Clicky

Select Page

Policy Governing Information Technologies (IT) Information, Communication, and Technology (ICT) Support

For  detailed information  on the many IT support services available  to  all students, please visit post.edu/ICT. IT support is available 24/7 by calling 888.458.7678 or from the homepage at post.blackboard.com.

If assistance is needed with televisions, phones, computers, or the network, members of the ICT staff may be reached directly by dialing 888.458.7678 option 2, between the hours of 7 am-6:00 pm. For any after hours calls, students are asked to leave clear and accurate messages stating their needs and requests, a daytime phone number, and their residence hall room number so that every attempt can be made to address reported issues in a 24-hour time frame. Questions may also be submitted to the Help Desk at [email protected].

The residence halls are equipped with basic cable access through a contract with the local cable company. Premier channels are not included in the package, nor are they available for an additional cost. Students must provide their own television set with coaxial connectors and a coaxial cable to access cable service.

Students are required to accept the following terms and conditions by logging onto and/or using Post University’s Local Area Network computers, and/or using the Post University email system and the Internet with a personally-owned computer.

  1. Users must operate within the appropriate federal or state laws and Post University policies and must not engage in any conduct that presents a risk to the operating integrity of the systems and their accessibility to other users.
  2. Users must abide by the terms of all software licensing agreements and copyright laws.
  3. Users must not share or make copies of, download or make available on the network, any copyrighted material, unless permitted by a license.
  4. Users must not share any material, software, data, document, sound, picture, or any file that is specified as illegal by any federal or state law, statute, proclamation or decree.
  5. Users must not share any material software, data document, sound, picture, or any file that is considered to be proprietary, privileged, private, or otherwise vital in the operation of Post University including, but not limited to, personnel, student, financial, strategic records and documents, or any material governed by federal and state regulations.
  6. Users must not use the network resources of Post University to gain or attempt to gain unauthorized access to remote computers, networks, or systems.
  7. Users must not use Post University networks to access, produce or distribute pornography either on the Internet or on Post University networks.
  8. Any network traffic exiting Post University is subject not only to provisions of this policy, but also to the acceptable use policies of any network through which, or into which, it flows.
  9. Users must notify the ICT Office, system administrators and the appropriate authorities about violations of computer laws and policies, as well as about potential loopholes in the security of its computer systems and networks by sending an email to [email protected].
  10. Users must respect the rights of other users, including their rights as set forth in other Post University policies for students, faculty and staff. These rights include, but are not limited to: privacy, freedom from harassment and safety of tangible and intellectual property.
  11. Users must not place on any Post University-owned computer system any type of information or software that infringes upon the rights of another person or gives unauthorized access to another computer account or system.
  12. Users must not misrepresent themselves or their data on the network.
  13. Users are responsible for the use of their own accounts. No user may give anyone else access to his or her account, or use a Post University computer account assigned to another user. A user must not attempt to obtain a password for another user’s computer account.
  14. Users are responsible for the security of their passwords. This includes making sure no one else knows it. A user who suspects someone knows his or her password should contact ICT to have that password changed by calling 888.458.7678.
  15. Users must not attempt to monitor other users’ data communications, nor read, copy, download, change or delete other users’ files or software without permission of owner(s).
  16. Users must not attempt to circumvent data protection schemes or exploit security loopholes.
  17. Users must not deliberately perform acts that are wasteful of computing resources or that unfairly monopolize resources to the exclusion of other users.
  18. Users must not deliberately perform acts that will seriously impair the operation of computers, terminals, peripherals or networks. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed network, otherwise blocking communication lines or interfering with the operational readiness of a computer.
  19. Users must not run or install, or give to another user, a program that could result in the eventual damage to a file or computer system and/or the reproduction of itself on any of the computer systems of Post University. This is directed towards, but not limited to, the classes of programs known as computer viruses, Trojan horses and worms.
  20. Users must not use Post University computer systems or networks for solicitation of funds or for commercial purposes. This includes solicitations for charitable or community organizations.
  21. Users must not use Post University networks to distribute chain letters.

Post University treats policy violations of computing facilities, equipment, software, information resources, and network privileges seriously. All violations must be reported to Residence Life staff or directly to ICT by stopping by the ICT Office in Hess Hall or sending an email to [email protected]. Failure to comply with this policy will result in disciplinary action, including loss of computing privileges, fine/restitution, and other sanctions deemed necessary. Alleged violations of the policy shall be processed according to judicial processes outlined in the Student Handbook. Post University may also prosecute abuse under the Computer Fraud and Abuse Act of 1986 or other appropriate laws.

All students are given a username and password to access the Local Area Network. This username and password will remain in effect throughout the student’s tenure at Post University and is deleted upon termination (withdrawal, dismissal or graduation). Each year, prior to the start of fall classes, Post University reviews student mailbox use and storage limits. A user account may be deleted if the student is not registered prior to the first week in August. If the student re-enrolls, a mailbox will be reestablished on the network for campus use. Post University reserves the right to access user mailboxes and deactivate or restrict use of campus email accounts at any time.

Each residence hall room is equipped with a network jack. Students are encouraged to purchase personal computers and to use them in their residence hall rooms. It is the responsibility of the students to ensure that proper care is taken in protecting their computer and the data stored therein. If a user is found to have knowingly violated a network responsibility, his or her network access may be suspended. Depending on the seriousness of the violation, the user may also be subject to other disciplinary actions. Violations of federal or state laws will result in referral to the appropriate legal authorities. Students who violate these conditions face judicial action.

 

Find Your Program

Step 1 of 2

Step 2 of 2

Do you have 15 or more credits from another institution?


Yes

No

Are you, your spouse or parent (if you are 24 or younger) associated with the U.S. Military?


Yes

No
Did you speak with a Post Representative on a Military Installation?


Yes

No
Have you spoken with a Post representative in person?


Yes

No

« Go Back
By clicking the button above, Post University has your consent to use automated technology to call, text and email you at the information above, including your wireless number, regarding educational services. It is not a requirement to provide this consent to receive education services.Standard text message & data rates may apply. Message frequency may vary. Please reply to the initial welcome text message HELP for help. Reply STOP to cancel.  Privacy Policy and Terms & Conditions