Policies

The following policies govern the usage of information technology services at Wesley Biblical Seminary.

  1. The use of Wesley Biblical Seminary computer resources is a privilege. It is not a right.
  2. Be respectful of other lab users, lab equipment and area at all times in the computer labs.
  3. Access to the computers or computer-related equipment in the WBS computer lab is limited to current WBS students with paid computer lab access, and faculty/staff members with valid WBS ID cards. Visitors may use the lab as part of officially sanctioned Seminary events.
  4. Seminary computers may be heavily used at times. Other users may consider computers unattended for more than 15 minutes available for use.
  5. All noise levels (including: talking, music, muffled headphone noise, etc.) in the lab should be kept to a minimum so that others are not disturbed. The computer labs are to be used as a study environment.
  6. Users are to clean up the area around the computer they have used as they leave. This includes making sure all removable storage is removed from the computer and any unwanted paper is placed in the trash.
  7. Lab staff on duty during normal office hours will be available to advise users with computer problems and how to do computer related tasks, but are not available to assist with users' academic work or other college-related tasks and cannot do work on the users' behalf.
  8. Users of the computer lab and equipment must also abide by the code of conduct as explained in the WBS Handbook.
  9. By using any computer or computer equipment at WBS, you agree to abide by this policy.

Wesley Biblical Seminary (WBS) utilizes the Google Apps for Education suite of Internet services. Google Apps accounts - which include a wbs.edu Gmail account - are freely offered by the institution for the following individuals:

  • Students who are currently enrolled in a degree program
  • Faculty and staff persons currently employed by the institution
  • Graduated alumni
  • Any other individual at the discretion of the administration

WBS respects the privacy of individuals using the Google Apps system, but retains sole ownership of all accounts and the data residing in them and thus the right to access, modify, and/or terminate any account offered by the institution.

For more information, please see the Google Apps Privacy Notice.

  1. Students are not permitted to install, modify or delete any software on lab computers. Students with software that comes with textbooks need to gain permission from the Network Administrator before installing the software. Suggestions for new software may be made to the Network Administrator.
  2. Equipment in the computer lab is not to be removed, modified, relocated, or disassembled without permission from the Network Administrator.
  3. Recreational use of the computers during busy times is not permitted. Example: Recreational web-surfing, recreational email, chatting, games, etc.
  4. Problems with computer lab equipment are to be reported to the administrator immediately.
  5. Computers are available to students only during computer lab hours of operation and when no classes are scheduled in the room. Computers are available on a first come first serve basis.
  1. Internet access is provided for educational use; visiting sites (viewing or printing) of an inappropriate nature, or that may be considered offensive by other individuals is strictly forbidden. The internet is to be used in accordance with the code of conduct as stipulated by the WBS Handbook. Violators will be reprimanded in accordance with school policy.
  2. Sending/posting harassing messages or repeatedly sending/posting unwanted messages (electronic or paper) to others is prohibited.
  3. You may not connect any personal computer equipment to the seminary network without prior authorization from the network administrator.
  4. You may not attempt to intercept, analyze, record, or tamper with network data packets.
  5. WBS resources may not be used for illegal or disruptive purposes. Examples of illegal or disruptive purposes include, but are not limited to:
    • Intentional harassment of other users.
    • Intentional destruction of or damage to equipment, software, or data belonging to WBS or other users.
    • Intentional disruption or unauthorized monitoring of electronic communications.
    • Intentional denial of service to other users.
  6. No attempt will be made to impersonate any person, including other WBS students or employees. No attempt will be made to disguise the origin of an electronically transmitted or posted material. No attempt will be made to make unauthorized use of someone else's electronic signature.
  7. All instances of unethical or irresponsible use of computing facilities are grounds for disciplinary action according to the Student Handbook. Instances of abuse may result in civil and/or criminal proceedings. The Seminary expects that all users of computing facilities will observe reasonable standards of behavior.
  1. You may NOT use WBS computers for any business practice.
  2. The printers in the lab are intended to serve the individual-copy needs of lab users, not as a replacement for photocopier machines. Users who need to produce multiple copies of a document should print a master copy and then photocopy it. The Library offers photocopying services.
  3. Printed pages are subject to appropriate fees.
  4. Any user who has not been trained on the proper procedures for unjamming or otherwise maintaining printers are to request assistance from qualified personnel.
  5. When a printer runs out of paper, please put more in the machine. If you are unsure of how to, or cannot find the paper, please let a staff member know.
  6. Reproduction of copyrighted material (e.g. software, music, video, books, video, photographs, etc.) is prohibited and will be dealt with as according to copyright laws.
  7. The use of campus computer resources to share or distribute copyrighted material to others without the permission of the copyright holder is prohibited. This includes, but is not limited to: using peer-to-peer applications (ex: KaZaA) to share these files. The burden of proof of ownership or obtaining permission from the copyright owner is upon the account holder.
  8. Upon receiving proper notification, as defined by the Digital Millennium Copyright Act, of a potential infringing activity, we will remove or block access to the material in question. Reports of repeated copyright infringements will lead to termination of computer/network services and/or other legal actions.
  1. User data files should be saved on floppy disks, zip disks, thumb drives, or CD, according to the media that is available. Files are not to stored on local or network drives.
  2. In an operational sense, WBS generally regards your files and data as private; that is, employees of WBS do not routinely look at this information. However, the Seminary reserves the right to view or scan any file or software on Seminary systems or transmitted over school networks and will do so periodically to ensure that hardware and software are working correctly. We will also look for particular kinds of data or software (such as computer viruses), and audit the use of school resources. Violations of policy during these and other activities will be acted upon.