Any item that you must carry with you, in order to gain access to a computer or computer facility

Any item that you must carry with you, in order to gain access to a computer or computer facility

  • Equal Access: Computer Labs
  • Equal Access: Computer Labs

As more information is delivered using computer and network technologies, computer labs and workstation clusters play an increasingly important role in ensuring access to electronic information resources for students and employees. In making electronic resources accessible, principles of universal design should be employed.

Typically, organizations design their services and facilities for the average user. "Universal design" means that you design them for people with a broad range of abilities and disabilities. Keep in mind that people using your computer workstations may have learning, visual, speech, hearing, and/or mobility impairments.

To plan an accessible environment, think in terms of the following access issues: physical environment, adaptive technology, and electronic resources. These areas are addressed in the videotape presentation and handout, each titled Equal Access: Computer Labs. You can use the list of guidelines in the handout as a starting point for surveying your computer facility for accessibility.

You may find the list of suggestions presented overwhelming as you begin to think about the planning and funding processes involved in implementing all of the suggestions. You may feel that you have to start from scratch and build a whole new computer lab in order to have an accessible facility. However, some of the items have probably already been addressed. With this information, you can develop strategies to begin implementing some of the ideas not already in place. If you cannot take on an expensive project at this time, consider the many low-cost items you can easily accomplish to begin making your computer workstations more accessible.

Any item that you must carry with you, in order to gain access to a computer or computer facility

Physical Environment

Designing an academic or work area that is accessible to everyone begins with the physical environment of the facility. Ask the following questions in determining how to make your facility more accessible.

  • Are doorway openings at least 32 inches wide and are doorway thresholds no higher than 1/2 inch vertically?
  • Are aisles kept wide and clear for wheelchair users? Have protruding objects been removed or minimized for the safety of users who are visually impaired?
  • Are all levels of the facility connected by an accessible route of travel? If some materials are in inaccessible locations, are there procedures for retrieving these materials for people with mobility impairments?
  • Are ramps and/or elevators provided as an alternative to stairs? Do elevators have both auditory and visual signals for designating floors? Are elevator controls marked in large print and Braille or raised letters? Can people seated in wheelchairs easily reach all of the elevator controls?
  • Are wheelchair-accessible restrooms with well-marked International signage available in or near the lab?
  • Are service desks wheelchair accessible?
  • Are there ample high-contrast, large print directional signs throughout the lab? Is equipment marked with large print and/or Braille labels?
  • Are hearing protectors, private study rooms, or individual study carrels available for users who are distracted by noise and the movement around them?
  • Is at least one table for each type of computer adjustable so that a student or an employee who uses a wheelchair can type comfortably? Can the adjustment controls be reached by the wheelchair user?
  • Are wrist rests available for those who require extra wrist support while typing?
  • Are document holders available to help position work papers so that they can be easily read?


General good computing practices and tips that apply to most people who use a computer.

For questions relating to any of the information contained on this page, please contact the ITS Support Center.

THE QUICK LIST
Click on each item for additional information

---

Reporting Computer Security Incidents

THE DETAILS:

1. Use passwords that can't be easily guessed, and protect your passwords.
  • Don't share your passwords and avoid writing them down.
  • Characteristics of good, cryptic passwords:
    • Contain a mixture of upper and lower case letters, numbers, and symbols
    • At least 8 characters in length (or longer if they're less complex)
    • Difficult to guess (e.g. don't include real words or personal information like user name, names of family members, places, pets, birthdays, addresses, hobbies, etc.)
    • Easy to remember (so you don't have to write them down)
  • Password protect all of your devices.
  • For additional information and tips, see UCSC's Password Standards.
2. Minimize storage of P3-P4 data.
  • Delete P3-P4 data whenever you can. Keep it off of your workstation, laptop computer, and other electronic devices if at all possible.
  • Don't keep P3-P4 data or your only copy of critical data, projects, files, etc. on portable or mobile devices (such as laptop computers, tablets, phones, memory sticks, CDs/DVDs, etc.) unless they are properly protected. These items are extra vulnerable to theft or loss.
3. Beware of scams: Never reveal your password or click on unknown links or attachments. Be careful who you share your private information with.
  • Don't respond to email, instant messages (IM), texts, phone calls, etc., asking you for your password. You should never disclose your password to anyone, even if they say they work for UCSC, ITS, or other campus organizations.
  • Only click on links from trusted sources. Never click on an unfamiliar link unless you have a way to independently verify that it is safe. This includes tiny URLs and any link where you can't tell where it will take you.
  • Don't open unsolicited or unexpected attachments. If you can't verify an attachment is legitimate, delete it.
  • Don't give private information to anyone you don't know or who doesn't have a legitimate need for it -- in person, over the phone, via e-mail, IM, text, Facebook, Twitter, etc.
  • Beware of IRS scams and phony computer support scams. These are usually over the phone and threaten dire consequences if you don't act immediately.
  • More info about protecting yourself from scams...
4. Protect information when using the Internet and email.
  • Only use trusted, secure web pages when entering personal or sensitive information online. Don't log in to web sites or online applications unless the login page is secure.
    •  Look for https (not http) in the URL to indicate that there is a secure connection. 
  • Be especially careful about what you do over wireless. Information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept (most public access wireless is unencrypted).
    • Check your wireless preferences/settings to make sure your devices aren’t set up to auto-connect to any wireless network they detect. Auto-connecting to unknown networks could put your device and data at risk.
    • Use eduroam for secure wireless on campus. Use the Campus virtual private network (VPN) when connecting to public wireless, like in a coffee shop.
  • P3-P4 data MUST be encrypted when it is transmitted. Don't send P3-P4 data via email, text or instant message (IM). These are not generally secure methods of communication. Sensitive information should not be sent through the campus email service.

  • Be extremely careful with filesharing software. Filesharing opens your computer to the risk of malicious files and attackers. Also, if you share copyrighted files, you risk being disconnected from the campus network, as well as serious legal consequences.

5. Make sure your computer is protected with anti-virus and all necessary security "patches" and updates, and that you know what you need to do, if anything, to keep them current.
  • Shut down or restart your computer at least weekly -- and whenever your programs tell you to in order to install updates. This helps to make sure software and security updates are properly installed.
  • If you get an antivirus alert that there is malware on your computer, contact the ITS Support Center.
  • Talk to your computer support person or the ITS Support Center (itrequest.ucsc.edu, , 459-HELP) for assistance.
6. Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.
  • In your office or dorm room, at coffee shops, meetings, conferences, etc.
    Remember: Phones and laptops get stolen from cars, houses, and offices all the time.
  • Make sure it is locked to or in something permanent.
  • Laptop lockdown cables are available at the Bay Tree Bookstore and most computer or office supply stores.
  • More Information about physical security
7. Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.
  • <ctrl><alt><delete> or <Windows><L> on a PC; Apple menu or power button on a Mac.
  • Also set your computer and portable devices to automatically lock when they're not being used.
8. Don't install or download unknown or unsolicited programs/apps to your computer, phone, or other devices.
  • These can harbor behind-the-scenes viruses or open a "back door" giving others access to your devices without your knowledge.
9. Secure your area before leaving it unattended.
  • Lock windows and doors, take keys out of drawers and doors, and never share your access code, card or key.
  • Be sure to lock up portable equipment and sensitive material before you leave an area unattended.
10. Make backup copies of files or data you are not willing to lose -- and store the copies very securely.

Reporting computer security incidents...

...because sometimes you can do everything right and things still happen.

  • Report any suspected compromise (hacking, unauthorized access, etc.) of computing systems or data to your supervisor and the ITS Support Center.
  • Also report lost or missing University computing equipment to the Campus Police (and to the local authorities if the incident occurred away from campus).
  • See Report a Security Incident for additional information.