COVID-19 Crisis: We're here for you. Read the MSCS College Updates and view the Student FAQ
Your campus email address is FirstName.LastName@my.southeastmn.edu (e.g. email@example.com).
If you have any questions, please contact the Help Desk (507.453.2408)
Please use a different browser (Firefox, Chrome, etc.). Current security settings may prevent you from accessing some functions.
The information technology employed by the college is a
critical asset of the institution governed by various laws of privacy,
confidentiality, and non-disclosure. It is the common responsibility of all
members of the college community to protect the institution's information
assets and to ensure the proper and ethical use of information at all times.
MSC Southeast information technology environment affords easy, anytime/anywhere
access to information. This arrangement allows students, faculty, and staff to
conduct business in an effective and efficient manner. These benefits are a
privilege that is shared by the community as a result of a significant
investment of college resources and comes with its own set of responsibilities.
Access to modern information technology is essential to the
college's mission of providing the students with educational services of the
highest quality. It is in this framework that students understand and comply
with rules of conduct for computing and networking that permit all students to
fully use this resource.
Software that resides on MSC Southeast computing network(s)
is licensed by the college, or third parties, and is protected by copyright and
other laws, together with licenses and other contractual agreements. Users are
required to respect and abide by the terms and conditions of software use and
Unauthorized access to information resources, unauthorized
use of college computing facilities, and intentional corruption or misuse of
information resources is direct violation of the college's standards for
computer use. Examples of inappropriate behavior include:
Contact Information: Report any abuse, virus, or
other possible security compromises to the Chief Information Officer at