Guest Computer Usage Policy

The computing and network resources provided by Goshen College are intended to support the academic mission of the institution. Primary use of computing facilities are for students, faculty and staff of Goshen College. Access by campus visitors is allowed, but limited to the availability of computers, and for a specified period of time. During the academic year, priority will be given to Goshen College students.

All campus visitors wishing to use Goshen College's computing facilities must present a current form of identification (driver’s license, school ID, work ID, etc.), which will be held as collateral. You must also fill out the sign-in form.

  • Guest accounts are limited for a period of 12 hours, with a maximum repeating visit of two consecutive days within a 1-week period. Exceptions to this policy will require some form of departmental sponsorship or official reason (ie. conference attendance).

  • In the event that a computer is needed by Goshen College students, faculty, or staff, you will be required to relinquish your use of the computer.

  • You should use a storage device such as a flash drive if you wish to save your work.

  • Visitors are allowed to print, however print credit must be purchased prior to printing. See the Student Technology Assistant on duty for assistance.

  • Please log off when finished. Computers that are inactive for more than 15 minutes will automatically log off and any unsaved data will be lost.


Computer Account Usage Guidelines:
A guest computer account is a privilege granted to visitors. The IT Services Department reserves the right to suspend or amend this privilege if you do not follow the guidelines outlined below:

  1. You may not install software on lab computers, including but not limited to games, ICQ or instant messengers, media players, etc. If you need a specific piece of software for academic purposes, please talk to a staff at the Help Desk to find out the appropriate procedure for having it installed.

  2. Please do not re-configure computers, personalize desktops, or alter another user's files. Please do not move computers or tamper with their cables. If you have a legitimate reason for wanting to alter a computer station, please ask a staff member at the Help Desk to find out the appropriate procedure.

  3. Do not intentionally damage or destroy equipment, software, or data belonging to Goshen College or to other users, including adding, altering or deleting files on computer workstations or other computer equipment. You will be held liable for any such damage.

  4. Do not violate or attempt to violate the Goshen College computer systems or network integrity, including attempts to bypass network security functions, obtain restricted passwords, or alter the configuration of computer workstations in any way.

  5. Do not violate or attempt to violate another company’s, organization’s, or person’s computer systems or network integrity, including attempts to bypass network security functions, obtain restricted passwords, or alter their configuration of computer workstations in any way.

  6. Do not perform any attacks on networks or systems within or beyond Goshen College.

  7. Do not use the Internet for any illegal activity.

  8. Do not use the computing resources for commercial purposes, or file sharing, including advertising for or promotion of third party businesses, promotion of affiliate programs on GC websites, or receiving payment for your use of GC computers or network bandwidth.

  9. Lab computers are rebuilt periodically, wiping out all locally saved files. To ensure that your personal files do not get destroyed, please do not save them to lab hard drives. Instead, save them to removable media such as a flash drive or writable CD/DVD.

  10. Use of the computer facilities should not hamper or interfere with the ability of other students to do academic work. Activities to be avoided include but are not limited to excessive computer volume, loud conversation or laughter, use of offensive language, viewing of offensive or explicit imagery, cell phone calls, and other disruptive behavior. Be courteous to your fellow lab patrons by turning off your pager or cell phone ringer, and by taking all personal conversations and/or cell phone calls outside the lab.

  11. Be considerate of others around you and don't be disruptive with playing of music or viewing of videos, etc. Headphones are available for check-out from the Student Technology Assistant. An official form of ID is required and will be held as collateral.

  12. Please do not put special paper into the paper trays of the lab printers. The wrong paper can cause damage to the printer which you will be held financially liable for. If you would like to print on special paper, please ask a staff member at the Help Desk for assistance.

  13. Keep our computer lab clean! Please dispose of your own trash, and pack out any items that you brought in.

  14. Food is not permitted in the lab. Drinks in open containers are not permitted in the lab. Items can be stored at the Help Desk until you leave the lab. 

  15. Children under 10 years of age are not permitted in the lab without adult supervision.

  16. Do not harass others, including but not limited to, sending intimidating, threatening or sexually harassing messages via email or other electronic communication.  

  17. Do not send mass email or spam of any nature via email, social media or other forms of electronic communication.

  18. Viewing of pornography or other sexually explicit materials in the lab is not appropriate. If anyone in the lab sees you engaging in such activity, you will be asked to stop the activity immediately and/or leave the computer lab.

  19. Do not use the computing resources for viewing, promoting, distributing, or printing any type of illicit  images, videos, or other  material. If you have legitimate academic need for viewing such materials (as verified by your instructor), please ask a staff member at the Help Desk about arranging a more private location where other lab patrons will not be disturbed by your activity.

  20. Do not violate copyright laws. It is a violation of college policy and federal law to participate in copyright infringement. Copyrighted materials include, but are not limited to, computer software, audio and video recordings, photographs, illustrations, artwork and written material. Violators are subject to legal liability, even if the work did not contain a written copyright notice. The IT Services Department complies with all RIAA and MPAA complaints and will revoke the violator’s internet access if they are found to be in violation of copyright laws. 

  21. Use of Goshen College computing facilities for gaming is strictly prohibited.



Reviewed and updated 10/9/14, Patricia Goodman, Pamela Kistler-Osborne


Comments