Information & Educational Technology (IET)
Information & Educational Technology provide infrastructure, tools, and support for campus technology. Whether it's email, classroom technologies, computer labs, or network connectivity, the IET staff are here to assist.
Resources
How can I view a PDF file? To view PDF files you must have Adobe Acrobat Reader installed on your computer. To download this free program visit www.adobe.com. Follow the on screen directions.
How can I find out my username? To determine your username to go to http://lsua.it/accountsetup and type in the required information. Click Setup Account.
How do I log into a computer at LSUA? First you will need your username and password (http://lsua.it/accountsetup). After you know your username and password you will press, Ctrl-Alt-Del. These are three separate keys on the keyboard. Type your username, press the tab key, type your password and press the Enter key.
I forgot my password, how can I change it or reset it? To change or reset your password go to http://lsua.it/passwordreset. Proceed with the on-screen prompts to reset your password.
Where is a color printer available for student us? A color printer is available in the Technology Center, 107.
Where is a copier available for student us? A copier is available in the library for student use. There is a charge for this service.
Why am I unable to print documents in a computer lab? Check the printer - it could be out of paper or have too many print jobs which has stalled the printer. Contact IET Services Helpdesk if there are multiple print jobs waiting to be printed. Or you may have ran out of allowable pages to print. To check your print balance, either check myLSUA or Auxiliary Services at 473-6579.
How do I reset my multi-factor authentication? Please contact the LSUA HelpDesk @ iethelp@lsua.edu. Please note that you will be required to participate in a live video call to verify your identity.
Labs which are used for classrooms may be used when classes are not scheduled. To view the classroom schedule for individual labs, select the lab location below.
Lab Location | Number of PCs | Software * | Open Access or Classroom |
Avoyelles 105 | 6 | Basic + Education | Open |
Bolton Library | 17 | Basic | Open |
Chambers 119 | 24 | Basic | Classroom |
Chambers 129 | 20 | Basic | Classroom |
Coughlin Hall 202 | 11 | Basic + Nursing | Open |
Coughlin Hall 203 | 2 | Basic + Nursing | Open |
Mulder 164 | 20 | Mac Lab | Classroom |
Mulder 212 | 20 | Basic | Open |
Mulder 218 | 24 | Basic | Math Tutoring Lab |
Technology Center 107 | 36 | Basic + Education + SPSS | Open |
Technology Center 116 | 20 | Basic + Training | Training Lab |
Science 222 | 15 | Basic | Open |
Accommodation Testing Lab - Student Center | 8 | Basic + Testing | Testing |
Testing Lab - Student Center | 25 | Basic + Testing | Testing |
Allied Health Lab-Jackston Street | 16 | Basic | This lab is reserved for Allied Health |
The Oaks Resident Hall 101 | 6 | Basic | This lab is reserved for residents |
Software Key
Basic - Microsoft Access, PowerPoint, Excel, Word, Publisher; Google Chrome;
Open Access Computer Labs are typically not reserved for classes; however, if a class does need the lab - all classes have priority over the lab.
Monday | Tuesday | Wednesday | Thursday | Friday | Saturday | Sunday | |
Avoyelles 105 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
Technology Center 107 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
Coughlin 202 & 203 | 8a-4p | 8a-4p | 8a-4p | 8a-4p | 8a-4p | Closed | Closed |
Science 222 | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | 8a-4:30p | Closed | Closed |
There are also computers available in the Library. Visit the Bolton Library page for specific information.
IET Services Policies
1.1 Scope
The standards and policies presented herein govern data systems, infrastructure, and technology resource usage at LSU of Alexandria (LSUA). These standards and policies apply to all computerized systems and associated information technologies involved with the creation, updating, processing, outputting, distribution, and other uses of electronic information at LSUA. All specifications indicated are independent of system architecture and apply to data systems, networks of computers and servers, stand-alone computers and servers, networking infrastructure, and any other information technology whether developed at LSUA or acquired from external vendors. The policies and standards contained herein will be reviewed periodically and supplements/changes made as needed by appropriate University personnel and/or committees.
1.2 Purpose
The primary purpose of these policies and standards is to establish system ownership responsibility and to ensure that each technical resource meets functional requirements, is appropriately documented, is secure and controlled, has been adequately tested, is maintainable, and provides audit features. This document will be reviewed by appropriate staff along with the governing committees and University officials when needed.
LSUA – Louisiana State University Alexandria
Technical Resources – any computing resource, including but not limited to, computers and associated peripherals, networking equipment and infrastructure, data systems, software systems, servers, telephone systems and/or any other electronic or computing based system, service, or equipment owned or operated under the supervision of LSUA.
University Network – The University network is defined to include any and all computer and electronic based communication facilities and/or equipment, which are owned or operated under the supervision of LSUA. The University network is for use by authorized personnel affiliated with the University, consistent with, and in the course of, their official work, study, and/or research.
User Account – An account assigned to an approved faculty/staff/student/affiliate user of LSUA technical resources. The following are types of User Accounts available at LSUA: Active Directory, Student Information System, Administrative Software, Local Computer, Course Management System (CMS), myLSUA, Microsoft Account, and/or any other technical resource that requires a user to be “logged-on”.
4.1 Account Eligibility
All full and part-time employees are eligible to receive an Active Directory account which provides them with network, email, online courses, and myLSUA access. Other types of accounts are provided on an as-needed basis and are authorized by the University official in charge of the corresponding system.
All students enrolled in one (1) or more hours are eligible to receive an Active Directory account which provides them with network, email, electronic courses, and myLSUA access.
4.2 Account Creation and Ownership
Accounts for employees are created on a manual basis. Once IET Services receives notification from either HRM or the Vice Chancellor’s office of a new employee, an account is created.
Student accounts are created automatically daily. Accounts can be manually created on an as-needed basis.
Each user is considered the owner of their associated account. All activity associated with the account is the responsibility of the owner.
4.3 User Responsibility and Accountability
Users may not allow other individuals to use their LSUA assigned network, email, or other University based account. Employees and students are individually responsible for the proper use of their assigned accounts, and are accountable for any and all activity associated with the account. Users are also responsible for the security of their assigned accounts. Users should take proper security measures to ensure the integrity of their accounts, and should also report any notice of unauthorized access
4.4 User Account Format
4.4.1 Employees
User Accounts for employees of LSUA will be formatted in one of two ways: 1) First initial followed by last name, and 2) first name followed by last initial. Exceptions to this will be made when duplicate accounts would be created. Any account created prior to this policy will remain unchanged.
4.4.2 Students
User Accounts for students of LSUA will be formatted as follows: First initial followed by the full last name followed by a three digit sequential number for duplicate accounts. Example: John Smith would be jsmith001. The second John Smith will be jsmith002, and so on. Any account created prior to this policy will remain unchanged.
4.4.3 Department and Miscellaneous Accounts
Generally, department accounts will be eligible for a shared mailbox. Other miscellaneous accounts will be created on an as-needed basis. Formatting for these accounts will be done according to the requirements of the account.
4.5 Passwords
Passwords are an important aspect of computer security and provide the front line of protection for user accounts. Poorly chosen passwords may result in the compromising of the University’s entire network. All university employees are responsible for selecting and securing their passwords. Each user shall observe the following password guidelines:
All user ids and passwords will be unique to each authorized user.
Passwords will have at least eight alpha-numeric characters including a capital letter, a number, and a special character. Common names and/or phrases may not be used. Passwords cannot include the user’s username, any part of their name, nor contain “LSUA”.
Password will be kept private. Passwords may not be shared, coded into programs, or written down.
Password will automatically expire after 90 days. All users must change their password at this time.
A user account will be temporarily “locked” after five (5) failed login attempts.
All computer sessions will be suspended after 5 minutes of inactivity. A password will be required to log back in.
Successful logons to the University systems should display the date, time, and location of the last successful logon, where possible
User ids and passwords within the University administrative software will have access revoked upon notification of separation from the University.
IET Services will never ask an employee or student for their password or MFA token. Employees and students should never give out their password or MFA token to anyone – this includes other employees in the same office/department, and/or any outside vendor.
4.5.1 Multi-Factor Authentication
Multi-Factor Authentication (MFA) is the process of using a second piece of information to verify the user's identity. MFA should be used for all University Systems where possible.
All LSUA accounts are required to register for MFA during their First Time Account setup.
4.6 Account Expiration and Deletion
4.6.1 Employees
Employee User Accounts will be expired (disabled) immediately upon notice of separation from the University. Exceptions will be made only with approval of the appropriate dean, vice-chancellor, or chancellor.
4.6.2 Students
Student User Accounts will remain active for four (4) months following the end of a semester. If a student enrolls in the following semester, the account will stay active. If the Student does not enroll in the following semester, the account and all associated data may be purged from the corresponding system.
5.1 Duplication of Software
All software protected by copyright must not be copied except as specifically stipulated by the owner of the copyright or otherwise permitted by copyright law. Protected software may not be copied into, from, or by any University facility or system, except pursuant to a valid license or as otherwise permitted by copyright law.
5.2 Number of Simultaneous Users
The number and distribution of software copies must be handled in such a way that the number of simultaneous users in a department does not exceed the number of original copies purchased by that department, unless otherwise stipulated in the purchase contract.
5.3 Copyrights
In addition to software, all other copyrighted information (text, images, icons, programs etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of computer information is subject to the same sanctions as apply to plagiarism in any other media. Please see LSUA Policy Statement No. 216 for additional copyright information.
6.1 General Guidelines
The University network is defined to include any and all computer and electronic based communication facilities and/or equipment, which are owned or operated under the supervision of LSUA. The University network is for use by authorized personnel affiliated with the University, consistent with, and in the course of, their official work, study, and/or research. Individual groups or projects within the University may adopt more restrictive network usage policies that apply to their sub-networks and personnel within their area. Acceptable and unacceptable uses of LSUA network resources are outlined in the following sections. Note: These lists are not all inclusive.
6.2 Acceptable Uses
Any use that is necessary to complete research and/or coursework as assigned by or to any university employee or student.
Communication for professional development or to collaborate in research and education.
As a means for authorized users to have legitimate access to remote facilities such as email, network resources, and/or Internet access.
Other administrative and/or academic communications or activities in direct support of University projects and missions.
Incidental personal use may be allowed when such use meets the following criteria; it does not interfere with University operations, it does not comprise the functioning of University network and computing resources, it does not interfere with the user’s employment or other obligations to the University, and it does not violate any other University policy.
6.3 Unacceptable Uses
Any use deemed commercial or for-profit.
Any use that is likely, intended, or by negligence causes unauthorized network disruption, system failure, or data corruption.
Any use related to achieving, enabling, or hiding unauthorized access to network resources, University owned software, or other information belonging to the University, either within or outside the University network.
Any use related to sending/receiving electronic mail that includes, but is not limited to, the following: solicitation or commercial use, forging any portion of an electronic mail message, spamming (bulk unsolicited email), or sending unwanted messages to unwilling recipients.
Intentionally circumventing or building an unauthorized conduit through the University firewall with intentions of bypassing University network management and security devices.
Use of another individual’s identification; network, email or other university based account; and/or related passwords.
Unauthorized transfer or entry into a file to read, use, or change the contents; or for any other reason.
Use of computing facilities or network resources to send obscene, harassing, abusive, or threatening messages or computer viruses or worms.
Any use that violates University policies, procedures, and contractual agreements.
Any use that violates local, state, or federal laws.
In general, use of University email services is governed by policies that apply to the use of all University computing and networking facilities as outlined in this document. The following sections are more specific to email usage and restrictions.
7.1 Account Eligibility
All employees and students that are assigned an Active Directory account as outlined within this document will receive an email address with the same name.
7.2 Purpose of Email Services
The University provides an email account to every employee and student of the University for the purposes of teaching and learning, research, administration and community service.
The University permits this account to be used for limited incidental personal purposes. However, it is most concerned to ensure that the account is used as effectively as possible in support of the above purposes and to facilitate the work of the University. A University email account may not be used for engaging in non-LSUA business or for personal gain, except if permitted by other University policies.
The email address supplied by the university is considered to be the official email contact point for University staff and students, and official University email correspondence will be delivered to this address.
Email accounts may also be used for the submission and return of student assignments and other specific uses, but only where the relevant Faculty or Unit has specifically authorized this.
7.3 Broadcast Emails
Broadcast emails are defined as messages sent to the entire campus, or a very large group of users within the University.
The use of broadcast emails from the University will be kept to a minimum level and will only be used for purposes of official University business.
Students will not be allowed to send broadcast emails. In the event a student needs to send a campus-wide message, such requests should be handled through the Chancellor’s Office or designee.
7.4 Regular Accessing of Emails
It is important for faculty and staff to access and read email messages sent to their LSUA email account on a timely basis and will be presumed to do so. Students are expected to check their official email address on a frequent and consistent basis in order to stay current with University communications and class assignments.
7.5 Assignment of Student Email Addresses
All students will be assigned an official University email address. It is to this official address that the University will send email communications; this official address will be the address listed in the University's Global Address List found IN the Exchange / Outlook Address Directory.
7.6 Educational Uses of Email
Faculty may determine how email will be used in their classes. It is highly recommended that if a faculty member has email requirements and expectations, they specify these requirements in their course syllabus. Faculty may expect that students' official email addresses are being accessed AND may USE email FOR their courses accordingly.
7.7 Email Storage Guidelines
Storage space on emails servers is limited. Users should “clean up” their mailboxes on a regular basis. Messages not needed or not related to University business should be deleted.
All messages placed in the “Deleted Items” folder will be deleted after 14 days. All messages placed in the “Junk Mail” folder will be deleted after 7 days. Users should take necessary action to ensure messages needed for University business not be placed in either of these locations.
All University-based email will follow state guidelines for archival methods and restoration procedures.
8.1 General Guidelines
Departments are responsible for determining when an employee needs to have access to telephone services and the type of services necessary to fulfill University job responsibilities.
8.2 Number Assignment
Each employee will be assigned a direct telephone number. In the event an employee only needs a local “campus only” number, this type of service will be provided.
8.3 Voicemail
Each employee may receive voicemail service for their telephone extension. Employees should check voicemail regularly, and then remove old messages from the system.
9.1 Peer-to-Peer Software
The use of any Peer-to-Peer (P2P) file-sharing application to download copyrighted material is strictly prohibited due to their potential to compromise network security and expose users to malware and other cybersecurity risks.
9.2 Ad and Spy Software
Users should take extreme caution when browsing the Internet. Many websites ask you to install various types of browser enhancements or extensions/addons. These types of applications should not be installed due to the probability of being embedded with malware. Please note that this type of software will be removed from computers when found.
9.3 Virus Protection Software
All computers on campus must have virus protection software installed. If technically possible, computers that do not have virus protection software will not be allowed on the LSUA network. Each computer that is configured by IET Services will automatically have virus protection software. This software will be configured to update on a daily basis.
10.1 Network Storage Space
Each student will have access to Microsoft OneDrive. This can be used for storage related to the student’s schoolwork.
Faculty and Staff users will be given access to a network-based storage space for storing personal files. This is referred to as the “Y:” drive. Faculty and Staff also have access to Microsoft OneDrive, which is the preferred method for storing files.
Each department will be assigned a network storage space for sharing files within the department. This is referred to as the “W:” drive.
Any information stored on either of these drives is backed up according to the schedule set forth in LSUA’s backup policy. Users should store data on network drives whenever possible. This is the only way to ensure against data loss if the local computer hard drive is corrupted.
10.2 Data Backup
10.2.1 Schedule of Backups for Network Data
All data stored on network based devices will be backed up according to a regular schedule. This schedule may change on a periodic basis, and therefore is not a part of this document. A complete backup schedule of network-based data is available in IET Services.
10.2.2 Backup of Users Data on Local Computers
Each user is responsible for making backup copies of critical data that is stored on their assigned computer. Data stored on computers around campus cannot be backed up across the network on any defined schedule. Network storage space such as Y: and W: drives should be used whenever possible for the storage of critical data and documents.
10.3 Data Recovery
Data stored on network-based devices may be restored at anytime by request from the owner of that data. Data will be restored from the latest available backup according to the current backup schedule.
IET Staff
Heather Gauthier
IT Technical Analyst 2
Information Educational Technology
Richard Robinson
Director of IT Operations & Support
Information Educational Technology