The Wichita computer labs are open seven days a week to meet the needs of students. All computer labs will be closed on University holidays and breaks. The following schedule pertains to Lab 1, our open lab, with more than 10 state-of-the-art computers. If Lab 1 is full, additional labs will be opened.
|Fall and Spring Hours|
|Monday – Thursday||8 a.m. – 10 p.m.|
|Friday||8 a.m. – 5 p.m.|
|Saturday||8 a.m. – 5 p.m.|
|Monday – Thursday||8 a.m. – 10 p.m.|
|Friday||8 a.m. – noon
|Saturday||8 a.m. – 5 p.m.|
|Sunday||1 - 5 p.m.|
All other labs will be opened on an as-needed basis to accommodate specific courses. The following information is needed to schedule a lab for Friends University courses only. Requests outside of Friends University need approval. Email these requests to firstname.lastname@example.org.
- Course ID
- Course Name
- Instructor Name
- Contact Name
- Contact Phone
- Number of Attendees
- Building/Room Preference
- Date(s)/Time(s) Needed
On our Wichita campus, computer labs are located in the Olive White Garvey College of Business and Technology Building at the corner of Maple and Hiram. There are six labs with more than 20 computers in each lab. We use the most up-to-date Windows platform and programs in five of the labs with one lab reserved for art students to use the most up-to-date Macintosh platform and programs.
Our Topeka and Lenexa education centers have Technology Resource Centers (TRCs) for student and faculty use. Each TRC has computers, a printer, a scanner and a CD burner. The Topeka center – located in Room 117 – has three computers, and the Lenexa TRC – located in Room 203 – has six. Both TRCs are open from 9 a.m. to 10 p.m. Monday through Thursday and 8 a.m. to 5 p.m. on Friday and Saturday. The TRCs are equipped with Windows, MS Office, Internet, email and a number of other types of applications.
Animals in the Computer Labs
It is inappropriate for pets to be in the computer labs except for animals assisting the physically disabled.
Children in Computer Labs
Friends University computer labs are to be used as an educational tool for currently enrolled students. We do not encourage our students to bring minor children into the computer labs during non-University sponsored events. We also realize there are rare times when it might be necessary. In those cases:
- A currently enrolled student must accompany a minor child.
- The child must be supervised at all times by the currently enrolled student.
- Other currently enrolled students have first priority to lab computers.
- The currently enrolled student is responsible for the behavior of the minor child under their supervision. If the child’s conduct is disruptive, University personnel will ask the student and child to leave the computer lab.
- The currently enrolled student is responsible for any damage caused by a minor child to University property.
- The University does not use filtering software and is not responsible for monitoring minor children's access to or content found on the Internet.
Internet and Network Usage Policy
Background and Purpose
This document constitutes a University-wide policy for the appropriate use of all Friends University computing and network resources. It is intended to provide effective protection for individual users, as well as equitable access and proper management of those resources. These guidelines should be interpreted broadly and are intended to supplement, not replace, all existing laws, regulations, agreements and contracts, which currently apply to those resources.
Access to the Friends University networks and computer systems is a privilege and not a right. Access is granted subject to University policies and local, state and federal laws. The contents of all storage media owned or stored on University computing facilities are the property of the University. Appropriate use should always be legal and ethical, reflect academic honesty, conform to Community Life Standards and the mission of the institution as stated in the University catalog, and show restraint in the consumption of shared resources. Users should demonstrate respect for intellectual property rights; ownership of data; system security mechanisms; and individuals’ rights to privacy, freedom of speech and freedom from intimidation, harassment and annoyance.
The University is not responsible for the illegal, unacceptable or unethical use of the information technology environment including computer and computer networks or electronic communication systems.
Authorized use of Friends University-owned computing and network resources is that which is consistent with the education, research and service mission of the University and with this policy.
The University’s networks and computer systems are maintained for use by users in connection with University-related matters. Authorized users are any currently enrolled students, active or adjunct faculty members, and full-time or part-time employees. Each user will be authenticated periodically to verify these requirements. While the University will attempt to respect academic freedom in the use of its information technology environment to achieve academic objectives, any user may be denied access to these resources for any reason or for no reason. No denial of access shall be interpreted as any attempt to control academic freedom.
It is the user’s responsibility to be aware of the potential for any possible effects of manipulating information and to continuously verify the integrity and completeness of information. Users are responsible for the security and integrity of University information stored on University-owned equipment.
University Access and Disclosure
Authorized access to data or information entails both privilege and responsibility, not only for the user, but also for the University. While the University will treat information stored on its equipment as confidential, the University cannot guarantee confidentiality of stored data. Users should be aware that use of data networks such as the Internet and electronic mail and messages will not necessarily remain confidential from third parties outside the University in transit or on the destination computer system, as those data networks are configured to permit fairly easy access to transmissions. However, there is no expectation of privacy or confidentiality for documents and messages stored on University-owned equipment. Additionally, email and data stored on Friends University’s network of computers may be accessed by the University for the following purposes:
- Creating backup copies of media
- Troubleshooting unauthorized access and system misuse
- Retrieving business-related information
- Investigating reports of violation of this policy or local, state or federal law
- Complying with legal requests for information
- Rerouting or disposing of undeliverable mail
Users of electronic mail systems should be aware that, in addition to being subject to authorized access, electronic mail in its present form cannot be secured and is vulnerable to unauthorized access and modification by third parties. The University retains the right to monitor and restrict users for any reason that degrades performance of the information technology environment. Because of the open nature of the Internet, the University cannot be held responsible for what content the user might encounter. The University reserves the right to inspect electronic mail usage by any person at any time without prior notice as deemed necessary to protect business-related concerns of the University to the full extent not expressly prohibited by applicable statutes.
Examples of Improper Use
Though not exhaustive, the following list is provided to emphasize that these activities are NOT allowed on the Friends University networks or computer systems: hacking; unauthorized use of facilities, account access codes, privileges or information; using the Internet for purposes outside of academic, administrative and research activities; any activity that violates the laws, regulations and rules, whether federal, state, local or University; willful destruction or damage to computers or data; unauthorized monitoring of communications equipment; violation of network security or attempts to break password restrictions; use of network or computer environment for private enterprise; any use for any private commercial enterprise, monetary gain or business outside of the University; use of another user’s password or any access code; use of electronic mail for the distribution of unsolicited information or advertising; violations of any software licenses or any copyright; violation of any person’s or entry’s right of privacy creation or forwarding of chain letters; sending universal or spammed mail; defamation or any conduct that is offensive or threatening to any individual or group; accessing obscene pornographic or hate-based material or web sites; accessing hacker or cracker material or sites; posting, sending or acquiring sexually explicit or sexually oriented material, hate-based material and hacker-related material; creating, installing or spreading computer viruses of any type; attempting system crashes; sharing a user account with another; and unauthorized access to private information or any information belonging to another.
Improper Use Penalties
The University retains the right to unilaterally limit access to the information technology environment for improper use or for any other reason. All procedures, hearings, evaluations and investigations are at the discretion of the University and need not be provided in any particular situation. Neither the following subsections nor this policy grant Users any right to access Friends University computers and network systems under its control or any right to a review by hearing or investigation when the University denies access to its information technology environment.
- Any violation of these policies should be reported to the head of the Information Technology department. If unavailable, report the violation to one of the following: VP of Administration and Finance or the President’s Office.
- In the situation of a student violation, the head of Student Affairs will be contacted for possible disciplinary action under these guidelines.
- Friends University recognizes the occasional use of networks and computer systems for personal matters, however this should be limited to no more than 10% of business usage per IRS rules and regulations. In the situation of employee violations, the Office of Human Resources will be contacted.
- Any employee who violates these policies may be subject to discipline, up to and including termination.
- Willful attempts to bypass security will bring immediate and indefinite termination of access to the information technology environment.
- Any User whose use of Friends University computers and network resources has been limited or terminated or has been denied use and desires to have such action reviewed, should make such request in writing to the head of the Information Technology Department.
Limitation of Liability
Although the University tries to provide a stable and accurate computing environment, from time to time hardware and/or software errors, or errors of other types may arise. The University does not warrant the accuracy of its computers, hardware, software, network, communication systems or any part of it, including documentation, advice or consultation. The University does not guarantee access to the information technology environment. The University shall not be liable for any incidental, consequential or actual damages, even if advised of the possibility thereof. In no event shall the University, or any employee or department, be liable for the failure to provide access to the information technology environment.