The Computer Service Department
currently operates 16 computer labs and supports approximately 1007 workstations on campus. The campus computing network consists of approximately 51 physical and virtual servers running Windows Server operating systems. The network backbone is built on a 20 gigabit connection to the Internet provided through Arkansas Research and Education Optical Network (ARE-ON), a 50 gigabit connection between buildings via fiber optic connectivity, and a 1 gigabit connection within buildings to individual computers and devices. All College facilities are served by wireless (Wi-Fi) connectivity that is available to students, staff, and guests.
EACC's information and technology system includes all related equipment, wireless networks, wired networks and network devices (specifically including Internet access), are provided for authorized use only. Unauthorized access or use of this computer system may subject violators to criminal, civil, and/or administrative action. Any information on this computer system may be intercepted, recorded, read, copied, and disclosed by and to authorized personnel for official purposes, including criminal investigations. Access or use of this computer system by any person, whether authorized or unauthorized, constitutes consent to these terms.
The Computer Education Center (CEC) has an open computer lab for students to work on school related assignments. Guest accounts are not permitted in this building, guest accounts are only available in the library.
The following guidelines are asked when visiting the CEC
- No food or drinks are to be brought into the CEC.
- Please keep a low tone. Noises echo throughout the CEC and disturb others.
- Please keep cell phones on silent or turned off. All calls should be handled outside.
- The math lab classroom will not be opened until the instructor is present.
- Privileges can be denied for any behavior deemed inappropriate by the CEC staff.
- All campus computer use is monitored. By logging in and clicking ok you consent to the EACC computer use policy.
- Users may not change the configuration of the equipment or software, install personal software, listen or download music and download non school related files from the internet. The intentional introduction of viruses will result in the permanent loss of lab privileges.
- Please do not try to fix computer or printer problems. Contact CEC staff for assistance.
- Please do not allow anyone to use your account. Account sharing will result in the loss of computer privileges.
- Please change your password often. This prevents others from accessing your account.
Computer Use Policies
The computer resources of East Arkansas Community College are available to students, faculty, staff, and members of the community for authorized use in a responsible, ethical, and equitable manner. Access to these resources is a privilege granted to users.
It is the responsibility of the Director of Computer Services to maintain a stable and secure operational environment for all users. As a result, users are expected to be responsive to the suggestions and interpretation of the code by the Director and/or designee.
Users must be aware that an individual's use of College information systems may be monitored.
The following constitutes a Code of Computing Practice to be followed by all computer system users. This includes all computing facilities owned, leased, or controlled by the College.
- Use of the computer facilities is authorized for purposes that conform to the goals and objectives of the institution.
- Users of computing resources are expected to conduct themselves in a manner that does not constitute a danger to any person's health or safety, interfere with, or harass individuals or institutional activities.
- Users must not misuse, modify, damage, or misappropriate in any manner computing equipment, property, data, and other facilities and resources.
- Users are responsible for the use of their computer resources; and as such, they must take precautions against others obtaining access to their computer resources. This includes managing and controlling the use of individual passwords, operational activities, and resource utilization. Users should not share login-password information.
- Users must utilize only those resources that have been authorized for their use and only for the purpose for which the authorization was granted. Unless otherwise noted here, personal, for-profit, or commercial use of college computing resources (i.e. church bulletins, club brochures or materials) is not permitted without written authorization from the appropriate authority. In all circumstances, the fact that a resource is unprotected does not imply permission for an unauthorized person to use it.
- Users shall utilize software only in accordance with the applicable license agreement. The College licenses the use of most of its computer software from a variety of outside companies. The College does not own this software or its related documentation and, unless authorized by the license, does not have the right to reproduce it.
- Users and non-users must not encourage, collaborate, or tolerate the misuse of computer resources or the violations of this code by any other person. It is College policy that anyone with knowledge of violations or suspected violations of computer security measures or controls report this information to the appropriate College authority.
- It is the responsibility of each direct supervisor to monitor the use by their direct reports of computer resources for compliance with College, State, and Federal regulations. It is the expectation of the College that anyone with knowledge of violations or suspected violations of computer security measures or controls will report this information to the appropriate College authority. Should misuse continue, it is the responsibility of the appropriate Vice President to take further action against both the employee and the supervisor.
Faculty and Staff Handbook, Page 25
- The illegal use, downloading, copying, or distribution of materials (i.e. proprietary music, video, software, or database information) via East Arkansas Community College information technology resources is prohibited. According to the U. S. Copyright Law, illegal reproduction of software can be subject to civil damages and criminal penalties including fines and imprisonment.
- Viewers may not use copyrighted and/or protected materials in an inappropriate or unlawful manner.
The above code is intended to work to the benefit of all computer users by encouraging responsible conduct and use of computer resources. Disciplinary action for violating this code shall be governed by the applicable provisions of the policies and procedures of EACC.
E-mail
East Arkansas Community College encourages the use of electronic mail and respects the privacy of users. EACC electronic mail services are to be utilized in support of the teaching, research, and public service mission of the College, and the administrative functions that support the mission.
E-mail services may not be used for unlawful activities, commercial or personal purposes, nor activities which directly or indirectly interfere with the College operation.
Electronic mail systems and services are EACC facilities, as that term is used in other policies and procedures of the College, and users must comply with normal standards of professional and personal courtesy and conduct. Electronic mail, whether or not created or stored on East Arkansas Community College equipment, may constitute a College record and may be subject to disclosure under the Public Records Act or other laws.
Computer personnel or system administrators do not routinely inspect, monitor, or disclose electronic mail without the holder's consent. However, access to EACC electronic mail services is a privilege, and may be wholly or partially restricted without prior notice and without the consent of the email user under certain circumstances. These circumstances include, but are not limited to:
- If there is substantial reason to believe violations of law or EACC policies have occurred, contents of email may be inspected, monitored, or disclosed without the user's consent.
- Computer personnel or system administrators may need to ensure proper functioning of the e-mail system. If this occurs, contents of email messages may be viewed.
In addition, certain activities may directly or indirectly interfere with the College's operation of computing facilities or electronic mail services, may burden the College with noticeable costs, or may interfere with the email user's obligations to the College. These activities are prohibited. They include, but are not limited to:
- Designated College personnel are to be solely responsible for sending email notices regarding deaths, retirements and other human resource-related matters to the campus. Any individual or department wishing to make a general announcement about such events must seek departmental approval. Email not pertaining to College business is not permitted.
- Clicking on links that expose the College to risk of cyber theft.
- Sending and forwarding chain emails or material deemed inappropriate or offensive or unrelated to assigned job duties.
- Spam (exploiting list services, etc. beyond their intended scope).
- Letter bombs (resending the same email repeatedly to one or more recipients to interfere with the recipient's use of email).
- Anonymous email messages.
- Relaying email to servers outside of the accepted email system.
- Accessing or attempting to access information belonging to another individual or EACC office, misrepresenting one's identity, and/or unauthorized use of passwords.
- Sending emails regarding personal items or services. This includes items for sale or giving away and for organizations not affiliated with the College.
Employees who engage in prohibited activities may have their use of email services restricted, or may be subject to disciplinary action.