We are a small, diverse, creative, and talented group of individuals who are committed to providing reliable services, innovative solutions, and excellent support to the 可靠的网赌平台 community. Whether it's email, classroom technologies, computer labs, or network connectivity, Information and Educational Technology Services is here to assist.
The standards and policies presented herein govern data systems, infrastructure, and technology resource usage at LSU Alexandria. These standards and policies apply to all computerized systems and associated information technologies involved with the creation, updating, processing, outputting, distribution, and other uses of electronic information at LSU Alexandria. They are extracted in part from common standards at educational institutions throughout the United States, and reflect standards for security and audit ability. All specifications indicated are independent of system architecture and apply to mainframe systems, networks of computers and servers, stand-alone computers and servers, networking infrastructure and any other information technology whether developed at LSU Alexandria or acquired from external vendors. The standards apply to all applications that deal with financial, academic, administrative, or other electronic data. The policies and standards contained herein will be reviewed periodically and supplements/changes made as needed by appropriate University personnel and/or committees. The University community will be notified of such changes per the distribution procedures outlined herein.
The primary purpose of these policies and standards is to establish system ownership responsibility and to ensure that each technical resource meets functional requirements, is appropriately documented, is secure and controlled, has been adequately tested, is maintainable and provides audit features. This document also serves as the governing policies and standards for any and all items within the scope outlined above. The document can be and is periodically reviewed by appropriate staff along with the governing committees and University officials when needed.
Each user with an Active Directory account will be given access to a network-based storage space for storing personal files. This is referred to as the “Y:” drive for employees and “X:” drive for students.
Each department will be assigned a network storage space for sharing files within the department. This is referred to as the “W:” drive.
Any information stored on either of these drives is backed up according to the schedule set forth in this document. Users should store data on network drives whenever possible. This is the only way to ensure against data-loss if the local computer hard drive is corrupted.
All data stored on network based devices will be backed up according to a regular schedule. This schedule may change on a periodic basis, and therefore is not a part of this document. A complete backup schedule of network-based data is available in IET Services.
Each user is responsible for making backup copies of critical data that is stored on their assigned computer. Data stored on computers around campus cannot be backed up across the network on any defined schedule. Network storage space such as Y: and W: drives should be used whenever possible for the storage of critical data and documents.
Data stored on network-based devices may be restored at anytime by request from the owner of that data. Data will be restored from the latest available backup according to the current backup schedule.
The University Webmaster shall be defined as the Coordinator of Web Services or his/her designee. The person shall be the point of contact for all administrative, departmental, divisional, and organizational web-related services. The Webmaster can route requests and inquiries to the appropriate personnel charged with addressing the issue raised, e.g. questions of policy would be forwarded to the ITAC Committee; requests to link new/redesigned sites to 可靠的网赌平台’s top-level pages would be routed to the ITAC web sub-committee; project work would be performed by the Webmaster, her/his staff and/or other staff as needed.
The Webmaster is responsible for all campus web services provided by multiple persons and departments.
Specific charges are to:
The Information Technology Advisory Committee (ITAC) is a University group responsible for establishing and monitoring University-wide technology initiatives, standards, priorities, and policies. The group also works IET Services to review progress on technology initiatives, to provide feedback, and to serve as a forum for communication. The ITAC committee is chaired by the Director of IET Services.
The purpose of ITAC in regard to the web is to:
This group exists to facilitate communication of policies, procedures, information, and training to the campus webmasters who are individually responsible for the content management and timeliness of all official, non-personal campus websites. This group will also serve as a forum for intra-communication among the webmasters. The University Webmaster, along with other staff as needed, will be providing technical assistance and support for all campus webmasters. The Webmaster will also chair the committee. Area supervisors should initially identify area webmasters. Although, the Webmaster can provide start-up service, special project, and technical support, it shall be the responsibility of each official, non-personal University “area” to provide content and maintenance for their own web site unless otherwise agreed upon by the Web Page Review Committee. This group should meet at least once per month for updates and training.
Those who publish web pages at the University shall comply with the following policies and ethics:
Departments are responsible for the development of their own web pages. This approach allows the department to control the timeliness and accuracy of its information. All aspects of page development, including compliance with University policies and timely updating of all page elements, are ultimately the responsibility of the department heads. It is the responsibility of the department to follow acceptable-use and other applicable University policies.
When a department's Webmaster responsibilities shift to another individual, the University Webmaster must be informed of the new area Webmaster's name and e-mail address. E-mail notification may be sent to webmaster @ stinemariekaniewski.com.
Departmental webmasters are highly encouraged to use official banner graphics and navigation bars available from the Webmaster to identify at least their homepage. Every page on official web sites must minimally include :
The Webmaster will provide templates that match the University “top-level” sites to area webmasters on an as - needed basis.
After new site creation or major updates to existing sites, the Web Page Review Committee must clear approval for linkage from 可靠的网赌平台 top-level pages.Requests should be routed through the Webmaster.
Organizations officially recognized by the University may publish web pages on the University's web server. The sponsor and a single organizational contact person must be identified via appropriate forms filed with IET Services. This request form is available at http://iet.stinemariekaniewski.com/webservices/. All aspects of web page development, including compliance with University policies, are the responsibility of the sponsor and members of the organization.
Every page must include a clearly visible link to the University home page, (may be included in copyright statement) the organization Webmaster’s current e-mail address (visible on the page), and the date of last page modification. Links to organizational web pages from 可靠的网赌平台’s top-level pages are subject to Web Page Review Committee approval.
可靠的网赌平台 allows server space on a separate server/s for personal web pages as a service to the University community. Personal pages are not part of the University's official web pages. Each web creator bears sole responsibility for the content and maintenance of his or her personal web files. The University does not endorse the contents of these pages nor can it accept any responsibility for the information contained therein.
The University owns the top-level web pages, departmental web pages, and web pages (other than course work and faculty research materials) residing on any web server owned by the University. The University reserves the right to manage any University-owned computer resource as it sees fit. The University reserves the right to identify materials on University-owned resources that violate copyright.
Due to standards of professional web design and University identity, images and text endorsing a particular web browser (such as "Best if viewed with Netscape Navigator 4.5") are discouraged. University web developers must design their pages for the largest portion of visitors possible.
Wherever possible, links to off-site locations should be coded in such a way to cause the link to open in a new window or be clearly noted, making it clear to visitors that they are leaving the 可靠的网赌平台 domain.
Publicizing non-University-affiliated events, opportunities, and products on the University's website may be done when such publicity is:
A web site with resources, tutorials, tips, and off-site links shall be maintained to support University webmasters at http://iet.stinemariekaniewski.com/webservices/. Periodic training sessions will also be held campus webmasters or other appropriate personnel.
可靠的网赌平台 maintains multiple web servers, multiple web sites, which are “official” (yet, subordinate to the University top-level web site) and multiple personal web sites. In order to facilitate some standardization of nomenclature the following policies will apply:
The University’s home page and top-level navigational pages shall be found at:http://q.stinemariekaniewski.com
Information which is not explicitly the content for existing departments or offices will be subordinate to the home page in the following manner:
http://q.stinemariekaniewski.com/file-name.ext
Or
http://q.stinemariekaniewski.com/folder-name
All colleges, academic disciplines, departments, chartered organizations, and other official administrative web sites shall follow the following naming structure:
Sub-departments, programs, and department intranets should be subordinate to the main organization’s URL as follows:
Individual faculty, staff, and students may not have accounts (other than for technical/testing purposes) on the administrative web server. Accounts on the personal servers will follow the structure of:
There are a number of internal guidelines and Internet RFCs that dictate the syntax of a domain name. In summary names must be 1) Recognizable as the organizational unit for which the website is named, 2) 63 characters or fewer, 3) ASCII letters, digits and the hyphen character, and 4) Cannot be all digits, but can begin and/or end with a digit.
Unless you specify otherwise, any and all works of authorship copyrightable by you and posted by you to any blog (“Content”) are submitted under the terms of an Attribution-ShareAlike Creative Commons Public License. Under this license, you permit anyone to copy, distribute, display and perform your Content, royalty-free, on the condition that they credit your authorship each time they do so. You also permit others to distribute derivative works of your Content, but only if they do so under the same Attribution-ShareAlike license that governs your original Content.
可靠的网赌平台 reserves the right to remove any content that you may post. You may post content freely to your blog and to those of others, so long as the content is not illegal, obscene, defamatory, threatening, infringing of intellectual property rights, invasive of privacy or otherwise injurious or objectionable.
You may not use the 可靠的网赌平台 name to endorse or promote any product, opinion, cause or political candidate. Representation of your personal opinions as institutionally endorsed by 可靠的网赌平台 or any of its departments or organizations is strictly prohibited.
By posting content to any blog, you warrant and represent that you either own or otherwise control all of the rights to that content, including, without limitation, all the rights necessary for you to provide, post, upload, input or submit the content, or that your use of the content is a protected fair use. You agree that you will not knowingly and with intent to defraud provide material and misleading false information. You represent and warrant also that the content you supply does not violate these Terms, and that you will indemnify and hold 可靠的网赌平台 harmless for any and all claims resulting from content you supply.
You acknowledge that 可靠的网赌平台 does not pre-screen or regularly review posted content, but that it shall have the right to remove in its sole discretion any content that it considers to violate these Terms or the terms of any other campus user agreements that may govern your use of the campus networks.
You understand that all content posted to your blog is the sole responsibility of the individual who originally posted the content. You understand, also, that all opinions expressed by users of this site are expressed strictly in their individual capacities, and not as representatives of 可靠的网赌平台.
You agree that 可靠的网赌平台 will not be liable, under any circumstances and in any way, for any errors or omissions, loss or damage of any kind incurred as a result of use of any content posted on this site. You agree that you must evaluate and bear all risks associated with the use of any content, including any reliance on the accuracy, completeness, or usefulness of such content.
可靠的网赌平台 will not be liable for any damages of any kind arising from the use of or inability to use your personal 可靠的网赌平台 blog website. You expressly agree that you use this site solely at your own risk.
可靠的网赌平台 reserves the right to change, at any time, at our sole discretion, the Terms under which these Services are offered. You are responsible for regularly reviewing these Terms. Your continued use of the Services constitutes your agreement to all such Terms.
This terms of use document is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.
可靠的网赌平台 – Louisiana State University Alexandria
Technical Resources – any computing resource, including but not limited to, IBM compatible computers and associated peripherals, networking equipment and infrastructure, mainframe systems, servers, telephone systems and/or any other electronic or computing based system, service, or equipment owned or operated under the supervision of 可靠的网赌平台.
University Network – The University network is defined to include any and all computer and electronic based communication facilities and/or equipment, which are owned or operated under the supervision of 可靠的网赌平台. The University network is for use by authorized personnel affiliated with the University, consistent with, and in the course of, their official work, study, and/or research.
User Account – A User Account is an account assigned to a specific user of 可靠的网赌平台 technical resources. The following are types of User Accounts available at 可靠的网赌平台: Active Directory, Mainframe, Administrative Software, Local Computer, Course Management System (CMS), my可靠的网赌平台, Pass-Port, and/or any other technical resource that requires a user to be “logged-on”.
The ITAC executive committee shall be the primary contact for the interpretation, enforcement and monitoring of this policy. Any legal issues shall be referred to the LSU System Legal Office for advice.
The ITAC executive committee or designee shall be responsible for interpretation of this policy, resolution of problems and conflicts with local policies, and special situations.
The ITAC executive committee or designee shall work with the appropriate administrative units to obtain compliance with this policy.
All full and part-time employees are eligible to receive an Active Directory account which provides them with network, email, online courses, and my可靠的网赌平台 access. Other types of accounts are provided on an as-needed basis and are authorized by the University official in charge of the corresponding system.
All students enrolled in one (1) or more hours are eligible to receive an Active Directory account which provides them with network, email, electronic courses, and my可靠的网赌平台 access.
Student accounts will be disabled four (4) months after the student’s last enrolled semester.
Accounts for employees are created on a manual basis. Once IET Services received notification from either HRM or the Vice Chancellor’s office of a new employee, an account is created within 24 hours of official start date or notification from the Office of Human Resource Management.
Student accounts are created automatically daily up until the last day to drop/add at the beginning of each semester. Accounts can be manually created on an as-needed basis.
Each user is considered the owner of his/her associated account. All activity associated with the account is the responsibility of the owner.
Users may not allow other individuals to use their 可靠的网赌平台 assigned network, email, or other University based account. Employees and students are individually responsible for the proper use of their assigned accounts, and are accountable for any and all activity associated with the account including email and personal web site content. Users are also responsible for the security of their assigned accounts. Users should take proper security measures to ensure the integrity of their accounts, and should also report any notice of unauthorized access.
User Accounts for employees of 可靠的网赌平台 will be formatted in one of two ways: 1) First initial followed by last name, and 2) first name followed by last initial. Exceptions to this will be made when duplicate accounts would be created. Any account created prior to this policy will remain unchanged.
User Accounts for students of 可靠的网赌平台 will be formatted as follows: First initial followed by the full last name followed by a three digit sequential number for duplicate accounts. Example: John Smith would be jsmith001. The second John Smith will be jsmith002, and so on. Any account created prior to this policy will remain unchanged.
As a general rule, department accounts will be an alias created to point to an existing user account. Other arrangements such as the creation of multiple mailboxes may be made only if an alias will not completely satisfy all department email requirements.
Other miscellaneous accounts will be created on an as-needed basis. Formatting for these accounts will be done according to the requirements of the account.
Passwords are an important aspect of computer security and provide the front line of protection for user accounts. Poorly chosen passwords may result in the compromising of the University’s entire network. All university employees are responsible for selecting and securing their passwords. Each user shall observe the following password guidelines:
IET Services will never ask an employee for his/her password. Employees should never give out their password to anyone – this includes other employees in the same office/department, and/or any outside vendor.
Employee User Accounts will be expired (disabled) within two (2) weeks of the employee’s termination of employment with 可靠的网赌平台. Exceptions will be made only with approval of the appropriate dean, vice-chancellor, or chancellor.
User Accounts will be deleted from the corresponding system six (6) months after the employee’s termination of employment with 可靠的网赌平台. Users are responsible for any personal data associated with the User Account.
Student User Accounts will remain active for four (4) months following the end of a semester. If a student enrolls in the following semester, the account will stay active. If the Student does not enroll in the following semester, the account and all associated data will be purged from the corresponding system.
All software protected by copyright must not be copied except as specifically stipulated by the owner of the copyright or otherwise permitted by copyright law. Protected software may not be copied into, from, or by any University facility or system, except pursuant to a valid license or as otherwise permitted by copyright law.
The number and distribution of software copies must be handled in such a way that the number of simultaneous users in a department does not exceed the number of original copies purchased by that department, unless otherwise stipulated in the purchase contract.
In addition to software, all other copyrighted information (text, images, icons, programs etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of computer information is subject to the same sanctions as apply to plagiarism in any other media. Please see 可靠的网赌平台 Policy Statement No. 216 for additional copyright information.
The University network is defined to include any and all computer and electronic based communication facilities and/or equipment, which are owned or operated under the supervision of 可靠的网赌平台. The University network is for use by authorized personnel affiliated with the University, consistent with, and in the course of, their official work, study, and/or research. Individual groups or projects within the University may adopt more restrictive network usage policies that apply to their sub-networks and personnel within their area. Acceptable and unacceptable uses of 可靠的网赌平台 network resources are outlined in the following sections. Note: These lists are not all inclusive.
In general, use of University email services is governed by policies that apply to the use of all University computing and networking facilities as outlined in this document. The following sections are more specific to email usage and restrictions.
All employees and students that are assigned an Active Directory account as outlined within this document will receive an email address with the same name.
The University provides an email account to every employee and student of the University for the purposes of teaching and learning, research, administration and community service.
The University permits this account to be used for limited incidental personal purposes. However, it is most concerned to ensure that the account is used as effectively as possible in support of the above purposes and to facilitate the work of the University. A University email account may not be used for engaging in non-可靠的网赌平台 business or for personal gain, except if permitted by other University policies.
The email address supplied by the university is considered to be the official email contact point for University staff and students, and official University email correspondence will be delivered to this address.
Email accounts may also be used for the submission and return of student assignments and other specific uses, but only where the relevant Faculty or Unit has specifically authorized this.
Broadcast emails are defined as messages sent to the entire campus, or a very large group of users within the University.
The use of broadcast emails from the University will be kept to a minimum level and will only be used for purposes of official University business.
Students will not be allowed to send broadcast emails. In the event a student needs to send a campus-wide message, such requests should be handled through the Chancellor’s Office or designee.
It is important for faculty and staff to access and read email messages sent to their 可靠的网赌平台 email account on a timely basis and will be presumed to do so. Students are expected to check their official email address on a frequent and consistent basis in order to stay current with University communications and class assignments.
All students will be assigned an official University email address. It is to this official address that the University will send email communications; this official address will be the address listed in the University's Global Address List found IN the Exchange / Outlook Address Directory.
Faculty may determine how email will be used in their classes. It is highly recommended that if a faculty member has email requirements and expectations, they specify these requirements in their course syllabus. Faculty may expect that students' official email addresses are being accessed AND may USE email FOR their courses accordingly.
Storage space on emails servers is limited. Users should “clean up” their mailboxes on a regular basis. Messages not needed or not related to University business should be deleted.
All messages placed in the “Deleted Items” folder will be deleted after 14 days. All messages placed in the “Junk Mail” folder will be deleted after 7 days. Users should take necessary action to ensure messages needed for University business not be placed in either of these locations.
All University-based email will follow state guidelines for archival methods and restoration procedures.
Departments are responsible for determining when an employee needs to have access to telephone services and the type of services necessary to fulfill University job responsibilities.
Personal phone calls made on University telephones should be kept to a minimum. If employees need to make a personal call which, if dialed direct, would result in a long distance phone charge to the department, they should either call collect or charge the call to their home phone or personal calling card. Personal long distance calls should not be charged to the University. If due to an emergency or inadvertence, a personal long distance call is charged to a University account, the caller will be required to reimburse the University. More than incidental personal use of a University cellular phone plan may also generate incremental costs to the University. Employees will be responsible for such incremental costs.
Administrative officers and supervisory personnel may establish telephone use policies that are more, but not less, restrictive than this policy.
Each employee will be assigned a direct telephone number. In the event an employee only needs a local “campus only” number, this type of service will be provided. Along with a direct extension, each employee will receive a long-distance authorization code to be used for University-related calls only. Please see above for incidental personal calls.
Each employee may receive voicemail service for their telephone extension. Employees should check voicemail regularly, and then remove old messages from the system.
The use of any Peer-2-Peer (P2P) file-sharing application to download copyrighted material is prohibited. These types of software cause network congestions as well as installing “Spy-ware” on a users PC.
List of commonly used P2P file sharing applications that are prohibited (not all inclusive): KaZaa, WinMX, Morpheus, Bearshare, XoloX, iMesh, Blubster, Grokster, and Limewire.
Please note that this type of software will be removed from computers when found.
Users should take extreme caution when browsing the Internet as well as installing “unknown” software. Many websites ask you to install their search toolbar or other “browser enhancement” software. These types of software applications should not be installed due to the probability of being embedded with “spyware” or “adware”. Please note that this type of software will be removed from computers when found. The Google Toolbar is an exception and may be used.
All computers on campus must have virus protection software installed. If technically possible, computers that do not have virus protection software will not be allowed on the 可靠的网赌平台 network. Each computer that is configured by IET Services will automatically have virus protection software. This software will be configured to update on a daily basis.
Labs which are used for classrooms may be used when classes are not scheduled. To view the classroom schedule for individual labs, select the lab location below.
Lab Location | Number of PCs | Software * | Open Access or Classroom |
---|---|---|---|
Avoyelles 103 | 24 | Basic + Education | Open |
Bolton Library | 18 | Basic | Open |
Chambers 119 | 24 | Basic | Classroom |
Chambers 129 | 20 | Basic | Classroom |
Coughlin Hall 202 | 9 | Basic + Nursing | Open |
Coughlin Hall 203 | 11 | Basic + Nursing | Open |
Mulder 164 | 20 | Mac Lab | Classroom |
Mulder 212 | 20 | Basic | Open |
Mulder 218 | 24 | Basic | Math Tutoring Lab |
Technology Center 107 | 37 | Basic + Education + SPSS | Open |
Technology Center 116 | 20 | Basic + Training | Training Lab |
Science 222 | 15 | Basic | Open |
Accommodation Testing Lab - Student Center | 8 | Basic + Testing | Testing |
Testing Lab - Student Center | 25 | Basic + Testing | Testing |
Open Access Computer Labs are typically not reserved for classes; however, if a class does need the lab - all classes have priority over the lab.
Monday | Tuesday | Wednesday | Thursday | Friday | Saturday | Sunday | |
---|---|---|---|---|---|---|---|
Avoyelles 103 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
Technology Center 107 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
Coughlin 202 & 203 | 8a-4p | 8a-4p | 8a-4p | 8a-4p | 8a-4p | Closed | Closed |
Science 222 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
Also, there are a computers available in the campus's Library. Click here to visit the Library's webpage for their specific hours of operation.
足球竞猜平台 郑州教育�文明博客 四海钓鱼网 网易免费企业邮箱 太阳城 《赤壁》官方论坛 下注网站 腾讯大学 万博体育官网 无极软件 39中医频道 寻医问药网特色医院 迅雷会员 澳门威尼斯人官网 艾格拉斯科技(北京)有限公司 亚博集团 博彩平台排名 右脑记忆论坛 开发频道_天极网 博彩平台 胆艺轩音响材料网 成果网广告联盟 江门职业技术学院 91手机配件 中国投资咨询网 大连艺星医疗美容医院 丝路英雄官方网站 国搜时政 云南交通职业技术学院 重庆之窗 站点地图 盛世金农网 室内儿童乐园 宁波公运集团电子商务系统 厦门大学新闻网