Download presentation
Presentation is loading. Please wait.
Published byAllen Elmer Walton Modified over 9 years ago
1
Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009
2
And Various Other Things James L. Wolf Director, Academic Computing Services September 21, 2009
3
Computing and network resources are shared resources. Software, data, and network resources are covered by license agreements and contracts. Intellectual property rights. Public agencies operate under state and federal law. Personal privacy and respect.
4
BU Computing and Network Acceptable Use Policy BU Computing and Network Acceptable Use Policy ◦ Approved by University Governance group called ACET ◦ Referenced in Rules of Student Conduct Student Judiciary Academic Honesty University Police
5
Use “consistent with the education, research and public service mission” Users: “those individuals provided a username and password” “…right to limit access to its networks…” for violations. “Non-University-owned computers, which house material, which violates the University’s policies, are subject to network disconnection without notice.”
6
“Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws.”
7
We don’t monitor content, but there are situations in which we will!!
8
Privacy Copyright Copyright Harassment, Libel and Slander Sharing of access Permitting unauthorized access Circumventing Security
9
Breaching Security Unauthorized Monitoring Flooding Private Commercial Purposes Political Advertising or Campaigning Modifying software or software installation
10
Password “does not guarantee privacy” BU “not responsible for the loss of users’ files or data” “computer files, including e-mail, may be considered “records“”
11
Not “personal and private” “While administrators will not routinely monitor individual email and will take reasonable precautions to protect the privacy of Email, program managers and technical staff may access a student’s Email: ◦ To diagnose and resolve technical problems involving the system, and/or ◦ To investigate possible misuse of Email when a reasonable suspicion of abuse exists or in conjunction with an approved investigation. “
12
Messages sent/received as BU business: ◦ Be considered state records under applicable state regulations; ◦ Be releasable to the public under the Freedom of Information Law; ◦ Require special measures to comply with the Personal Privacy Protection Law All messages “may be subject to discovery proceedings in legal actions.”
13
Be careful before you hit the Send button!!
14
immediate suspension of services student or employee disciplinary procedures Illegal acts ◦ subpoena and prosecution by commercial enterprises, local, state and/or federal authorities.
15
Digital Millenium Copyright Act (1998) ◦ Music, movies, TV shows, games, books, software Infringement notifications Presettlement offer letters
16
Universities should actively discourage sharing of copyrighted material Universities should provide legal opportunities to obtain music, video content on line ◦ Rhapsody ◦ iTunes
17
Network Performance / Virus infection / Malware infestation Hacking complaint DMCA complaint Harassment complaint Software piracy complaint
18
Identify offender and / or location Communicate with offender via e-mail Reply acknowledges understanding (first offense) No reply: place in quarantine Quarantined offender signs “memo of understanding” Repeat offender or refuse to sign results in disconnection from Res Hall net and referral to Student Judiciary.
19
Packet headers contain info on the type of content (e.g., MP3) Packet headers contain info on origin and destination ports (e.g., http traffic is usually port 80) Switches can accumulate bandwidth consumption data (2.5Gb/24hr)
20
Residence Halls, wireless network, wired ports in public spaces. Checks OS for current updates (Windows and Mac only). Checks for Anti-Virus SW with current Definition files. Requires registration of MAC address with User ID. Requires acknowledgment of AUP
22
Make specialized software available to students and researchers without them having to purchase individual licenses. Make it available on and off campus Make it available to owners of Windows, Mac and Linux computers Integrate with network storage and printing
23
General workstations (up to 35 concurrent) ◦ SAS 9.1.3 ◦ PASW 17 (aka SPSS) ◦ Matlab R2009a ◦ Ansys 11.0 ◦ Arena 12 ◦ Jack 6.0.2 ◦ ExpertFit
24
Stata 11 workstations (up to 25 concurrent) Atlas.ti workstations (up to 4 concurrent) nVivo workstations (up to 4 concurrent)
25
Windows ◦ IE only ◦ XP, Vista, Win 7 Mac or Linux ◦ Windows terminal services client ◦ Any browser
26
On-campus -- http://bingview.binghamton.edu On-campus -- http://bingview.binghamton.edu ◦ Log in using Pods id and password ◦ Select VM group of machines Off-campus – http://ssl.binghamton.eduhttp://ssl.binghamton.edu ◦ Log in using Pods id and password ◦ Select Network Connect ◦ Proceed as outlined above
27
Programs are under the Start menu Storage: ◦ C: is the hard drive of the virtual machine ◦ Network drives in the virtual machine are the drives on your local machine and your shared network storage (H: drive or S: drive) ◦ USB drives can be mounted Printers: ◦ Pharos printers ◦ Printers connected to your local machine
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.