reinstall the basic software (OS and standard applications) that was on the computer when it was originally placed in service
In the case of repeated incidences of improperly configured application software, IT will no longer furnish technical support to that user for this software.
Computer Management Policy Last updated: 18 July 2008