For Students

Home > Technology > For Students


Welcome to the MACU OIT for students.  Below you will find information about policies, access, and recommendations related to the MACU network.  

Policies and Prodcedures
Network Access
MACU Email
Copyrights, P2P, and File Sharing
Computer Labs
Personal Computers

Policies and Procedures

MACU IT Policy
Anti-Virus Requirement
All students wishing to connect to the network are required to have:
  • Anti-Virus software installed and up-to-date. (Refer to the Anti-Virus page for recommendations.)
  • Latest services packs for Windows XP, Windows Vista, Windows 7, or a MAC with Mac OS X v10.4 or higher.
Routers are not allowed on the network (wired or wireless.)
Personal access Points are not permitted on the school network.
Peer-to-peer applications are not allowed on the network.
Mid-Atlantic University uses OpenDNS and SonicWall UMC to filter web content.
Proxies/Anonymizers are strictly forbidden.
Failure to follow these guidelines will result in disciplinary action. Please refer to the Disciplinary Action section of the Network Policy for more information.

Network Access

Each dorm room has access to two network jacks.  Additionally, all dorm rooms have access to the MACU Wireless. Wireless connectivity is also available throughout Heritage Hall, the Albert C. Blanton III Campus Life Center, Wilkinson Hall, Faith Hall, and the Student Life Center.

Visit the Network and Voice page and the Wireless Network Access page for more information.


Click here for infomation on your MACU Email account

Copyrights, P2P, and File Sharing

Familiarize yourself with MACU's guidelines on Copyrights, P2P, and File Sharing


 Introduction to Moodle

Computer Labs

There are two computer labs available to students:

  • Watson-Griffith Library
  • Heritage Hall
Please read the Computer Labs page for more information concerning the use of MACU computer labs.

Personal Computers

Check out our recommendations for new computers, anti-virus, safe browsing habits, and avoiding various internet-borne threats.
Safe Computing and best-use practices for personal computers
Computer Recommendations