Information Technology

Bethany College Information Technology serves the campus and students by maintaining and upgrading college computer hardware, software.

Contact

Photo of Office of Information Technology

Office of Information Technology

Office Nelson Science Center Phone: (785) 227-3380, ext. 8365
Return to top.
Photo of  Matthew Carver , M.S.

Matthew Carver, M.S.

Director of Information Technology
Office Information Technology Services Nelson Science Center Phone: (785) 227-3380, ext. 8365
Return to top.

Labs

Bethany’s computer facilities include two networked computer labs with high-speed Internet in the Nelson Science Center. The labs are open from 7 a.m. to 12 a.m., seven days a week. Use of one of the labs may be pre-empted by classes held in the lab. Both Nelson labs are equipped with laser printers. Students may use all lab resources free of charge. The labs open and close with the beginning and end of each term. If the college is closed the labs will be also.

Additional Computers

In addition to Nelson Computer Labs 128 and 129, other PCs are available in the Wallerstedt Library lobby area and the lower level of the Pihlblad Student Union.

Wireless Access

Wallerstedt Social Science Center, where many Bethany classes are held, is a wireless hotspot. Levin Room in the Union and Lindquist Hall (restricted access) in the library are wireless hotspots. Wireless hostpots are also available in the lobbies of Alma Swensson, Anna Marm, Gregory, and Warner Residence Halls.

Residence Halls

All student rooms in the residence halls and the Swede Suites are equipped with high-speed Internet connections. To access this connection you need a Network Interface Card (NIC) and a Cat5 ethernet cable that is 6ft or longer.  The NIC in your computer may not neccesarily be pre-configured or “turned on”. For assistance on how to check this configuration click here.

Email Accounts

Information Technology will assign students a user name and account, giving students access to the Bethany network and an email account. The storage limits are 750 MB for employees and 250 MB for students. This account will be the college’s official and formal means of communication with students, and students are expected to check their Bethany account daily.

 Computer Acceptable Use Policy

Question: What is Bethany College’s position on illegal file sharing and downloading?

Answer: Bethany College does not support or permit this activity. If a person is found to commit such activity, the college will impose punishment on that individual.

Please read the following page concerning Bethany College’s best practices on illegal file sharing and downloading. All are expected to read, understand and practice its contents.

SCOPE

The purpose of the Bethany College Student Acceptable Use Policy is to provide guidelines for use of College owned equipment, internet access, email and student owned technologies connected to the Bethany College Network. This policy states that all computer and electronic transmissions including communications transmitted by, received from or stored on Bethany College equipment are property of the organization.

  1. INTRODUCTION
    Bethany’s Student Acceptable Use Policy (“AUP”) is intended to help enhance the use of Bethany’s Internet/Intranet (the “Net”) by preventing unacceptable use. All users of Bethany’s Internet/Intranet services (the “Services”) and those who access some of our Services must comply with this AUP.
    The 1998 Digital Millennium Copyright Act(DMCA) provides both civil and criminal penalties for copyright infringement violations. The penalties include both fines and injunctive relief. Further, persons or entities found liable for copyright infringement violations may be responsible for the owner’s costs and attorney fees.

    • Do you use Gnutella, eDonkey, BitTorrent, or other file-sharing software?
    • Did you know that music, movies, games, and software are protected by federal copyright law?
    • Did you know that downloading or distributing these materials without the stated permission of the copyright owner is illegal?

    The DMCA outlines specific steps that Internet Service Providers like Bethany College must take when their users violate copyright laws.
    Bethany College supports the free flow of information and ideas over the Net, but it will periodically monitor the use of the Services. Similarly, Bethany does not exercise editorial control over the content of any electronic mail transmission, newsgroup, or other material created or accessible over or through the Services. Bethany College may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Your violation of this AUP may result in the suspension or termination of either your access to the Services and/or your Bethany user account or other actions as detailed in Section 3.
    The policies stated here shall not be regarded as all-inclusive according to the DMCA and the No Electronic Theft Act. The absence of a specific statement prohibiting a certain activity does not mean the activity is acceptable. Any activity or use not specified in these statements that is determined to be detrimental to the Bethany College computer system is prohibited.

  2. VIOLATIONS OF BETHANY COLLEGE’S ACCEPTABLE USE POLICY (AUP)
    The following constitute violations of this AUP:

    1. Network Accounts. Using a network account, id or password issued to another individual or allowing another individual to use your network account, id or password. Accounts are intended for the sole use of the individual for whom it was created. That user is responsible for safeguarding their ids and passwords, and is responsible for any and all usage on their assigned account.
    2. Illegal Use and Copyright or trademark infringement. To transmit or receive any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national, or international law, or any rules or regulations promulgated hereunder. Using Bethany College Internet Services to infringe any type of copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software as per the Digital Millennium Copyright Act.
    3. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
    4. Threats. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.
    5. Harassment. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.
    6. Fraudulent activity. Using the Services to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as “pyramid schemes,” “ponzi schemes,” and “chain letters.”
    7. Forgery or impersonation. Adding, removing, or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited.
    8. Unsolicited commercial email/ Unsolicited bulk email. Using the Services to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email whether or not that email is commercial in nature are prohibited.
    9. Unauthorized access. Using the Services for creating Web Servers, ICQ servers, MP3 servers, Chat servers, etc. or any program that others can access on your machine. Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Bethany’s or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
    10. Collection of personal data. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
    11. Reselling the services. Reselling the Services without Bethany’s authorization.
    12. Network disruptions and unfriendly activity. Using the Services for any activity which adversely affects the ability of other people or systems to use Bethany’s Services or the Net. This includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services, or network equipment is prohibited. It is the Member’s responsibility to ensure that their network is configured in a secure manner. A student may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A student may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner (no file sharing).
    13. News. Bethany’s students should use their best judgment when posting to any newsgroup. Many groups have charters, published guidelines, FAQs, or “community standards” describing what is and is not considered appropriate. Usenet can be a valuable resource if used properly. The continued posting of off-topic articles is prohibited. Commercial advertisements are off-topic in most newsgroups, especially regional groups not specifically named for such. The presence of such articles in a group is not indicative of the group’s “intended” use. Please familiarize yourself with basic USENET netiquette before posting to a newsgroup.
    14. Long Connections and Multiple Logins. Using a personal account for high volume or commercial use is prohibited. The Services are intended for periodic, active use of email, newsgroups, and browsing the World Wide Web. Students may stay connected so long as they are actively using that connection for the above purposes. Students may not use the Services on a standby or inactive basis in order to maintain a connection. Pinging is expressly prohibited. Accordingly, Bethany maintains the right to terminate any connection following any extended period of inactivity.
    15. Damage. Students are to take reasonable precautions to limit damage to computer systems, data and output resulting from food and drink. Any damage deemed “intentional” whether it be from food, drink or physical abuse is prohibited.
  3. REPORTING VIOLATIONS OF BETHANY’S AUP
    Bethany requests that anyone who believes that there is a violation of this AUP direct the information to Computer Services (227-3311 Ext 8365.)
    If available, please provide the following information:

    • The date and time of the alleged violation, including the time zone or offset from GMT
    • Evidence of the alleged violation
  4. VIOLATION PROCEDURE
    In the event a violation is determined to have taken place, specific sanctions will be administered on a case-by-case basis through consultation between either the Dean of Students (all violations other than academic integrity) or the Provost (academic integrity violations) or the Director of Computer Services.
  5. VIOLATION ACTIONS
    Bethany College may take any one or more of the following actions in response to complaints:

    • issue written or verbal warnings
    • suspend access
    • terminate access
    • expulsion from Bethany College
    • legal action to enjoin violations and/or to collect damages, if any, caused by violations.
  6. REVISIONS TO THIS ACCEPTABLE USE POLICY
    Bethany College reserves the right to revise, amend, or modify this AUP, and our other policies and agreements at any time and in any manner.

Network Device Policy
Approved – May 6, 2011
No unapproved personal network equipment (for example: routers, wireless access points, etc.) is allowed connection to the Bethany College Network. Contact the Director of Computer Services for approval procedures.

WIFI Policy
Approved – May 6 2011
Bethany College Public Wi-Fi Portal Disclaimer

You are about to access the Internet through a public, unencrypted, wireless Internet access node (the “Service”) operated by Bethany College. The purpose of the Service is to provide wireless Internet access to students, faculty, staff, and visitors at Bethany College. You may use the Service only if you agree to the following terms of service each time you access the Service.

Terms of Service

Access to WiFi:
The WiFi service is a free service provided by Bethany College to its students, faculty, staff, and visitors. Your access to the Service is completely at the discretion of Bethany College, and your access to the Service may be blocked, suspended, or terminated at any time for any reason including, but not limited to, violation of this Agreement, actions that may lead to liability for Bethany College, disruption of access to other users or networks, or violation of applicable laws or regulations. Bethany College may revise these Terms of Service at any time. You must accept this Agreement each time you use the Service and it is your responsibility to review it for any changes each time.

Warning: This free service is an open network to the Internet and is provided for your convenience and its use is at your own risk. It is available to the general public, and is NOT INHERENTLY SECURE. Bethany College cannot and will not guarantee the privacy of your data and communication while using the service.

There are potentially serious security issues with any computer connected to the Internet without the appropriate protection, ranging from viruses, worms and other programs that can damage the user’s computer, to attacks on the computer by unauthorized or unwanted third parties. By using this service, you acknowledge and knowingly accept the potentially serious risks of accessing the Internet over an unsecured network. It is recommended that users take steps to protect their own computer system, such as installing current anti-virus software and maintaining appropriate firewall protection. For further information on how to protect yourself on this open network, consult a security professional.

Acceptable Use of the Service.
Your use of the Service and any activities conducted online through the Service shall not violate any applicable law or regulation or the rights of Bethany College, or any third party. Bethany College cannot accept any responsibility for any injury or loss that results from inaccurate, unsuitable, offensive, or illegal Internet communications. The use of the Service for the following activities is prohibited: spamming and invasion of privacy of others, violating intellectual property law, transmitting obscene or indecent speech or materials, transmitting defamatory or abusive language, hacking or distribution of internet viruses, worms, trojan horses, or other destructive activities.

DISCLAIMER
By using this Service, you acknowledge and agree that (i) you do so solely at your own risk; (ii) that the Service may not be uninterrupted or error-free; (iii) that viruses or other harmful applications may be available through the Service; (iv) that Bethany College does not guarantee the security of the Service; and, (v) that unauthorized third parties may access your computer or files or otherwise monitor your connection.
In addition, by using the Service, you agree to all terms set forth in the following Disclaimer.

  • Service provided “AS IS”. This Service provides access to the Internet on an “as is” basis with all the risks inherent in such access. Bethany College makes no warranty that the Service, or that any information, software, or other material accessible on the Service, is free of viruses, worms, Trojan horses or other harmful components. By connecting, the user acknowledges and accepts the risks associated with access to the Internet and public use of a wireless network, even one that is encrypted.
  • Service provided “AS AVAILABLE”. The Service is provided on an “as available” basis without warranties of any kind, either expressed or implied, that the Service will be uninterrupted or error-free, including but not limited to vagaries of weather, disruption of Service, speed, functionality, acts of God, warranties of title, no infringement, NOR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. No advice or information given by Bethany College, or its officers, directors, employees, agents, volunteers, affiliates, or contractors of the Service or their respective employees shall create such a warranty.
  • Indemnity. User agrees to indemnify and hold harmless Bethany College, its officers, directors, employees, agents, volunteers, affiliates, or contractors of the Service or their respective employees, from any claim, liability, loss, damage, cost, or expense (including without limitation reasonable attorneys’ fees) that result in any way from the user’s use of, or inability to use, the Service, or to access the Internet or any part thereof, or user’s reliance on or use of information, services, or merchandise provided on or through the Service and/or any materials downloaded or uploaded through the Service, or that result from mistakes, omissions, interruptions, deletion of files, errors, defects, delays in operation, or transmission , or any failure of performance, any actions taken by you in connection with your use of the Service, or any violation of any third party’s rights or a violation of law or regulation.

DISCLAIMER
By the acceptance of this AUP, the user will indemnify, defend and hold harmless Bethany College, its agents and employees, from any and all liabilities, damage, expense, cause of action suits, claims or judgments arising out of any activity by user, including any act or omission of user, regarding the use of Bethany’s computing resources or otherwise related to the subject of this policy.

Residence Hall Computer Support Services Policy

Bethany College IT is responsible for providing computer services up to the data outlet on your wall. Students are responsible for maintenance from the wall outlet to their computer and/or other devices. Staff members are prohibited from servicing any software/hardware issue relative to a student’s personal computer.

When a student encounters problems connecting to the Internet from his/her room, the student must contact a Residence Life Staff member in their building. The Residence Life Staff member will assess the outlet with regard to connectivity, and report connectivity issues to the Information Technology Office.

Data outlets are sometimes called a data jack, network jack, network outlet, or wall jack. The data jack is in a faceplate mounted in the wall, baseboard or outlet box on the wall. It is slightly larger than a telephone jack. All data outlets have an identification tag that has the room number it is first. A tag might read 1118-1-2 or 355-1. The first number, 1118 or 355, is the room number. If there is a problem with a data jack, the entire number sequence on the tag, and building name, must be reported. Your RA will inform you on the reporting procedures. (Please note: Data jacks and telephone jacks are not the same. The telephone network is not the data network. There is no data on the telephone network. If you get a dial tone, it is not a data jack.)

Process: If the Residence Life Staff member finds that connectivity is not an issue, then no further assistance will be provided.  If upon inspection connectivity cannot be established or not properly functioning, the Residence Life Staff member will contact the Information Technology Office for further assistance. If it is necessary for an IT staff member to visit the student’s room for further review of the problem, the staff member will be accompanied by a Residence Life Staff member at all times.

General Steps: Check to see if your roommate’s computer works in your jack.  If yes, then it is an issue with your own personal computer that you must resolve, and no further support will be provided by the Computer Services staff. If you have established that the jack is not working, notify your RA/SRA/AC, and s/he will submit an IT service request. You may utilize a computer lab computer or a computer in the mailroom of the Pihlblad Union.

Each student, faculty member and staff member at Bethany College may request an account on the Bethany College Local Area Network (LAN). The network may be accessed from any computer containing a network card. Access to the LAN must be considered a privilege, not a right.The LAN is connected to the Internet, and each account can access this with email and full Internet privileges.

User Account Policy

Each account belongs to the person to whom it is issued and only that person is authorized to use it, other than the guidelines below:

  • The senior systems administrator has the authority to monitor all accounts. Every effort will be made to maintain privacy and security in this process.
  • Accounts may be monitored, tracking the time spent on the system and use of resources, such as disk storage, pages printed, messages mailed, and Internet time.
  • The senior systems administrator and Bethany faculty have the right to distribute files necessary for class work to individual accounts and have the right to view those files that are for the purpose of the faculty member’s class(es).
  • Each user will be expected to exercise responsible behavior when on the network.
  • Each user will be held accountable for work created when the user’s account has been accessed. Do not leave an account open when you leave a computer terminal.
  • You may not use the computer to annoy, harass, terrify, intimidate, threaten, offend or bother another person by conveying obscene language, pictures or other materials or threats of bodily harm.
  • Playing recreational games is discouraged in the labs and anyone playing games may be asked to relinquish the use of the computer to others who need it for academic purposes.

The following are examples of unacceptable use of the network:

  • Using or attempting to use someone else’s network account.
  • Using the network for any illegal activity, including violation of copyright or other contracts.
  • Using the network for financial or commercial gain.
  • Degrading or disrupting the functioning of hardware, software or system performance.
  • Vandalizing, altering, or tampering with the data of another user.

Violation by any user of the guidelines or prohibitions provided in this document by the systems administrator, or by Bethany College, may result in:

  • Restricted network access.
  • Loss of access to one’s account.
  • Disciplinary or legal action including, but not limited to, criminal prosecution under appropriate state and federal laws.

Email User Retention Policy

July 1, 2010
Access to computing accounts is governed by the Acceptable Use Policy for Technology Resources. The following outlines the procedure by which accounts (e.g. email, file storage) will be terminated.

  • Faculty and staff username and password will be disabled immediately upon termination of employment.
  • All data (files, messages, etc) in disabled student accounts will be immediately deleted from active systems. Data in faculty and staff accounts will be maintained for 30 days following disabling of accounts unless specific exception is requested by the employee’s department head. That data will be made available to the department head before it is deleted.
  • Student accounts will be disabled whenever matriculation ends, whether by graduation or by withdrawal from classes. This change in status may be ascertained by Information Technology’s regular review of administrative information (e.g. Jenzabar). Students who leave the College during the course of a semester will have their accounts disabled immediately. Otherwise a two-week grace period will be granted following the end of a semester.
  • At the conclusion of the spring semester, student accounts will remain active as long as students are registered for fall classes. The privilege of utilizing the Bethany College email system is granted to students not enrolled in summer classes. Although students do not technically hold status during this period, the students are still bound by the Acceptable Use Policy referenced herein.
  • Accounts will be disabled at the request of appropriate administrators, as outlined in the acceptable use policy referenced above.

*Student accounts reaching 300 MB will be disabled until the box is cleaned out.

Campus Mailbox Policy 09-20-2011

 

  • Information Technology takes its cue from Human Resources about when to create new user accounts, mailboxes, and home-drives for all employees. The director of Human Resources will deliver an electronic sheet that contains all pertinent information.
  • Information Technology is responsible for delivering next-day service for the creation of new user accounts and mailboxes. In many cases, it will be same-day service when possible.
  • Adjunct Faculty distribution lists will be updated every semester. Those who are not teaching in a given semester will be removed from the Bethany Faculty distribution list. Those who are will be added. The Office of the Provost will notify Computer Services which accounts will be added or removed from the distribution list. Furthermore, there is the understanding that adjuncts may set out for a semester or two but will be allowed to keep their accounts in the meantime.
  • Retired Faculty will have the option of keeping a user account after leaving the college, and said user account will not have a respective mailbox.
  • A new hire, at the direction of his/her supervisor, will have the option to keep his/her predecessor’s mailbox for a period of time, archive the mailbox, or delete it altogether. In any case, IT will not make the call since the matter is an integral part of the affected department’s operations.
  • All graduating seniors will be allowed to keep their accounts and mailboxes for a period of one semester after graduation, regardless of degree-major. Students will be notified one month in advance by IT prior to deletion-allowing students the opportunity to save important mail. All non-returning students’ accounts and mailboxes, regardless of status, will be handled on a case-by-case basis within one month after the beginning of each semester.