Computer Science Freshman Seminar
Acceptable Use of Computer and Network ResourcesJames L. WolfDirector, Academic Computing ServicesSeptember 21,2009
Computer Science Freshman Seminar
And Various Other ThingsJames L. WolfDirector, Academic Computing ServicesSeptember 21, 2009
Computing and network resources are shared resources.Software, data, and network resources are covered by license agreements and contracts.Intellectual property rights.Public agencies operate under state and federal law.Personal privacy and respect.
BU Computing and Network Acceptable Use PolicyApproved by University Governance group called ACETReferenced in Rules of Student ConductStudent JudiciaryAcademic HonestyUniversity Police
Information Technology Services Policy
Use “consistent with the education, research and public service mission”Users: “those individuals provided a username and password”“…right to limit access to itsnetworks…” for violations.“Non-University-owned computers, which house material, which violates the University’s policies, are subject to network disconnection without notice.”
“Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws.”
General Principles (2)
We don’t monitor content, but there are situations in which we will!!
General Principles (2)
PrivacyCopyrightHarassment, Libel and SlanderSharing of accessPermitting unauthorized accessCircumventing Security
Breaching SecurityUnauthorized MonitoringFloodingPrivate Commercial PurposesPolitical Advertising or CampaigningModifying software or software installation
Acceptable Use (2)
Password “does not guarantee privacy”BU “not responsible for the loss of users’ files or data”“computer files, including e-mail, may beconsidered “records“”
Not “personal and private”“While administrators will not routinely monitor individual email and will take reasonable precautions to protect the privacy of Email, program managers and technical staff may access a student’s Email:To diagnose and resolve technical problems involving the system, and/orTo investigate possible misuse of Email when a reasonable suspicion of abuse exists or in conjunction with an approved investigation. “
Messages sent/received as BU business:Be considered state records under applicable state regulations;Be releasable to the public under the Freedom of Information Law;Require special measures to comply with the Personal Privacy Protection LawAll messages “may be subject to discovery proceedings in legal actions.”
E-Mail Cautions (2)
Be careful before you hit the Send button!!
E-Mail Cautions (summary)
immediate suspension of servicesstudent or employee disciplinary proceduresIllegal actssubpoena andprosecution by commercial enterprises, local, state and/or federal authorities.
Digital Millenium Copyright Act (1998)Music, movies, TV shows, games, books, softwareInfringement notificationsPresettlement offer letters
Universities should actively discourage sharing of copyrighted materialUniversities should provide legal opportunities to obtain music, video content on lineRhapsodyiTunes
Higher Education Finance Act recertification
Network Performance / Virus infection / Malware infestationHacking complaintDMCA complaintHarassment complaintSoftware piracy complaint
Computing Services’ Practice
Identify offender and / or locationCommunicate with offender via e-mailReply acknowledges understanding (first offense)No reply: place in quarantineQuarantined offender signs “memo of understanding”Repeat offender or refuse to sign results in disconnection from Res Hall net and referral to Student Judiciary.
Packet headers contain info on the type of content (e.g., MP3)Packet headers contain info on origin and destination ports (e.g., http traffic is usually port 80)Switches can accumulate bandwidth consumption data (2.5Gb/24hr)
Packet Shapers, Access Control Lists and Bandwidth Quotas
Residence Halls, wireless network, wired ports in public spaces.Checks OS for current updates (Windows and Mac only).Checks for Anti-Virus SW with current Definition files.Requires registration of MAC address with User ID.Requiresacknowledgment of AUP
Binghamton Network Manager
Virtual Desktop Environment
Make specialized software available to students and researchers without them having to purchase individual licenses.Make it available on and off campusMake it available to owners of Windows, Mac and Linux computersIntegrate with network storage and printing
General workstations (up to 35 concurrent)SAS 9.1.3PASW 17 (aka SPSS)MatlabR2009aAnsys11.0Arena 12Jack 6.0.2ExpertFit
Stata11 workstations (up to 25 concurrent)Atlas.tiworkstations (up to 4 concurrent)nVivoworkstations (up to 4 concurrent)
WindowsIE onlyXP, Vista, Win 7
Mac or LinuxWindows terminal services clientAny browser
On-campus--http://bingview.binghamton.eduLog in using Pods id and passwordSelect VM group of machinesOff-campus –http://ssl.binghamton.eduLog in using Pods id and passwordSelect Network ConnectProceed as outlined above
Programs are under the Start menuStorage:C: is the hard drive of thevirtualmachineNetwork drives in the virtual machine are the drives on your local machine and your shared network storage (H: drive or S: drive)USB drives can be mountedPrinters:Pharos printersPrinters connected to your local machine
The virtual desktop