Access a Classroom Computer Locked by a User or Screensaver

Tags staff faculty

If you need to use a classroom computer locked by an earlier user who forgot to sign out or locked automatically after a period of inactivity, here are some things you can try. 

Unlock a computer locked by another user

If the screen indicates that the computer is in use and locked by another user:

  • Try the Switch User option if available. This option may be disabled in some departments or colleges.
  • Restart the computer by pressing and holding its power button for 10 seconds to turn it off. Wait 10 seconds before turning it back on.
     

Unlock the computer when the screensaver kicks in

TU computers lock after a period of inactivity — usually 90 minutes — to prevent exposure of sensitive data when users do not sign out before leaving the room.

  1. Follow the onscreen instructions to unlock the computer with your NetID and password.
  2. If someone else originally signed in, select the Switch User option to sign in yourself.
  3. Remember to always sign out at the end of class. Leaving the classroom without signing out will lock the computer for the next instructor.

Additional Notes

  • The screensaver:
    • is a mandatory security measure
    • is a widespread best practice
    • is required by state auditors
    • cannot be disabled
  • On an unattended and unlocked computer, anyone can read and delete files from H: and O: network drives and the computer's hard drive. Bad actors might also access email and confidential records in PeopleSoft, Blackboard and other applications. Serious exposures may violate HIPAA or FERPA.
     
Still need help? Consider the Related Articles box on this page or open a ticket. Use the Yes and No buttons below to provide feedback on this article. You can submit without leaving comments or add details on what you liked and what needs improvement. 
Print Article

Related Articles (1)

[Faculty and Staff] You can troubleshoot and solve many problems with classroom audiovisual and computer technology following the advice in this series of articles. Series content includes general computer problems, audiovisual systems and component problems, network and connectivity problems, software and configuration problems, login problems, etc.