Student Handbook

Computer Use / IT

Policy

This policy is applicable to all members of the campus community, whether on the premises or elsewhere, and refers to all computer information resources whether shared, standalone, portable, or networked. The University views the use of its computers, networks, and internet access as a privilege, not a right, and seeks to protect legitimate computer users by imposing sanctions on those who abuse that privilege.

Procedure

The University honors and respects the academic freedom of its members and strives to permit maximum freedom of computer use consistent with current University policy and state and federal law. within those guidelines, the University expects responsible and ethical behavior when using computers and computer technology as follows:

  1. Respect the rights afforded by the First Amendment and by academic freedom, but understand that these rights do not extend to messages or images that would be considered:
    1. Obscene or patently offensive
    2. Libelous
    3. Threats of violence or incitement to lawless action
    4. Demeaning or harassing to individuals or groups
    5. Disruptive to the academic environment

    The above actions are violations of university policy and may result in criminal prosecution or civil liability.

  2. Respect and demonstrate sensitivity toward the standards of others. If dealing with messages or images that might be offensive to others, attempt to do so privately and remember that good manners and courteous behavior do not stop at the computer screen.
  3. Respect the privacy of others by not seeking information on, obtaining copies of, or modifying files, tapes, or passwords belonging to others.
  4. Respect the legal protection provided by copyright and licensing of programs, data, and other sources of information by not distributing or making copies of text or software without the permission of the copyright holder. Do not place illegally obtained software on university computers or networks.
  5. As users, employees are responsible for any use or misuse of any log-in by themselves or others using an individual computer or account. It is advisable that all reasonable precautions be taken to ensure that unauthorized use of an individual account is prevented. A terminal or personal computer should not be left unattended once an account has been logged into. Passwords should not be shared and should be changed frequently.
  6. Respect the intended usage of systems for electronic information exchange, including the World Wide Web and email:
    1. All currently active students, faculty, and staff members will be issued an email account.
    2. All Woodbury-related business and communication should be done using a woodbury.edu email address.
    3. Alumni and emeriti will continue to keep their woodbury.edu email addresses. Those who currently have Google woodburyuniversity.edu accounts will be able to continue using them.
    4. Do not forward electronic chain letters on the campus network.
    5. Do not use University computing and network resources to promote commercial or profit- making activities or unsanctioned non- University activities.
    6. Do not send forged or bulk emails.
    7. The Woodbury University email system is University property to be used only for approved purposes.
    8. Email messages are not protected by privacy legislation and should be considered University property. Email should not be used for sensitive information.
    9. Users may not produce or distribute offensive graphics, messages, or text. This includes, but is not limited to, pornographic materials and ethnic, racial, or religious slurs. The University reserves the right to monitor the email systems for purposes of administration and message forwarding. In the event that inappropriate behavior is observed during such monitoring, the University also reserves the right to address such behavior. Designated individuals within Technology Services are afforded “authorized access” as agents of the University.
    10. Email storage limits for faculty, staff, and students will be established by the IT office.
  7. Respect the integrity of the network as follows:
    1. Do not use any programs, transactions, data, or processes that infiltrate a system or damage or alter the software or data components of a system.
    2. Do not alter any system or network software.
    3. Do not attempt to crash systems or networks.
    4. Do not introduce viruses into systems.
    5. Do not install or modify any on-campus University hardware without explicit authorization from the appropriate service provider.
    6. Online gaming may be allowed depending on the network environment. Permissions may be granted on a case-by-case basis.
  8. Respect the University’s need to monitor its own systems. Woodbury does not routinely monitor email or other electronic communications; however, email and files stored on the University system are not private. Deleting a message is no guarantee that the message isn’t stored elsewhere.
  9. Respect data stored on PCs by backing up frequently. IT encourages users to backup data on their university issued OneDrive.

Privacy 

All users retain the right of privacy in their personal files and data, emails, and voicemails as long as they are using IT resources in a manner consistent with the purposes, objectives, and mission of the University and its IT policy. Likewise, users are obligated to respect the rights of privacy that others expect in their own systems, data, and accounts.

Users should be aware that the University cannot guarantee security and privacy during use of its IT resources. To the contrary, various uses of IT resources, or access in general, may not always be private. For example, issuance of a password or other means of access is to assure appropriate confidentiality of university-related information and files. However, it does not guarantee privacy in all cases, especially for personal or unlawful use of IT resources.

Moreover, users should note that, in emergency situations, the University may also require backup and caching of various portions of IT resources; logging of activity; monitoring of general usage; and other activities that are not directed against any individual user or user account, for the purposes of emergency maintenance or restoring normal operations of IT resources.

In the event the University has reasonable suspicion that a user has violated any civil or criminal law, the University Code of Conduct, IT policy, or any other University policy, procedure, or regulation, the University reserves the right to access, inspect, monitor, remove, take possession of, or surrender to civil or criminal authorities the offending content, with or without notice or consent of the user. The University may also do so for the purpose of satisfying any legal, regulatory, or government request.

Further, the University may monitor IT resources to ensure that they are secure and being used in conformity with IT policy and other University guidelines. Thus, to the extent allowed by applicable law, the University reserves the right to examine, use, and disclose any data or content found on the University’s IT resources for the purposes of furthering the health, safety, discipline, security, or intellectual or other property of any user or other person or entity. Information that the University gathers from such permissible monitoring or examinations may also be used in disciplinary actions.

This limited exception to the general right of privacy in the context of acceptable use of IT resources can be authorized for reasonable cause only by a duly elected officer of the University—namely, the president and vice presidents and, in the case of faculty, with notice to the president of the Faculty Senate. Any action taken by the University based on the content or information obtained will be subject to the procedural safeguards accorded under the student handbook, and all other student policies and procedures promulgated by the Office of Academic Affairs.

Monitoring, Reporting, Violations, and Sanctions 

Monitoring

As noted above, the University may, but is not required to, monitor, block, or otherwise prevent inappropriate use of IT resources. Nonetheless, in the event of a violation or failure to comply with this IT policy, the University may monitor any user’s access and use of IT resources in order to determine whether violations have occurred. If violations are found, the University may initiate charges and impose appropriate sanctions by following the various processes and procedural safeguards that are applicable to the user’s employment or enrollment status.

Reporting

Users have an obligation to report violations of IT policy as well as any potential security or other breach of any portion of IT resources. Reporting of any such violations or other issues involving the inappropriate use of IT resources should be referred to:

  • The dean of Students (or delegate) if the alleged offender is an undergraduate student or a graduate student.
  • The vice president if the alleged offender is an administrator.
  • The appropriate academic dean or vice president for Academic Affairs, if the alleged offender is a faculty member.
  • The executive director of Human Resources if the alleged offender is any other employee who does not fall into any of the above categories
  • The vice president for Information Technology/CIO, for all other alleged offenders.

Violations

A violation of the IT policy is considered a violation of the University’s principles, objectives, and standards. Depending on the severity of violation, it may also violate the University’s other policies or even local, state, federal, or international law. Accordingly, in response to any given violation, the University may impose penalties ranging from the termination of the user’s access to IT resources to disciplinary review and further action including, but not limited to, non-re-appointment, discharge, or dismissal. In cases involving egregious violations, the University may institute legal action or cooperate with actions brought by applicable authorities or third parties.

Sanctions

In addition to liability and penalties that may be imposed on users under international, federal, state, or local laws, users who fail to fulfill their responsibilities or engage in prohibited conduct will be subject to sanctions imposed by the University. Sanctions against students are listed in the Student and Residential Life Handbooks. Faculty members are subject to disciplinary action including reprimand, suspension, and dismissal as stipulated in Article IV of the University Statutes. Administrators and staff are subject to disciplinary action under their respective handbooks and collective bargaining agreements. Depending on the nature and severity of the violation, sanctions can range from various levels of warnings to immediate termination of employment or enrollment.

The University will exercise good faith and proper discernment in its enforcement of IT policy. It will respect the academic freedom to which users are entitled insofar as the legal rights and responsibilities of the individual user and the University require. Failure to take action in any particular instance does not constitute an alteration of the IT policy or a waiver of any right or remedy available to the University. Under no circumstance shall the University be liable to any user or third party for any violation including, but not limited to, illegal or improper acts that any user commits through use of IT resources.

Wireless Network Policy

Purpose and Scope

Woodbury University (WU) computing and telecommunication networks, computer equipment and computing resources are owned by the university and are provided to support the academic and administrative functions of the university. The goal of this policy is to protect WU technology-based resources from unauthorized use and/or malicious attack that could result in loss of information, damage to critical applications, or damage to our public image. All users employing wireless methods of accessing WU technology resources must adhere to WU defined processes for doing so, using WU approved access points. Unauthorized access to the wireless network is not allowed. Federal and state law, and university policies and procedures govern the use of this equipment and technologies. Any additional university wireless communications requirements must be in compliance with applicable federal and state laws, and this policy.

Wireless access is provided to users for the primary purpose of facilitating academic and administrative activities, but also for personal use so long as such uses do not violate applicable laws and University policies. Wireless bandwidth is shared by everyone connected to a given access point and/or other wireless devices operating in the same area, so session time-outs and per-device bandwidth limits are enforced to ensure that all users receive sufficient resources to fulfill their individual needs. Wireless bandwidth limits are set at the sole discretion of the Information Technology Department, using FCC recommendations as a guideline, and are subject to change as needed.

The following policy is complementary to any previously implemented policies dealing specifically with network access and remote access to the university network.

Supported Technology

Woodbury University uses the 802.11n and 802.11ac protocols as its wireless network standards, transmitting in the 2.4 GHz and 5 GHz radio frequency spectrums.

In order to provide wireless access to authorized users, Information Technology (IT) must install “access points” in and around the campus. These access points are generally small, antenna-equipped devices that connect directly to the local area network (LAN).

“Rogue” access points are devices that are installed without the knowledge or permission of Woodbury University, used by individuals to gain illegal access to the University’s network.

Policy and Appropriate Use

  • All wireless access points on the University’s network must be approved and centrally managed by Woodbury University’s IT department. The addition of new wireless access points within campus facilities will be managed at the sole discretion of IT. Non-sanctioned installations of wireless equipment, or use of unauthorized equipment on campus premises, are strictly forbidden.
  • The IT department continuously conducts sweeps of the wireless network to ensure there are no rogue access points present.
  • The IT department reserves the right to turn off without notice any access point connected to the network that it feels puts the University’s systems, data, and/or users at risk. The IT Department reserves the right to disable your Wi-Fi network access for a variety of reasons, including but not limited to “excessive” bandwidth usage, a misconfigured or compromised device, or degradation of service to other users.
  • Access point broadcast frequencies and channels shall be set and maintained by the IT Department. Any device or equipment found to be interfering with access point signals may be subject to relocation or removal, including cordless phones, microwave ovens, cameras, etc.
  • All computer equipment and devices used to connect to the University’s network must display reasonable physical security measures. Users are expected to secure their university-connected devices when they are physically at their machines as well as when they step away.
  • Wireless access users agree to immediately report to Woodbury University’s IT Department any incident or suspected incidents of unauthorized access point installation.
  • Users accessing campus network resources with personal devices are strongly encouraged to install and maintain security protections such as personal firewalls and anti-virus software.

    Policy Non-Compliance

    Failure to comply with this Wireless Access Policy may result in the suspension of wireless access privileges and possible disciplinary action. Violations of this Wireless Access Policy will be adjudicated, as appropriate, by the Dean of Students Office, Information Technology, or Human Resources. Sanctions as a result of violations of these regulations may result in the following:

  • Loss of access privileges;
  • University judicial sanctions as prescribed by student, faculty or staff behavioral codes;
  • Monetary reimbursement to the University or other appropriate sources;
  • Reassignment or removal from university housing and/or the University;
  • Prosecution under applicable civil or criminal laws.

Peer-To-Peer Policy 

Peer-to-peer (P2P) applications are defined as programs that allow computers to share data in the form of music, movies, games, or any computer file or software over a local network and the internet without accessing a centralized distribution server or set of servers. The University prohibits and blocks the use of peer-to-peer applications on networks within the residence halls and on public Wi-Fi (Woodbury Wireless). Usage of P2P applications is not restricted to any other network or Woodbury IT resource at this time. Regardless, the use of these applications has been known to cause problems that can affect the entire University community as well as individual devices.

The University mandates that all IT resources be used in a manner consistent with the IT policy and compliant with the Higher Education Opportunity Act and all other applicable laws and regulations. The University is under no obligation to protect users from complaints or actions arising from any violation or alleged violation of the law, including infringement of any intellectual property right due to use of P2P, or any other type of “file-sharing” software or networks. Users should understand that the fact that material is accessible through the internet does not mean that accessing such material is authorized by third-party rights holders. In some cases, even content that is only accessible after a user pays for it may not be authorized for distribution by those who hold rights to that content.

Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes infringement. Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees. For details, see Title 17, United States Code, Sections 504, 505. Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense. For more information, please see the U.S. Copyright Office website at www.copyright.gov, specifically FAQ’s at www.copyright.gov/help/faq.

Accordingly, the University prohibits the use of peer- to-peer applications on its networks— including those networks where P2P file sharing is allowed—or on IT resources, in general, to transmit or exchange any videos, music, software, images, or other content in which the intellectual property is held by any party or entity other than the user, unless the user has valid, written authorization to access or distribute such content. Any use of IT resources in violation of this policy will be subject to disciplinary sanctions in keeping with the applicable provisions of the IT policy and other University statutes, rules, and policies. Nonetheless, the University allows and encourages the use of P2P applications for legitimate academic purposes when such uses do not involve any violation of applicable laws, statutes, or policies, or infringement of third-party rights.

The University will continue to implement safeguards against the illegal exchange and distribution of copyrighted materials. To that end, the University employs various deterrents such as bandwidth management technology to ensure P2P programs do not degrade network speeds or any other portion of the IT resources. Should such programs degrade the performance of IT resources, or otherwise affect them in a manner inconsistent with IT policy or other University policies, appropriate action will be taken against users responsible for such degradation or other negative impact.

The University understands that there are legitimate academic uses for P2P applications. If you believe you have an academic justification for the use of P2P in the residence halls or on public Wi-Fi (Woodbury wireless), a request for an exception may be submitted to the IT Help Desk. Exception requests will be reviewed on a case-by-case basis with department chairs, deans and the CIO. If such an exception is granted, it is expected that the user will strictly abide by the usage of the P2P file sharing policy by not sharing material that will infringe any copyright on another’s intellectual property. As such, Woodbury University reserves the right to revoke P2P access granted by the exception process at any time if the user is suspected of sharing material that infringes any copyright or violates usage of intellectual property.

Users should be aware that peer-to-peer applications are not necessarily harmless and using them, in addition to potentially degrading the performance of IT resources, may:

Violate copyright, patent, trademark, or other rights.

Result in the disclosure of confidential information.

Jeopardize the security of the IT resources.

As noted above, disproportionate bandwidth usage and the unauthorized use or distribution of copyrighted materials constitute violations of the University’s IT policy. The IT department of the University will annually review its P2P policy and procedures to ensure the utmost compliance with all applicable laws and regulations. To see a list of alternatives for legal downloading, please visit http://www.educause.edu/legalcontent.

Email Policy

Overview

Email is used pervasively in almost all industry verticals and is often the primary method of communication and awareness within an organization. At the same time, misuse of email can cause legal, privacy, and security risks, thus it is important for users to understand the appropriate use of electronic communications.

Purpose

The purpose of this email policy is to ensure the proper use of the Woodbury University email system and make users aware of what Woodbury University deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for the use of email within the Woodbury University Network.

Scope

This policy covers appropriate use of any email sent from a Woodbury University email address and applies to all employees, vendors, and agents operating on behalf of Woodbury University.

Policy

  1. Do not open any attachments you are unsure of, even if they come from one of the trusted email addresses or domains you have whitelisted. Save it to a temporary folder on your pc and scan it by using a built-in virus scanner such as System Center. All official Woodbury related emails will come from @woodbury.edu email address. Do not open any emails which come from non @woodbury.edu address Endpoint Protection.
  2. All use of email must be consistent with Woodbury University policies and procedures of ethical conduct, safety, compliance with applicable laws, and proper business practices.
  3. Woodbury University email accounts should be used primarily for Woodbury University business- related purposes; personal communication is permitted on a limited basis, but non-Woodbury University-related commercial uses are prohibited.
  4. All Woodbury University data contained within an email message, or an attachment must be secured according to the Data Protection Standard.
  5. Email should be retained only if qualifying as a Woodbury University business record. Email is a Woodbury University business record if there exists a legitimate and ongoing business reason to preserve the information contained in the email.
  6. Email that is identified as a Woodbury University business record shall be retained according to the Woodbury University Record Retention Schedule. Each department has its own retention guidelines. Please check with your own department to see if a Record Retention Schedule exists.
  7. The Woodbury University email system shall not be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, appearance, disabilities, age, sexual orientation, pornography, religious beliefs or practices, political beliefs, or national origin. Employees who receive any emails with this content from any Woodbury University employee should report the matter to their supervisor immediately.
  8. Students who choose to have their emails auto forwarded to private (unofficial) email addresses do so at their own risk. The University is not responsible for any difficulties that may occur in the transmission of emails.
  9. Using a reasonable amount of Woodbury University resources for personal emails is acceptable, but non-work-related emails shall be saved in a separate folder from work-related emails. Sending chain letters or joke emails from a Woodbury University email account is prohibited.
  10. Woodbury University employees shall have no expectation of privacy in anything they store, send, or receive on the University’s email system. Woodbury University may monitor messages without prior notice. Woodbury University is not obliged to monitor email messages.

Email Policy Compliance

Compliance Measurement

The IT team will verify compliance with this policy through various methods, including, but not limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external audits, and feedback regarding IT policy.

Exceptions

Any exception to the policy must be approved by the IT team in advance.

Non-Compliance

Employees found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Information Technology Internet Use Policy 

Social networking (i.e., maintaining an account or presence on sites such as Facebook, Twitter, etc.) and the posting of weblogs or “blogs” are increasingly popular forms of internet usage. The University recognizes social networking and blogging as important means of self-expression and relationship networking and notes the educational and professional benefits of both.

Nonetheless, users of social networking and blogs should be aware of certain issues. Most social networking pages and blogs can be viewed, or even added to, by any user or third party with access to the internet. Accordingly, the University cautions all users against posting content that could divulge the users’ private details or expose users to embarrassment or ridicule. The University has no control over such potential disclosures by users and, therefore, the University is not responsible for any dissemination of private information.

The University reminds users that, regardless of any efforts to the contrary, users may be identified as members of the University community and therefore associated by third parties with the University. Accordingly, users should remember that they are representatives of the University and should, therefore, comport themselves in accordance with the principles and standards of the University.

Moreover, every user should keep in mind that a potential employer, colleague, or other important business relation may review users’ posted content anywhere on the internet that is publicly accessible. As such, users should not falsely state or exaggerate qualifications, accomplishments, affiliations, or other characteristics of either themselves or the University.

Users should refrain from posting to social networks, blogs, or any other internet site any content that may infringe on intellectual or other property rights of any other user or third party. The University disclaims any liability to users for posting or submission of content on the internet through use of IT resources, regardless of any type of action brought against users.

Lastly, the University notes that it does not control the various third-party websites and other internet destinations that user’s access. Accordingly, the University expressly disclaims any liability to users resulting from any damage to any computing resources owned or otherwise controlled by users including, but not limited to, hardware, software, or any peripherals.

Computer Lab Printing & Copying Policy 

Why must we pay for printing and copying services on campus?

Individual students from different majors have different printing and copying requirements or may have their own off-campus printing/copying capabilities. It would not be fair to charge students one flat rate. Instead, we charge on a pay-as-you-go basis.

Every student is assigned an Equitrac Account, which is used for printing and copying on campus. Prices are listed on the attached schedule of charges. Standard white copy paper will be provided.  Personal paper and plotter rolls are not allowed on all printers, copiers and plotters.

What happens if I have funds left in my Equitrac student printing Account and I am no longer an enrolled Woodbury student?

NO REFUNDS ARE GIVEN.  Deposit funds as needed for printing. Keep in mind that all printing funds should be used before you graduate

What do I need to do before using printers or copiers on campus?

  1. Create a PIN for your Equitrac Account (if you don’t have one already). On a web browser, go to https://print.woodbury.edu/EQWebClient and login with your Self-Service credentials. This URL is only accessible on the campus network.
    1. After logging in, click the User Dashboard link.
    2. Click on Manage PINs.
    3. Create a PIN number that is between six to 20 digits. Please do not enter alphabetical characters, and do not use PIN numbers that are easy for others to guess.
    4. Click the Change PIN button.
  2. Fund your Equitrac Account. You can fund your Equitrac account electronically with PayPal, a debit/credit card, or with a cash deposit. Funds can be used for printing and copying on campus.
    1. Method 1: Cash Deposits.
      1. Go to the cash deposit station on campus, located in Miller Hall 202.
      2. Enter your PIN number on the keypad.
      3. Insert a $1, $5, $10, or $20 bill facing up. There are no refunds or change provided, so make sure you want to feed the bill before you do so.
      4. Press D on the keypad to end your transaction.
      5. Wait a few seconds for the transaction to process, then press C on the keypad to get a receipt. In case of issues with your deposit, you will need to provide a copy of your receipt.
    2. Method 2 (Debit Card/Credit Card/PayPal)
      1.  Go to https://print.woodbury.edu and login with your Self-Service credentials. This URL is only accessible on the campus network.
      2. After logging in, click on the Deposit button.
      3. Text Box Select PayPal as your deposit method. Even if you do not have a PayPal account, this option is used for debit and credit card transactions.
      4. Specify how much you want to deposit in the Amount box.
      5. Carefully review the PayPal Acceptable Use Policy. If you agree with that policy, then select the checkbox “I have read and accepted: PayPal Acceptable Use Policy,” then click the PayPal Checkout button.
      6. If you do not have a PayPal account, click the Checkout as Guest button. If you have a PayPal account, you have the option to login with your PayPal account.
      7. Verify your payment details and complete the transaction.
      8. After you’ve completed the transaction, check your Equitrac account to be sure the deposit is reflected in your account.

How to Make Copies or Prints

You can use any publicly accessible copier on-campus. To use the copier, use the touchscreen to login with your Self-Service credentials. Wait until the copier features appear on the display, then make your copies. When you are done, press the Access button, then log-out so that no one else can make copies of your account.

You can print in the library or in any computer lab or classroom that has a printer. To print, log onto a lab computer, open your document, then print in the normal manner. Double-check your printing preferences, paper size, and color mode to ensure that you are charged correctly. Afterwards, the cost of the print will be displayed in a Print Cost Preview window. You may either Accept or Delete the print. If the cost of the print exceeds the funds available in your Equitrac account, then your print or copy job will be canceled automatically. When you are done, sign out of the computer so that no one else can print from your account.

How to check your account balance.

You can check your balance by entering your PIN number into any deposit station on campus. You can also check your balance by visiting https://print.woodbury.edu/EQWebClient from within the campus network.

If you suspect someone is using your PIN or printing with your credentials.

Change your password and PIN immediately, then notify the Information Technology department so they can investigate appropriate measures. The IT department can be reached via email at helpdesk@woodbury.edu, or by phone at 818.767.0888 ext. 5295.

If the printer or copier produces an unsatisfactory document.

  1. Immediately report the incident to computer lab staff. If you are unable to locate either, please call 818.252.5295 or email helpdesk@woodbury.edu.
  2. Use a different printer or copier until the problem is resolved. Instead of charging a higher cost per document and giving refunds, the cost per document is charged at lower rates. No monetary refunds are given.
  3. If a document fails to copy or print, and the failure was caused by a mechanical problem, you may request reimbursement credit by reporting the issue to computer lab staff. If your request for reimbursement credit is approved, your Equitrac account will be credited for the cost of the document.
  4. When reporting an unsatisfactory document, please do the following:
    1. Bring the document to a computer lab staff member or to a lab supervisor at Miller Hall 202 during normal business hours. Prints that had been used in class, marked-on, cropped, or physically altered are considered used and will not be accepted.
    2. You must bring photo identification to prove your identity.
    3. Please have the date and time of the failure, as well as information on which machine caused the failure. Computer lab staff will need that information to verify your claim.
    4. If the claim is approved, then the cost of the document will be credited to your Equitrac account.
    5. Incidents must be reported within seven days for reimbursement credit to be issued. The longer that an incident isn’t reported, the more difficult it will be to verify your claim.
    6. Due to privacy policies, computer lab staff can only discuss account details with the owner of an Equitrac account. Computer lab staff cannot provide information about an account to individuals who are not named on the account.

How to request technical support or to get problems resolved.

First, contact the staff who supports the equipment (i.e., computer lab staff or a staff member at the library). If they cannot resolve the problem themselves, they will refer you to someone who can. If their office is closed, you can contact us through one of the following methods:

  • Phone: 818.252.5295
  • Email: helpdesk@woodbury.edu

For any additional information please visit our IT SharePoint site at https://woodburyedu.sharepoint.com/sites/InformationTechnology/KnowledgeBase

Anti-Abuse Policy

Use of the University’s printers or copiers is subject to monitoring and auditing. If printer or copier access is abused through fraud, cost-circumvention measures, or unauthorized behavior, then the university reserves the right to take measures to remedy the abuse.

Printing and Copying Prices

Prices are posted on the printers and copiers in the computer labs. The latest printing and copying prices and policy can be viewed on the IT Department’s SharePoint site under Student Resources. https://woodburyedu.sharepoint.com/sites/InformationTechnology/KnowledgeBase