← Main Page

The primary function of the computer facilities is for general usage and for conducting lab course. Students/staff may use the facilities for general use when no course labs are taking place. However when course labs are in progress all general users are expected to vacate the lab. If users are found to be abusing the computers or printers, their access to the computer facilities will be denied and further action will be taken by CSEA.

Entry to s/w lab

There are 4 labs: Software Labs SL1,i SL2 and SL3, cs101 Lab(basemenet) . All registered CSE users can enter the lab. Only Sysad RAs and staff have access to the system area. Do not bring unauthorized people (Non CSE students) to the lab without permission. Muddy footwear, Umbrellas, raincoats are to be left at the entrance.

Key transfer policy

SL1 and SL2 are open only for conducting lab courses. The SL3 Lab is potentially open 24 hours. Staff will be available only during office hours. So in order to keep the lab open when there are users, a key-transfer policy is in place. There is a key transfer Register kept in SL2 which gives details of who has opened the lab and who has currently taken over the key etc. (External users and Btech First Year students are not allowed to take over the keys. External users are students who come to use the lab from other departments/institutions.) It is very important that this register is to be properly maintained in order to keep the lab open round the clock.
The Key transfer policy currently followed is as follows:

System usage

Use the resources only for academic purposes. Do not let anyone else access your account. The user will be held fully responsible for any files in their account, and any abuse/misuse of their account.

Monitors and PCs

Mail

INTERNET resources

Internet resources are meant for limited academic use only. Before you use any of these resources for any special purpose, you must check with sysads, or file a bug. Indiscriminate use of this will put heavy load on the network causing problems not only to other users in our department, but also in rest of the campus.

Unauthorized usage

USERS ARE REQUESTED TO FOLLOW THE GUIDELINES STRICTLY. VIOLATION OF THESE WILL CAUSE LOT OF DIFFICULTY TO MANY PEOPLE AND THIS WILL FORCE THE AUTHORITIES TO TAKE STRINGENT ACTION.