Apply Now

Computer Use Policies
Use of the University of Sioux Falls computer resources is a privilege, not a right. Computer and network resources are provided to our students, faculty and staff to further the educational goals of the university, increase productivity, and ensure better communication regarding university matters. These resources are to be used in a manner consistent with these goals.
The USF computer labs are established for two purposes:
  1. To support the instructor in conducting hands-on classroom instructions and class labs.

  2. To provide computing resources for our students for course-related work.

We ask all lab users to adhere to following rules:
  ALL students and faculty MUST HAVE a user account to use the labs.


No food or drinks are allowed in the labs


Please set your cellular phones in a mute mode and be respectful to those using computers by keeping the noise level to a minimum.
* Users may not deliberately disrupt the performance of a computer system or a network, or attempt to "break" system security. This includes reconfiguring a computer system to make it unusable for others, or attempting to destroy or alter data or programs belonging to other users.
* If you are not using the computer for USF class work you may be asked to vacate your machine if a student is waiting to use a computer.  You may not suddenly start working.  If you weren't working when the student entered the room, you will lose your rights to that computer.
Software (KaZaA, IM, AOL,...)


Do not install/download any software on the computers, if you need particular software for a class, approach your instructor with your request.
* Do not move, open, or tamper with lab equipment, do not disconnect ANY cables in the labs
* If any equipment is not working properly, please ask the lab monitor on duty for help or This e-mail address is being protected from spam bots, you need JavaScript enabled to view it of the problem.
Storage of Files (information)
* All computers are re-installed on a regular basis. Do not save any important files on a local hard drive, as they will be deleted.  Network drives are usually backed up nightly, so when you save to your network drive you are provided with this service.
* DO NOT STORE music, videos, or any unnecessary files on your network drive.  Files stored should be class or university related.  There are rewritable CD drives in MOST labs on campus – use them to store old projects and music/videos.
* Inappropriate files may be moved offline by the Information Services department without prior notice. You will be notified of how to retrieve these files if you can show good cause for having the files on your network drive.


Please use electronic copies of documents if possible. The lab printers are not for mass printing.  PLEASE keep your tuition cost down and save trees.   PLEASE.

If you have any concerns/suggestions regarding the labs, send an This e-mail address is being protected from spam bots, you need JavaScript enabled to view it .


University of Sioux Falls  Software Policy:

It is the intent of the University of Sioux Falls to adhere to all provisions of the copyright laws of the United States in the area of microcomputers).   

It is the policy of this university that no person shall use or cause to be used in the university's microcomputer laboratories any software which does not fall into one of the following categories:

1.It is in the public domain.
2.It is covered by a licensing agreement with the software author, authors, vendor or developer, whichever is applicable.
3.It has been donated to the university and a written record of a bona fide contribution exists.
4.It has been purchased by the university and a record of a bona fide purchase exists.
5.It has been purchased by the user and a record of a bona fide purchase exists and can be produced by the user upon demand.
6.It is being reviewed or demonstrated by the users in order to reach a decision about possible future purchase or request for contribution or licensing.
7.It has been written or developed by the University of Sioux Falls Computer Center faculty or staff for the specific purpose of being used in the university's computer laboratories.
8.It is being written or has been developed by the user and that reasonable documentation exists to verify the user's ownership.
It is also the policy of the university that there be no copying of copyrighted or proprietary programs on computers belonging to the university.
Student access to the USF network is for ONE TERM only.  This access must be renewed each term to remain valid.  
World Wide Web
  * Internet resources are provided to our students, faculty and staff to further the educational goals of the university.  These resources are to be used in a manner consistent with these goals.
  * All web pages shall adhere to the acceptable-use conditions of this University.
  * Information about the creation and publishing of personal pages may be found here: Web Usage Policies
Sanction for Failure to Log-Off the Computer:  
If an individual fails to log-off the network and subsequently an unacceptable email message is sent  
by another person, the individual who failed to log off will be held responsible and will be subject to a fine and possible suspension of email privileges.
Improper Use of Computers:
Definition:  Using computers to obtain or distribute improper/illegal communications; degrading, compromising, or tampering with computer files, equipment, and systems; circumventing systems that are protected; using computers to cheat.  
  1. downloading or transmitting libelous material, obscene or offensive messages, or threats  
  2. using computers to harass, intimidate, or make trouble for another person  
  3. hacking, circumventing protection codes, obtaining/using another person's password without permission, invading protected files  
  4. deleting, changing, or introducing erroneous information into grade records, confidential files, or another user's files (whether protected or not)  
  5. constructing viruses or knowingly introducing viruses into a system; attempting to halt the system or to compromise its performance  
  6. stealing software or copying programs and data without written permission  
  7. cheating, obtaining/using unauthorized material, supplying/communicating unauthorized information to another user  
  8. using a stand-in respondent or substitute participant in an online course