General Resident Information

REQUEST INFO

Are you or your spouse associated with the US military?

By clicking the button above, Post University has your consent to use automated technology to call, leave a voice message, text and email you at the information above, including your wireless number, regarding educational services. It is not a requirement to provide this consent to receive education services.

  • 1 Step 1 of 2
  • 2 Step 2 of 2

Your information is secure.
View our Privacy Policy.

Television, Computers, and the Post Network 

All residence hall rooms are equipped with cable TV and computer internet access. Students must provide their own equipment (computer, television) to access the Post University information network. If assistance is needed with one of these items, the ICT Helpdesk is available between the hours of 7am-7pm by calling 203.591.7145. A voicemail system will pick up after hours. Students are asked to leave clear and accurate messages with needs and requests, a daytime phone number, and their residence hall room number so that every attempt can be made to address reported issues in a 24-hour time frame. Questions can also be submitted to the Help Desk at ICT@Post.edu

Post Network Use

Students are required to accept the following terms and conditions by logging onto and/or using Post University’s Local Area Network computers, and/or using the Post University email system and the Internet with a personally-owned computer.

  1. Users must operate within the appropriate federal or state laws and Post University policies and must not engage in any conduct that presents a risk to the operating integrity of the systems and their accessibility to other users.

  2. Users must abide by the terms of all software licensing agreements and copyright laws.

  3. Users must not make copies of, download or make available on the network, any copyrighted material, unless permitted by a license.

  4. Users must not use the network resources of Post University to gain or attempt to gain unauthorized access to remote computers, networks, or systems.

  5. Users must not use Post University networks to access, produce or distribute pornography either on the Internet or on Post University networks.

  6. Any network traffic exiting Post University is subject not only to provisions of this policy, but also to the acceptable use policies of any network through which, or into which, it flows.

  7. Users must notify the ICT Office, system administrators and the appropriate authorities about violations of computer laws and policies, as well as about potential loopholes in the security of its computer systems and networks by sending an email to infrastructure@post.edu.

  8. Users must respect the rights of other users, including their rights as set forth in other Post University policies for students, faculty and staff. These rights include, but are not limited to: privacy, freedom from harassment and safety of tangible and intellectual property.

  9. Users must not place on any Post University-owned computer system any type of information or software that infringes upon the rights of another person or gives unauthorized access to another computer account or system.

  10. Users must not misrepresent themselves or their data on the network.

  11. Users are responsible for the use of their own accounts. No user may give anyone else access to his or her account, or use a Post University computer account assigned to another user. A user must not attempt to obtain a password for another user’s computer account.

  12. Users are responsible for the security of their passwords. This includes making sure no one else knows it. A user who suspects someone knows his or her password should contact ICT to have that password changed by calling 888.458.7678.

  13. Users must not attempt to monitor other users’ data communications, nor read, copy, download, change or delete other users’ files or software without permission of owner(s).

  14. Users must not attempt to circumvent data protection schemes or exploit security loopholes.

  15. Users must not deliberately perform acts that are wasteful of computing resources or that unfairly monopolize resources to the exclusion of other users.

  16. Users must not deliberately perform acts that will seriously impair the operation of computers, terminals, peripherals or networks. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed network, otherwise blocking communication lines or interfering with the operational readiness of a computer.

  17. Users must not run or install, or give to another user, a program that could result in the eventual damage to a file or computer system and/or the reproduction of itself on any of the computer systems of Post University. This is directed towards, but not limited to, the classes of programs known as computer viruses, Trojan horses and worms.

  18. Users must not use Post University computer systems or networks for solicitation of funds or for commercial purposes. This includes solicitations for charitable or community organizations.

  19. Users must not use Post University networks to distribute chain letters.

Post University treats policy violations of computing facilities, equipment, software, information resources, and network privileges seriously. All violations must be reported to Residence Life staff or directly to ICT by stopping by the ICT Office in Hess Hall or sending an email to infrastructure@post.edu. Failure to comply with this policy will result in disciplinary action, including loss of computing privileges, fine/restitution, and other sanctions deemed necessary. Alleged violations of the policy shall be processed according to judicial processes outlined in the Student Handbook. Post University may also prosecute abuse under the Computer Fraud and Abuse Act of 1986 or other appropriate laws.

All students are given a username and password to access the Local Area Network. This username and password will remain in effect throughout the student’s tenure at Post University and is deleted upon termination (withdrawal, dismissal or graduation). Each year, prior to the start of fall classes, Post University reviews student mailbox use and storage limits. A user account may be deleted if the student is not registered prior to the first week in August. If the student re-enrolls, a mailbox will be reestablished on the network for campus use. Post University reserves the right to access user mailboxes and deactivate or restrict use of campus email accounts at any time.

Each residence hall room is equipped with a network jack. Students are encouraged to purchase personal computers and to use them in their residence hall rooms. It is the responsibility of the students to ensure that proper care is taken in protecting their computer and the data stored therein. If a user is found to have knowingly violated a network responsibility, his or her network access may be suspended. Depending on the seriousness of the violation, the user may also be subject to other disciplinary actions. Violations of federal or state laws will result in referral to the appropriate legal authorities. Students who violate these conditions face judicial action.

Cable Television Use

The residence halls are equipped with basic cable access through a contract with the local cable company. Premier channels are not included in the package, nor are they available for an additional cost. Students must provide their own television set with coaxial connectors and a coaxial cable to access cable service.

Telephone Use

Post University provides phones in the hallways of all of our residence halls. These phones are available for local calls and any emergencies.

Policy Statement Regarding Anti Virus Software

Because of the inherent dangers associated with the introduction of viruses into computer systems, Post University requires that all students have their computers scanned by the ICT Department prior to connecting their PC to Post University network. Students who are authorized to attach their personal computers to the network must ensure that their computer has virus protection to the same level as Post University-owned equipment. This means that students must have current anti-virus software installed and running on their computers and that information about new viruses and new virus definition files are downloaded on a daily or weekly basis. Expired software or out-of-date definition files is equal to having no anti-virus protection.

It is each student’s responsibility to purchase, install and update his or her own anti-virus software. If, upon scanning, the ICT Department determines that anti-virus software is missing or out-of-date, Post University reserves the right to deny service to the network until the issue is resolved. Once the ICT Department determines that the proper virus protection exists on the computer and that the computer is virus-free, it will issue a verification notice, and the student will be connected to the network. Post University reserves the right to enter a student’s room if it is believed that the computer within the room is infected and disabling the network, the student is running software that has the potential to disable the network, or the student is exhibiting malicious behavior such that the campus network is compromised. Every effort will be made to contact the student prior to entering the student’s room. Post University also reserves the right to take a single or series of computers off-line to ensure the protection of the system.

Campus Printing

Campus printing is handled via print management software called Papercut. This system allows us to regulate printing by associating a value to each page printed. Every account is given $50 per year and the cost is $0.10 per page to print. If an account is depleted of funds, the user can contact IT about recharging the account at cost to the student.

Printing credentials are to be kept private and secure. Do not share your account information. Do not allow other users to print using your credentials.