About the ACCL

The Academic Complex Computer Lab, or ACCL, is the central, open access computer lab on the Arizona Western College and Northern Arizona University in Yuma campus. The ACCL is an integral component of the ongoing partnership between Arizona Western College and Northern Arizona University in Yuma. First opened in January 1997, the ACCL serves the computing technology needs of students from both institutions, as well as the general community.

Frequently Asked Questions

The ACCL has 80+ computer workstations, the majority of which run Microsoft Windows 7. Macintosh computers are also available. The ACCL features a wide range of software, from Adobe Acrobat Reader to Visual Basic. Most of the software used in classes taught by AWC and NAU in Yuma is available for student use in the ACCL. In addition, internet applications such as web browsers and e-mail programs, as well as general productivity applications like Microsoft Office are available for use.

The ACCL is open to all students of AWC and NAU in Yuma. The general public is also welcome to use the ACCL on a space available basis, provided they are 18 years or older and bring a valid photo ID.

Students registered with AWC and/or NAU in Yuma may obtain a lab access account. AWC students will need to stop by the front desk of the ACCL with a picture ID to have their account created. NAU students can build their own accounts online via the LOUIE system. Your lab access account also functions as your e-mail address. The general public and one-time users with a picture ID may access the lab with a visitor account assigned by the lab staff.

The ACCL is manned by two full time staff as well as a large number of part-time lab assistants, all of whom are willing and eager to lend a hand. The lab staff will be happy to assist you, whether you are a computer novice starting from scratch or a seasoned veteran looking for a few pointers.

The ACCL is located on AWC/NAU-Yuma campus in the Academic Complex building, room AC156.

The ACCL is open more than 50 hours a week during the Fall and Spring semester to meet your computing needs. Our hours of operation are:

Fall & Spring Session Regular Hours
Mon - Thu 08:00 am - 09:00 pm
Friday 12:00 pm - 06:00 pm
Saturday Closed
Sunday Closed

Summer Session Regular Hours
Mon - Thu 10:00 am - 06:00 pm
Friday 1:00 pm - 06:00 pm
Saturday Closed
Sunday Closed

ACCL hours may change during holidays or special events. During those days ACCL may not open or may have reduced hours. Please refer to the ACCL Calendar for special events and holidays schedule.

You can call the ACCL at 344-7796, or feel free to stop by the front desk of the lab. We will be happy to answer any questions you might have.

ACCL Rules and Guidelines

  1. ACCL computer systems are for appropriate educational use only. If you use these resources for non-educational related activities such as playing games online, you may be asked to log out.

  2. No Food or Drinks/Eating and Drinking. Food in sealed containers and drinks in re-sealable containers can be brought into the lab provided they are placed in a book bag, backpack, etc., or are placed out of the way on the floor and not consumed while in the lab.

  3. Loud talking, laughter, and horseplay are forbidden. Anyone disrupting the learning environment may be asked to leave the facility.

  4. Do not talk on cell phones in the lab. Please step outside to talk and put your cell phone on silent or vibrate while in the lab.

  5. Children under the age of 16 must be supervised at ALL times by an adult.Unattended children are not permitted in the lab.

  6. You may not share your lab account with others. Sharing account is a violation of the AWC and NAU Acceptable Use Policies and can result in the suspension of your account.

  7. Visitors or guests must check in at the ACCL front desk and present a valid photo ID in order to use the lab computers.

  8. The scanning stations in the lab are reserved for those who need to use the scanner.

  9. The ACCL is not responsible for missed deadlines, lost/missing/corrupted data, or any other-related problems that may occur while working in the lab. The golden rule of safety: Save early, save often, and backup your files elsewhere.

  10. The lab aides are here to help you with technology issues (like mouse, computers, scanner and/or login issues). The lab aides are NOT allowed to do your homework for you, but may offer some assistance in guiding you.

Schedule for Lab Aides

The following schedule can be used to find which lab aid is availble during the week.

08:00 am - 08:30 am Alisa  
08:30 am - 09:00 am Alisa  
09:00 am - 09:30 am Alisa  
09:30 am - 10:00 am Alisa  
10:00 am - 10:30 am Alisa  
10:30 am - 11:00 am Alisa  
11:00 am - 11:30 am Alisa  
11:30 am - 12:00 pm Alisa  
12:00 pm - 12:30 pm Alisa  
12:30 pm - 01:00 pm Zack  
01:00 pm - 01:30 pm Zack  
01:30 pm - 02:00 pm Zack  
02:00 pm - 02:30 pm Zack  
02:30 pm - 03:00 pm Zack  
03:00 pm - 03:30 pm Zack  
03:30 pm - 04:00 pm Zack  
04:00 pm - 04:30 pm Zack  
04:30 pm - 05:00 pm Zack  
05:00 pm - 05:30 pm Frank Gisselle
05:30 pm - 06:00 pm Frank Gisselle
06:00 pm - 06:30 pm Frank Gisselle
06:30 pm - 07:00 pm Frank Gisselle
07:00 pm - 07:30 pm Frank Gisselle
07:30 pm - 08:00 pm Frank Gisselle
08:00 pm - 08:30 pm Frank Gisselle
08:30 pm - 09:00 pm Frank Gisselle

Ethics Statement

Access to the networks and information technology environment at Arizona Western College (AWC) is a privilege and must be treated as such by all users of these systems. When you use AWC's computing systems and services, you accept the following specific responsibilities summarized below (see "AWC Technology Acceptable Use Policy" for more details):

  • To respect the privacy of other users.
  • To respect the rights of other users.
  • To respect the legal protection provided by copyright and licensing of programs and data.
  • To respect the intended usage of resources; for example, you and only you shall use accounts assigned to you by AWC.
  • To respect the intended usage of systems for electronic exchange such as e-mail, Internet Relay Chat (IRC), Usenet news, World-Wide Web, etc.
  • To respect the integrity of the system or network; for example, you shall not seek unauthorized access to accounts or information systems.

Violations of any of the above guidelines are considered unethical and violations of AWC policy; they may be criminal offenses. Inappropriate use of AWC technology resources may result in one or more of the following: loss of access, disciplinary review, suspension or expulsion, termination of employment, and civil or criminal legal action.

Acceptable Use Policy

PURPOSE

The Arizona Western College computer network and technology facilities represent a commitment to provide a workplace with modern computing tools and services. Technology use is restricted to purposes consistent with the mission of the College.

PROCEDURE

1. Access

Access to the College's computer and network systems is limited to current AWC students, faculty, staff, and approved guests who access these resources for legitimate research, teaching, learning, academic support and professional service, and whose use complies with these and other policies of the College. Students, faculty, staff and guests are responsible for all use of their accounts and/or equipment.

2. Restrictions

2.1. Federal Copyright Law
Students, faculty, staff, and approved guests using the College's computer and network systems are subject to the United States Copyright Law of 1976, as amended (Title 17, United States Code, the "Copyright Act"). This legislation requires that users adhere to the restrictions that apply to the reproduction of software, as well as limit their copying to the boundaries permissible under the "fair use" doctrine.

2.2. Local, State and Federal Laws
All publications or broadcasts disseminated by the College shall conform to applicable regulations of the Federal Communications Commission and other applicable local, state, and federal laws. Students, faculty, staff, and approved guests are legally responsible for the contents of their communications. College facilities or properties may not be used for personal profit or for the profit of any private enterprise not for the benefit of the College.

2.3. Licensing Regulations
Arizona Western College has an established independent licensing program to regulate and restrict the use of the name, abbreviations, symbols, emblems, logos, mascots, slogans, and other terminology associated with the College. Unauthorized use of any of the fore stated representations may constitute trademark infringement.

3. Misuse of Privileges

The State of Arizona, local taxpayers and the U.S. Government provide Arizona Western College with computing and network resources. Misuse of these finite and critical resources threatens their continued availability. Justification for the support of this system suffers when misuse occurs.

3.1. Students, faculty, staff, and approved guests who misuse computer or network privileges are subject to the loss of computer resources and/or network access, and may also be subject to discipline and/or termination through College processes, as well as criminal or civil prosecution under federal and Arizona law.

Misuse of computing resources includes, but is not limited to, the following:

3.1.1. Using technology resources in a manner that violates the laws of the United States of America and/or the State of Arizona or that violates the policies of Arizona Western College.

3.1.2. Unauthorized access to the resources of the College's computer systems or network (e.g., trying to log or break into accounts or computers for which you are not authorized).

3.1.3. Disruption or obstruction of authorized use of the network.

3.1.4. Failure to comply with all Computer Information Services Policies and Guidelines.

3.1.5. Knowingly causing excessive and unneeded use of College resources such as staff time, network bandwidth, or computer capacity.

3.1.6. Destroying the integrity of computer-based information or systems.

3.1.7. Unauthorized use, or attempted unauthorized use, of the College's computer systems, computer networks, computer software, data files, or other computing facilities.

3.1.8. Compromising the privacy of users, including but not limited to misrepresenting or forging identities on, or through the use of, the College's network.

3.1.9. Using College computer and networking systems for personal gain or commercial purposes unrelated to activities that support, and are consistent with, the educational purpose and mission of the College.

3.1.10. Using College computer networking systems and resources for obscene purposes or in a pervasively profane manner, including but not limited to use which may bring into public disrepute the College's identity and image.

3.1.11. Theft, distribution, or reproduction without lawful authority of copies or reproductions of property or subject matter of any kind belonging to another, including but not limited to that which is protected by federal, state or international law governing patent, copyright, trademark, trade name, trade secrets, privacy, publicity, unfair competition, or licensing agreements.

3.1.12. Tampering with computer software or data files belonging to others, or using the resources in such a manner that would cause the College reasonably to believe that it would be subject to the risk of suit or regulatory action.

3.1.13. Using resources in a manner that is reasonably likely, or with the intention, to inflict mental harassment, to intimidate, or unreasonably to invade the privacy of any other individual.

3.1.14. Knowingly accessing, downloading, displaying or transmitting sexually explicit images or language, including accessing web sites that display such images or language, unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.15. Accessing, downloading, displaying or transmitting material intended to provide information or instruction regarding how to access information the user is not authorized to access or how to disrupt the functioning of any computer system or network (i.e. "hacker websites"), unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.16. Sharing College account passwords with others, or using networked machines to provide College network access to people or organizations that do not already have such access.

3.1.17. Using technology resources to post material on behalf of other parties, sharing personal access to the College's resources with others, or using personal computers connected to the College's network to mirror another site (i.e., to make a copy of someone else's site).

3.1.18. Unauthorized installation of software on the College's computers, networks or network devices.

3.1.19. Using technology resources to threaten any particular individual with violence or to engage in any activity that would naturally and directly tend to provoke acts of violence or a breach of the peace by the person to whom the conduct or remarks are addressed.

3.1.20. Using technology resources in a manner that would lead the College reasonably to believe that such use may subject it to the risk of suit, regulatory action, or liability of any kind under the laws of the United States of America or the State of Arizona forbidding the creation or maintenance of a hostile working or educational environment involving discrimination based on race, color, sex, religion, national origin, age, veterans' status or disability, whether physical or mental, or which would cause the College reasonably to believe that such use of its property and resources may result in a determination that it is in breach of its legal duty to take reasonable steps to eliminate such attributes, conditions, or vestiges of a hostile educational environment and/or of discrimination.

4. Institutional Discipline

Any individual or group that:

  • uses technology to participate in conduct that is in violation of this policy,

  • uses technology to adversely affect the College's pursuit of its educational objectives,

  • uses technology to violate or show disregard for the rights of individuals within the College community, or

  • uses technology to damage property may be subject to institutional discipline. Officials charged with enforcement of these regulations shall have the authority in execution of such duties to immediately perform such acts as are required to maintain the security, well-being, and safety of College resources, the College community or any of its members.

5. Expectation of Privacy

The College's administrators reserve the right to suspend or examine any account, computer or network access information, including the content of emails sent by or to any network user and the websites visited by any user. Users of this system do not have an expectation of privacy in their use of the College's network or computer system. Any instance of misconduct will be reported to the appropriate College office.

6. Hold Harmless Agreement

The account holder agrees to be responsible for, and to indemnify and hold the Arizona Western College District Governing Board, Arizona Western College, and their officers and employees harmless from any claims, including attorney's fees, resulting from the account holder's acts or omissions which cause direct or indirect damage to another party.

Procedure 223.1
Policy #223

Software Map

AddText