Presentation on theme: "Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009."— Presentation transcript:
Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009
And Various Other Things James L. Wolf Director, Academic Computing Services September 21, 2009
Computing and network resources are shared resources. Software, data, and network resources are covered by license agreements and contracts. Intellectual property rights. Public agencies operate under state and federal law. Personal privacy and respect.
BU Computing and Network Acceptable Use Policy BU Computing and Network Acceptable Use Policy ◦ Approved by University Governance group called ACET ◦ Referenced in Rules of Student Conduct Student Judiciary Academic Honesty University Police
Use “consistent with the education, research and public service mission” Users: “those individuals provided a username and password” “…right to limit access to its networks…” for violations. “Non-University-owned computers, which house material, which violates the University’s policies, are subject to network disconnection without notice.”
“Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws.”
We don’t monitor content, but there are situations in which we will!!
Breaching Security Unauthorized Monitoring Flooding Private Commercial Purposes Political Advertising or Campaigning Modifying software or software installation
Password “does not guarantee privacy” BU “not responsible for the loss of users’ files or data” “computer files, including e-mail, may be considered “records“”
Not “personal and private” “While administrators will not routinely monitor individual email and will take reasonable precautions to protect the privacy of Email, program managers and technical staff may access a student’s Email: ◦ To diagnose and resolve technical problems involving the system, and/or ◦ To investigate possible misuse of Email when a reasonable suspicion of abuse exists or in conjunction with an approved investigation. “
Messages sent/received as BU business: ◦ Be considered state records under applicable state regulations; ◦ Be releasable to the public under the Freedom of Information Law; ◦ Require special measures to comply with the Personal Privacy Protection Law All messages “may be subject to discovery proceedings in legal actions.”
Be careful before you hit the Send button!!
immediate suspension of services student or employee disciplinary procedures Illegal acts ◦ subpoena and prosecution by commercial enterprises, local, state and/or federal authorities.
Identify offender and / or location Communicate with offender via e-mail Reply acknowledges understanding (first offense) No reply: place in quarantine Quarantined offender signs “memo of understanding” Repeat offender or refuse to sign results in disconnection from Res Hall net and referral to Student Judiciary.
Packet headers contain info on the type of content (e.g., MP3) Packet headers contain info on origin and destination ports (e.g., http traffic is usually port 80) Switches can accumulate bandwidth consumption data (2.5Gb/24hr)
Residence Halls, wireless network, wired ports in public spaces. Checks OS for current updates (Windows and Mac only). Checks for Anti-Virus SW with current Definition files. Requires registration of MAC address with User ID. Requires acknowledgment of AUP
Make specialized software available to students and researchers without them having to purchase individual licenses. Make it available on and off campus Make it available to owners of Windows, Mac and Linux computers Integrate with network storage and printing
General workstations (up to 35 concurrent) ◦ SAS 9.1.3 ◦ PASW 17 (aka SPSS) ◦ Matlab R2009a ◦ Ansys 11.0 ◦ Arena 12 ◦ Jack 6.0.2 ◦ ExpertFit
Stata 11 workstations (up to 25 concurrent) Atlas.ti workstations (up to 4 concurrent) nVivo workstations (up to 4 concurrent)
Windows ◦ IE only ◦ XP, Vista, Win 7 Mac or Linux ◦ Windows terminal services client ◦ Any browser
On-campus -- http://bingview.binghamton.edu On-campus -- http://bingview.binghamton.edu ◦ Log in using Pods id and password ◦ Select VM group of machines Off-campus – http://ssl.binghamton.eduhttp://ssl.binghamton.edu ◦ Log in using Pods id and password ◦ Select Network Connect ◦ Proceed as outlined above
Programs are under the Start menu Storage: ◦ C: is the hard drive of the virtual machine ◦ Network drives in the virtual machine are the drives on your local machine and your shared network storage (H: drive or S: drive) ◦ USB drives can be mounted Printers: ◦ Pharos printers ◦ Printers connected to your local machine