Skip to main content


Computer Labs

These policies apply to all CSC IT-managed teaching labs: Lampe 200, Lampe 201, Lampe 255, & EBII 1221

Definition of Terms

Organizer = individual(s) responsible for unlocking the lab and who must be physically present at all times in the lab.

  • We require at least one-week reservation notice for non-Computer Science sponsored events/camps.
  • For non-Computer Science sponsored events or curricula, CSC IT doesn’t accept software installation requests.
  • Do NOT turn OFF computers.
  • Do NOT unplug cables, monitors, or input devices from computers.
  • Turn OFF the projector before you leave the lab.
  • Upon reservation request approval, Organizer(s) must request lab access by contacting the Computer Science building security liaison Linda Honeycutt at Lab access is handled with card readers through the campus Security Applications and Technologies office (SAT). Requests may take up to 2 business days.
  • Event organizers must be present at all times during lab use.
  • All doors must be shut closed when the lab is not in use.
  • Don’t leave doors propped open as card reader alarms will go off.
  • Erase whiteboard(s) before leaving the lab
  • Organizers are responsible for leaving the lab in the same condition as it was found (tables/chairs/etc). Do not let anyone in who is not part of the class/event.
  • No food or drinks in the lab
  • Do not request the building cleaning crew to let you in the labs.
  • To submit reservation requests, or to report technical or any lab issues contact: Be sure to check calendars for room availability before submitting your request.

Failure to comply with the above lab rules will result in cancellation/denial of future reservation requests.


CSC IT-managed printers are firewalled. There are 3 basic firewall rule sets for our printers. Click here for Printer Setup.

Registration of “Personal” equipment on “wired” Network

CSC IT does not register “personal” devices on the “wired” network. We recommend using the campus wireless network if you have a WiFi-capable device. Visit the campus nomad Web site to register your personal WiFi device.

Remote Access

CSC IT doesn’t allow remote access to administrative office computers (centrally managed) without prior approval from the requestor’s direct supervisor. Furthermore, remote access will only be considered if it is done from a departmental-owned computer. To request remote access, have the direct supervisor submit a request to including:

  1. name of employee
  2. office number
  3. desktop hostname
  4. Period of time that remote access will be needed (e.g. 1 month)
  5. does the employee have a departmental-owned machine to remote from? This is a “MUST”

Requests will be reviewed individually while taking into consideration the protection of university data as mandated by the Universty Data Sensitivity Framework.

Security Incident Response

Compromised machines in our department will be handled as follows:

  1. The compromised machine gets blocked from the network
  2. Users/Owners are immediately notified via email about the incident
  3. If physically possible, the machine gets confiscated into the CSC IT suite
  4. CSC IT works with University Security & Compliance group on performing forensics
  5. CSC IT reports forensic findings to S&C and computer owner(s) and any other party affected by the break-in (if applicable)
  6. CSC IT meets with computer owner(s) and backup data that needs to be preserved
  7. CSC IT along with computer owner(s) DBANs and performs a clean install
  8. The computer is allowed back on the network
  9. CSC IT rescans machine

Additonal Incident Response Plan Items

Server/Desktop Security Guidelines

In order to minimize the amount of break-ins and ssh attacks on CSC boxes, the security measures and procedures below must be followed. These guidelines apply to all departmental Linux, Windows, and Mac OS boxes. Click here to learn about access, accounts, and more.

Support of “Personal” Equipment

CSC IT doesn’t provide technical support on “personal” equipment. please contact NCSU Help.

Technology Lending e-Checkout/Loaner Policies

While the primary objective of some of the departmental technology equipment is for use on-site, there are times when it is ok for staff and faculty to check out equipment off-campus. All faculty and staff are required to electronically acknowledge and agree to the following prior to checking out equipment:

  • Requests must be submitted 2 or more business days in advance using the technology lending e-checkout page.
  • no changes to the equipment’s hardware
  • To use care in protecting and safeguarding the use of the equipment and returning it in the same condition it was in prior to checkout, with the exclusion of normal wear and tear
  • To return equipment on or before the due date –  not to exceed 30 days.
  • To be the sole user of this equipment
  • To follow university computer regulations if the equipment is used on campus
  • Faculty/staff may submit requests on behalf of a student but must accept full responsibility for checked-out equipment and return it in the same condition as they were checked out.

This loaner program (especially for laptops) is NOT intended to support daily research operations for periods extending 3-4 weeks. Instead, faculty/researchers should use research or startup funds to purchase the necessary equipment to conduct their research experiments. Alternatively, feel free to check with CSC IT (via about “spare” equipment/desktops that can be loaned for longer periods of time to support your research and/or teaching activities (subject to spare equipment availability).

Web Crawling

Web crawling may have the potential for disrupting the services of another web site, causing extra effort to deal with the invasion of your crawler or even creating a legal liability for NCSU.

Before researchers begin web crawling, they must submit the following form for approval:

Web Crawling Form

*For policies not addressed above, please refer to NCSU Computer Use Policies.

IT Resource Misuse

Report misuse of campus IT resources by Computer Science faculty, staff, or students to