Information Technology

IT Help

For issues regarding MoodleRooms or Populi, please contact the Registrar to start. For issues regarding Zoom or your WBS Gmail account, contact the IT Director. We are unable to help with personal computer problems.

General Usage

  1. The use of Wesley Biblical Seminary computer resources is a privilege and not a right.
  2. Be respectful of other computer users, equipment, and area at all times.
  3. Access to the computers or computer-related equipment at WBS is limited to current WBS students and faculty/staff members.
  4. All noise levels should be kept to a minimum so that others are not disturbed.
  5. Users are to clean up the area around the computer they have used as they leave.
  6. Staff are not available to assist with users’ academic work and cannot do work on the users’ behalf. Library staff can assist students with finding and using library resources.
  7. Users must abide by the code of conduct as explained in the WBS Handbook. By using any computer or computer equipment at WBS, you agree to abide by this policy.

Email

Wesley Biblical Seminary utilizes the Google Apps for Education suite of Internet services. Google Apps accounts, which include a wbs.edu Gmail account, are freely offered by the institution for the following individuals:

  • Students who are currently enrolled in a degree program
  • Faculty and staff persons currently employed by the institution
  • Graduated alumni
  • Any other individual at the discretion of the administration

WBS respects the privacy of individuals using the Google Apps system, but retains sole ownership of all accounts and the data residing in them and thus the right to access, modify, and/or terminate any account offered by the institution.

For more information, please see the Google Apps Privacy Notice.

Library Computers

  1. Students are not permitted to install, modify, or delete any software on library computers.
  2. Equipment in the library is not to be removed, modified, relocated, or disassembled without permission from the IT Director.
  3. Recreational use of the computers during busy times is not permitted.
  4. Problems with computer equipment are to be reported to the IT Director immediately.
  5. Computers are available to students only during library hours of operation on a first-come-first-served basis.

Internet and Network

  1. Internet access is provided for educational use; visiting sites (viewing or printing) of an inappropriate nature, or that may be considered offensive by other individuals, is strictly forbidden. The internet is to be used in accordance with the code of conduct as stipulated by the WBS Handbook. Violators will be reprimanded in accordance with school policy.
  2. Sending/posting harassing messages or repeatedly sending/posting unwanted messages (electronic or paper) to others is prohibited.
  3. You may not connect any personal computer equipment to the seminary network without prior authorization from the IT Director.
  4. You may not attempt to intercept, analyze, record, or tamper with network data packets.
  5. WBS resources may not be used for illegal or disruptive purposes. Examples of illegal or disruptive purposes include, but are not limited to:
    • Intentional harassment of other users.
    • Intentional destruction of or damage to equipment, software, or data belonging to WBS or other users.
    • Intentional disruption or unauthorized monitoring of electronic communications.
    • Intentional denial of service to other users.
  6. No attempt will be made to impersonate any person, including other WBS students or employees. No attempt will be made to disguise the origin of an electronically transmitted or posted material. No attempt will be made to make unauthorized use of someone else’s electronic signature.
  7. All instances of unethical or irresponsible use of computing facilities are grounds for disciplinary action according to the Student Handbook. Instances of abuse may result in civil and/or criminal proceedings. The Seminary expects that all users of computing facilities will observe reasonable standards of behavior.

Computer Usage

  1. You may NOT use WBS computers for any business practice.
  2. Printers are intended to serve the individual-copy needs of lab users. Users who need to produce multiple copies of a document should print a master copy and then photocopy it.
  3. Printed and copied pages are subject to appropriate fees.
  4. Any user who has not been trained on the proper procedures for unjamming or otherwise maintaining printers are to request assistance from qualified personnel.
  5. When a printer runs out of paper, please put more in the machine or let a staff member know if you are unable to replace it.
  6. Reproduction of copyrighted material (e.g. software, music, video, books, video, photographs, etc.) is prohibited and will be dealt with as according to copyright laws.
  7. The use of campus computer resources to share or distribute copyrighted material to others without the permission of the copyright holder is prohibited. This includes, but is not limited to: using peer-to-peer applications (ex: KaZaA) to share these files. The burden of proof of ownership or obtaining permission from the copyright owner is upon the account holder.
  8. Upon receiving proper notification, as defined by the Digital Millennium Copyright Act, of a potential infringing activity, we will remove or block access to the material in question. Reports of repeated copyright infringements will lead to termination of computer/network services and/or other legal actions.

Personal Data

  1. User data files should be saved on thumb drives. Files are not to stored on local or network drives.
  2. In an operational sense, WBS generally regards your files and data as private; that is, employees of WBS do not routinely look at this information. However, the Seminary reserves the right to view or scan any file or software on Seminary systems or transmitted over school networks and will do so periodically to ensure that hardware and software are working correctly. We will also look for particular kinds of data or software (such as computer viruses), and audit the use of school resources. Violations of policy during these and other activities will be acted upon.