Presentation is loading. Please wait.

Presentation is loading. Please wait.

Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009.

Similar presentations


Presentation on theme: "Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009."— Presentation transcript:

1 Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009

2 And Various Other Things James L. Wolf Director, Academic Computing Services September 21, 2009

3  Computing and network resources are shared resources.  Software, data, and network resources are covered by license agreements and contracts.  Intellectual property rights.  Public agencies operate under state and federal law.  Personal privacy and respect.

4  BU Computing and Network Acceptable Use Policy BU Computing and Network Acceptable Use Policy ◦ Approved by University Governance group called ACET ◦ Referenced in Rules of Student Conduct  Student Judiciary  Academic Honesty  University Police

5  Use “consistent with the education, research and public service mission”  Users: “those individuals provided a username and password”  “…right to limit access to its networks…” for violations.  “Non-University-owned computers, which house material, which violates the University’s policies, are subject to network disconnection without notice.”

6  “Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws.”

7  We don’t monitor content, but there are situations in which we will!!

8  Privacy  Copyright Copyright  Harassment, Libel and Slander  Sharing of access  Permitting unauthorized access  Circumventing Security

9  Breaching Security  Unauthorized Monitoring  Flooding  Private Commercial Purposes  Political Advertising or Campaigning  Modifying software or software installation

10  Password “does not guarantee privacy”  BU “not responsible for the loss of users’ files or data”  “computer files, including , may be considered “records“”

11  Not “personal and private”  “While administrators will not routinely monitor individual and will take reasonable precautions to protect the privacy of , program managers and technical staff may access a student’s ◦ To diagnose and resolve technical problems involving the system, and/or ◦ To investigate possible misuse of when a reasonable suspicion of abuse exists or in conjunction with an approved investigation. “

12  Messages sent/received as BU business: ◦ Be considered state records under applicable state regulations; ◦ Be releasable to the public under the Freedom of Information Law; ◦ Require special measures to comply with the Personal Privacy Protection Law  All messages “may be subject to discovery proceedings in legal actions.”

13  Be careful before you hit the Send button!!

14  immediate suspension of services  student or employee disciplinary procedures  Illegal acts ◦ subpoena and prosecution by commercial enterprises, local, state and/or federal authorities.

15  Digital Millenium Copyright Act (1998) ◦ Music, movies, TV shows, games, books, software  Infringement notifications  Presettlement offer letters

16  Universities should actively discourage sharing of copyrighted material  Universities should provide legal opportunities to obtain music, video content on line ◦ Rhapsody ◦ iTunes

17  Network Performance / Virus infection / Malware infestation  Hacking complaint  DMCA complaint  Harassment complaint  Software piracy complaint

18  Identify offender and / or location  Communicate with offender via  Reply acknowledges understanding (first offense)  No reply: place in quarantine  Quarantined offender signs “memo of understanding”  Repeat offender or refuse to sign results in disconnection from Res Hall net and referral to Student Judiciary.

19  Packet headers contain info on the type of content (e.g., MP3)  Packet headers contain info on origin and destination ports (e.g., http traffic is usually port 80)  Switches can accumulate bandwidth consumption data (2.5Gb/24hr)

20  Residence Halls, wireless network, wired ports in public spaces.  Checks OS for current updates (Windows and Mac only).  Checks for Anti-Virus SW with current Definition files.  Requires registration of MAC address with User ID.  Requires acknowledgment of AUP

21

22  Make specialized software available to students and researchers without them having to purchase individual licenses.  Make it available on and off campus  Make it available to owners of Windows, Mac and Linux computers  Integrate with network storage and printing

23  General workstations (up to 35 concurrent) ◦ SAS ◦ PASW 17 (aka SPSS) ◦ Matlab R2009a ◦ Ansys 11.0 ◦ Arena 12 ◦ Jack ◦ ExpertFit

24  Stata 11 workstations (up to 25 concurrent)  Atlas.ti workstations (up to 4 concurrent)  nVivo workstations (up to 4 concurrent)

25  Windows ◦ IE only ◦ XP, Vista, Win 7  Mac or Linux ◦ Windows terminal services client ◦ Any browser

26  On-campus -- On-campus -- ◦ Log in using Pods id and password ◦ Select VM group of machines  Off-campus – ◦ Log in using Pods id and password ◦ Select Network Connect ◦ Proceed as outlined above

27  Programs are under the Start menu  Storage: ◦ C: is the hard drive of the virtual machine ◦ Network drives in the virtual machine are the drives on your local machine and your shared network storage (H: drive or S: drive) ◦ USB drives can be mounted  Printers: ◦ Pharos printers ◦ Printers connected to your local machine


Download ppt "Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009."

Similar presentations


Ads by Google