Computer Labs

The primary goals of the computer labs and classrooms is to help students succeed in technology-based classroom assignments and to provide access to equipment that will support the needs of instruction.

The computer labs support the curriculum of the college as well as helping students and instructors get the most out of technology-based assignments. 

  • Allsop Computer Lab (131 Nielsen Hall, Main Campus) 

    Internet Guidelines 
  • Accessing Internet is a privilege granted for the primary purpose of conducting research, completing class assignments, and gaining familiarity with evolving electronic communications.
  • Users shall not send offensive, threatening, abusive, obscene, or other such messages to anyone who may be using the system.
  • Users shall not use Kirkwood’s computing resources to copy, generate, or transmit obscene files publicly accessible.
  • Each user will be financially responsible for any unauthorized commitments made through Internet.
  • Users must follow the guidelines as outlined in the AA/EEO policy on Hostile Environments including the viewing and/or printing of any material considered to be offensive or obscene.
  • Users shall not engage in invasion of privacy, unauthorized access, violation of copyright laws, or any other activity prohibited by these guidelines or by law.
  • Access to the Internet may be denied or revoked at any time.

Procedures and Guidelines Summary

Kirkwood Community College Information Technology facilities and accounts are to be used for college-related activities for which they are intended and authorized.

If you use the College’s information technology resources or facilities, you have the following responsibilities:

  • The software made available by the College has been licensed by the College for your use. As a result, its use may be subject to certain limitations.
  • Use College owned microcomputers and advanced workstations for College related projects only.
  • No food or drink is allowed in the open lab.

Access to the College’s Information Technology facilities is a privilege granted to students, faculty, and staff. Staffing is provided to help students. The College reserves the right to extend, limit, restrict, or deny computing privileges and access to its information resources.

The College characterizes misuse of information technology and information resources privileges as unethical and unacceptable and as just cause for taking disciplinary action. Misuse of information technology and information resource privileges includes, but is not restricted to, the following:

  • Attempting to modify or remove computer equipment or other equipment supporting information technology, software, or peripherals without proper authorization. i.e., The installation or removal of software, peripherals, cables, or any other equipment from the workstation or the network.
  • Accessing computers, other equipment supporting information technology, computer software, computer data or information, or networks without proper authorization, regardless of whether the computer is owned by the college. (That is, if you abuse the networks to which the College belongs or the computers at other sites connected to those networks, the College will treat this matter as an abuse of your Kirkwood computing privileges.)
  • Circumventing or attempting to circumvent normal resource limits, logon procedures, and security regulations.
  • Using computing facilities, computer accounts, computer data, or other information resources for purposes other than those for which they were intended or authorized.
  • Using College Information Technology resources for commercial purposes or non-College related activities without written authorization from the College.
  • Sending fraudulent computer mail, breaking into another user’s electronic mailbox, or voice mailbox, or reading someone else’s electronic mail without his or her permission.
  • Sending any fraudulent electronic transmission, including but not limited to fraudulent requests for confidential information, fraudulent submission of electronic purchase requisitions or journal vouchers, and fraudulent electronic authorization or purchase requisitions or journal vouchers.
  • Violating any software license agreement or copyright, including copying or redistributing copyrighted computer software, data, or reports without proper, recorded authorization.
  • Violating the property rights of copyright holders who are in possession of computer generated data, reports, or software.
  • Using the College’s computing resources, voice mailboxes and telephones to harass or threaten other users.
  • Taking advantage of another user’s naiveté or negligence to gain access to any computer account, telephone account, data, software, or file that is not your own and for which you have not received explicit authorization to access.
  • Physically interfering with other users’ access to the College’s computing facilities.
  • Encroaching on others’ use of the College’s computers (e.g., disrupting others’ computer use by excessive game playing; sending frivolous or excessive messages, either locally or off-campus (including electronic chain letters and unauthorized electronic “bulk” mailings); printing excess copies of documents, files, data, or programs; modifying system facilities, operating systems, or disk partitions; attempting to crash or tie up a College computer; damaging or vandalizing College computing facilities, equipment, software, or computer files) attempting to degrade system performance or capability.
  • Using accounts assigned for another’s exclusive use.
  • Using Kirkwood’s computing resources to copy, generate or transmit obscene materials, transmit obscene language or making obscene files publicly accessible.
  • Disclosing or removing proprietary information, software, printed output or magnetic media without the explicit permission of the owner.
  • Posting credit card numbers or passwords in publicly accessible locations on computer systems.
  • Reading other users’ data, information, files, or programs on a display screen, as printed output, or via electronic means, without the owner’s explicit permission.

The College will keep automatic logs of user activity for accounting, allocation of resources and facility utilization, however, the College will not normally monitor individual usage of any general facility. The College reserves the right to monitor and record the usage of all facilities if threatening or abusive behavior has been reported. The College has the right to use information gained in this way in disciplinary or criminal proceedings, as permitted by Federal and State Law.

Note: The above information is an interpretation; all other information in this document is directed from the Kirkwood Community College Board approved Policy and Procedures manual.