Computer Science Freshman Seminar

Download Report

Transcript Computer Science Freshman Seminar

Acceptable Use of Computer and Network
Resources
James L. Wolf
Director, Academic Computing Services
September 21,2009
And Various Other Things
James L. Wolf
Director, Academic Computing Services
September 21, 2009





Computing and network resources are
shared resources.
Software, data, and network resources
are covered by license agreements and
contracts.
Intellectual property rights.
Public agencies operate under state and
federal law.
Personal privacy and respect.

BU Computing and Network Acceptable Use
Policy
◦ Approved by University Governance group called
ACET
◦ Referenced in Rules of Student Conduct
 Student Judiciary
 Academic Honesty
 University Police




Use “consistent with the education,
research and public service mission”
Users: “those individuals provided a
username and password”
“…right to limit access to its networks…”
for violations.
“Non-University-owned computers,
which house material, which violates the
University’s policies, are subject to
network disconnection without notice.”

“Although the University does not generally
monitor or restrict the content of material
transported across networks, it reserves the
right to access and review all aspects of its
computing systems and networks, including
individual login sessions and account files,
to investigate performance or system
problems, search for viruses and other
harmful programs, or upon reasonable
cause to determine if a user is violating this
policy or state or federal laws.”

We don’t monitor content, but there are
situations in which we will!!






Privacy
Copyright
Harassment, Libel and Slander
Sharing of access
Permitting unauthorized access
Circumventing Security






Breaching Security
Unauthorized Monitoring
Flooding
Private Commercial Purposes
Political Advertising or Campaigning
Modifying software or software installation



Password “does not guarantee privacy”
BU “not responsible for the loss of users’ files
or data”
“computer files, including e-mail, may be
considered “records“”


Not “personal and private”
“While administrators will not routinely
monitor individual email and will take
reasonable precautions to protect the
privacy of Email, program managers and
technical staff may access a student’s
Email:
◦ To diagnose and resolve technical problems
involving the system, and/or
◦ To investigate possible misuse of Email when
a reasonable suspicion of abuse exists or in
conjunction with an approved investigation. “

Messages sent/received as BU business:
◦ Be considered state records under applicable state
regulations;
◦ Be releasable to the public under the Freedom of
Information Law;
◦ Require special measures to comply with the
Personal Privacy Protection Law

All messages “may be subject to discovery
proceedings in legal actions.”

Be careful before you hit the Send button!!



immediate suspension of services
student or employee disciplinary procedures
Illegal acts
◦ subpoena and prosecution by commercial
enterprises, local, state and/or federal authorities.

Digital Millenium Copyright Act (1998)
◦ Music, movies, TV shows, games, books, software


Infringement notifications
Presettlement offer letters


Universities should actively discourage
sharing of copyrighted material
Universities should provide legal
opportunities to obtain music, video content
on line
◦ Rhapsody
◦ iTunes





Network Performance / Virus infection /
Malware infestation
Hacking complaint
DMCA complaint
Harassment complaint
Software piracy complaint






Identify offender and / or location
Communicate with offender via e-mail
Reply acknowledges understanding (first
offense)
No reply: place in quarantine
Quarantined offender signs “memo of
understanding”
Repeat offender or refuse to sign results in
disconnection from Res Hall net and referral
to Student Judiciary.



Packet headers contain info on the type of
content (e.g., MP3)
Packet headers contain info on origin and
destination ports (e.g., http traffic is usually
port 80)
Switches can accumulate bandwidth
consumption data (2.5Gb/24hr)





Residence Halls, wireless network, wired
ports in public spaces.
Checks OS for current updates (Windows and
Mac only).
Checks for Anti-Virus SW with current
Definition files.
Requires registration of MAC address with
User ID.
Requires acknowledgment of AUP




Make specialized software available to
students and researchers without them
having to purchase individual licenses.
Make it available on and off campus
Make it available to owners of Windows, Mac
and Linux computers
Integrate with network storage and printing

General workstations (up to 35 concurrent)
◦
◦
◦
◦
◦
◦
◦
SAS 9.1.3
PASW 17 (aka SPSS)
Matlab R2009a
Ansys 11.0
Arena 12
Jack 6.0.2
ExpertFit



Stata 11 workstations (up to 25 concurrent)
Atlas.ti workstations (up to 4 concurrent)
nVivo workstations (up to 4 concurrent)

Windows
◦ IE only
◦ XP, Vista, Win 7

Mac or Linux
◦ Windows terminal
services client
◦ Any browser

On-campus -http://bingview.binghamton.edu
◦ Log in using Pods id and password
◦ Select VM group of machines

Off-campus – http://ssl.binghamton.edu
◦ Log in using Pods id and password
◦ Select Network Connect
◦ Proceed as outlined above


Programs are under the Start menu
Storage:
◦ C: is the hard drive of the virtual machine
◦ Network drives in the virtual machine are the drives
on your local machine and your shared network
storage (H: drive or S: drive)
◦ USB drives can be mounted

Printers:
◦ Pharos printers
◦ Printers connected to your local machine