The IT Department seeks to implement innovative and productive technological tools and resources
to support the entire College environment.
||Administration Building, Suite 118
||email@example.com (technical support)
||firstname.lastname@example.org (non-support issues)
IT Department Hours:
Need IT Help?
For the subject/title, please identify the exact problem; in the description area, include as much detail as possible to help us resolve your issue as quickly as possible. Please include your name and an email address and/or phone number where we can reach you.
You can also check the status of previous requests as well as log new ones or look at solutions to previous requests.
Student Acceptable Use Agreement
Employee Acceptable Use Agreement
Computer Security Tips
Lock It When You Leave
- It takes only a few seconds to secure your computer and help protect it from unauthorized access. Lock down your computer every time you leave your desk.
- Hold down the Windows Key and press the L key to lock it
- Set up a screensaver that will lock your computer after a pre-set amount of time and require a password to log back in
- Choose a strong password. A good password should always include upper and lowercase letters, numbers and at least 1 special character. Do not set the option that allows a computer to remember any password.
- Do not engage in inappropriate conduct, such as cyberbullying, cyberstalking or rude and offensive behavior.
- Do not do something in cyberspace that you would consider wrong or illegal in everyday life.
- Do not impersonate someone else. It is wrong to create sites, pages or posts that seem to come from someone else.
- Adhere to copyright restrictions when downloading material from the Internet.
- Do not use someone else's password or other identifying information.
Recognize Cyber Traps
- Always think before you click on links or images in an email, instant message or on web sites. Be cautious when you receive an attachment from unknown sources. Even if you know and trust the sender or the website, it is still prudent to use caution when navigating pages and clicking on links or images.
- Do not reply to emails that ask you do "verify your information" or to "confirm your user-id and password."
- Be sure to read the privacy statement on websites you are visiting prior to providing any personal information, to understand that entity's policy regarding protection of data.
- Periodically check your Internet browser settings (e.g. Security and Privacy) to ensure that the settings are adequate for your level and type of Internet activity.
- Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
Protect Data on Portable Devices
- Ask yourself "Is it really necessary that I transport this sensitive information?" If the answer is no, then do not copy the information.
- Encrypt files of the full disk. By encrypting files or using disk encryption, you reduce the risk of unauthorized individuals viewing sensitive data.
- Use strong passwords on all your devices such as a minimum of 8 characters and a mix of special symbols, letters and numbers. Never use the same password for multiple devices or accounts.
- Be sure all critical information is backed up. Portable devices should not be the only place important information is stored.
- Store your portable devices securely. When not in use, store portable devices out of sight and whenever possible in a locked drawer or file cabinet.
Murray State College Provides Opportunities for
Student Learning, Personal Growth, Professional Success, and Community Enhancement.