Regulations and Services Available from a Public Network Access Point (incl Student Villages)
|
|
- Theodore Blake
- 7 years ago
- Views:
Transcription
1 Regulations and Services Available from a Public Network Access Point (incl Student Villages) General Guidelines As with all computing or communications resources at the University of Limerick all users are obliged to abide by the University's Code of Conduct for Users of the University of Limerick computing resources. Reference to ITD below refers both to the Information Technology Division and to agents acting on behalf of ITD. Service Provided ITD provides the following services to Student Villages and Public Access network connection points. Services are operated on a continuous basis. In the event of a failure outside of the period 8.30 AM to 6.00 PM, Monday to Friday inclusive, services will be restored, as soon as possible, normally the next working day. In the event of a network maintenance call to any village house, this will be serviced within the maintenance window of 2.30 PM to 4.00 PM, Monday to Friday inclusive Internet access through a proxy server-supporting HTTP. Internet access to the University of Limerick is routed directly access using either POP or IMAP File Transfer access (FTP) using client software which is "Socks4" compliant Access to Instant Messaging and File Transfer using MSN Messenger and ICQ, verified for Windows 2000 Access to the University of Limerick print services ITD does not provide: Access to University application servers (such software is only licenced for computers owned by the University). Access from outside the University to computers located within the Village (WEB, FTP, Telnet etc.) The University can only provide software licences for computers that it owns. Some software is also licensed for home use by staff and students of the University and such licences are available for purchase from the Print Room or loan from the Library. PC Connection from a PNAP Page 1 of 6 Last Updated: 21 September 2006
2 Responsibility Individuals are responsible for all the software and hardware on their computer and are responsible for configuring same for use on the computer network. The University cannot take any responsibility for the way that this software is configured or as to whether it will work on the University network. ITD does not offer advice, assistance or support on configuring privately owned PCs for use on the University computer network. Users are responsible for all traffic originating from their machine regardless of whether or not they personally generated it, whether or not they know the affect and implications of what they are doing, and whether or not they realize that they have violated any specific policies. In most cases, unintentional violations will result in a temporary loss of connectivity pending the resolution of the problem. Repeat violations may result in a longer term or even permanent loss of connectivity. In some cases, especially those in which the Code of Conduct have been violated, the student will be referred to the University Discipline Committee. Registration Any machine attached to any part of the campus network must be properly registered with ITD. If your machine is not properly registered, it may be disconnected at any time without notice. For any given machine, ITD needs to know: the primary user of the machine the location of the machine the network adaptor address of the machine This information is critical to being able to diagnose and resolve network problems in a reasonable manner. Any machine on the network not properly registered, will be disconnected without notification. Under no circumstances may machines be configured with IP addresses that have not been assigned by ITD. By using an unregistered IP address or an IP address assigned to another, you deprive other users of network service and/or make it considerably more difficult to diagnose network problems on the campus network. Routers Routers are not permitted to be attached to any portion of the campus network. Any devices, which provide a routing service, will be immediately disconnected from the campus network. PC Connection from a PNAP Page 2 of 6 Last Updated: 21 September 2006
3 Ethernet hubs, which attach multiple devices to a single network outlet, are not routers and may be attached to the campus network. It is important that all machines connected to a hub be registered with ITD. Most operating systems do not provide routing functionality and are perfectly safe to attach to our network in any configuration. Some operating systems such as Windows NT, Windows NT Server, and most UNIX operating systems have the capability to provide routing functionality; for these operating systems, you should ensure that routing is not configured. Domain Name Servers. No Domain Name Servers are to be attached to the network. Network Traffic Network traffic should be considered private. Because of this, any "packet sniffing", or other deliberate attempts to read network information which is not intended for your use will be grounds for loss of network privileges. Student Village connections to the campus network, and to the Internet, are provided to allow students, staff and faculty to fully participate in the education and research missions of the University of Limerick. It may not remain feasible to provide unlimited connectivity for systems, which are not strictly serving the University's missions. Because of this possibility, ITD reserves the right to request that users reduce the amount of traffic being caused by their service, or where necessary, to remove such systems from the campus network. In all but extreme cases, ITD will contact the owner of the system before removing it from the network. ITD regularly monitors network traffic both content and amount. Miss-configured Services There may be times when a machine is unintentionally miss-configured and subsequently causes a problem on the campus network. In such cases, in order to preserve the best service possible for the majority of the users, the machine will be disconnected from the campus network immediately. The machine will only be allowed back onto the network after the owner notifies ITD that they have reconfigured the machine, resolving the problem. Accounts PC Connection from a PNAP Page 3 of 6 Last Updated: 21 September 2006
4 Some operating systems, specifically UNIX operating systems, allow the system administrator to create accounts for other users. While this is not discouraged for machines connected to the campus network, there are some things that should be considered. All users must be accurately identifiable. The user name field for any given account should contain the user's real name. There is no valid reason to allow a user to have a fictitious name assigned to their account. Off-campus users with no affiliation to the University of Limerick are explicitly prohibited from having accounts on machines connected to the campus network. It should also be noted that university resources, such as the campus network, are provided for university purposes. As a system administrator you are fully responsible for the conduct of your users. If the users in question are violating computing policies or causing other problems, the system administrator will be expected to take appropriate action to resolve the problem. If ITD determines that the problem has not been resolved, the system used will be disconnected from the campus network. Security Users are responsible for the security and integrity of their systems. In cases where a computer is "hacked into", it is recommended that the system be either shut down or be removed from the campus network as soon as possible in order to localize any potential damage and to stop the attack from spreading. In such cases, if the system administrator cannot be contacted in a reasonable time, ITD reserves the right to disable the network connection. Once the system administrator is made aware of the situation and agrees to take reasonable steps to ensure that the machine is not compromised, network privileges may be restored. In cases where, despite the efforts of the system administrator, the machine continues to pose a security concern, ITD reserves the right to require that the user switch to a single user OS before allowing the system back onto the campus network. Commercial Use Individuals are only permitted to use their network connection or computing privileges for commercial purposes with the explicit permission of the Director, ITD. Anonymous Mailers All electronic communications at UL must accurately identify the sender. Anonymous mail forwarders are explicitly prohibited. Running an anonymous mail forwarding service is grounds for removal of campus network privileges. Intentional Abuse PC Connection from a PNAP Page 4 of 6 Last Updated: 21 September 2006
5 Systems found to be intentionally running programs, which disrupt network activity or attack specific machines on the network will be subject to immediate removal. In some cases, disciplinary action may be taken against the owner of the system. Common Problems ITD has noted a few "recurring themes" in the computer abuse area. Some of these are outlined below, mainly to make you aware that some activities, which you might not consider to be "bad", may get you into trouble. Music and Video Files It is a common misconception that the creation and subsequent distribution of music and video files is an acceptable activity. The distribution of any copyright protected materials is illegal. The most common type of illegally distributed copyright files are music (MP3) and video files. Users found to be distributing copyrighted files may have their network connections revoked and be subject to disciplinary action. Software Piracy Distributing licensed software is illegal and constitutes a violation of the Code of Conduct. Systems being used to distribute copyrighted software will be removed from the network immediately and the system administrator may be subject to disciplinary action. Denial of Service Attacks No one should deliberately attempt to degrade or disrupt system performance or to interfere with the work of others. Any attempt to disrupt service or performance on systems on or off campus can result in the loss of network privileges and disciplinary action. The following items are all examples of denial of service attacks: Mail bombing (sending thousands of mail messages to a group or individual) Ping flooding (launching continuous ping requests at a specific machine) "Smurf attacks" "SYN flooding" By making you aware of some of the activities that frequently cause problems for users on the campus network, ITD hopes that you will be able to avoid situations, which could jeopardize your network access. PC Connection from a PNAP Page 5 of 6 Last Updated: 21 September 2006
6 If you wish to avail of these services, it is required that you print the registration form and complete the required details. PC Connection from a PNAP Page 6 of 6 Last Updated: 21 September 2006
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
More informationNetwork Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationREGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
More informationLinux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
More informationAGREEMENT on cpanel Hosting service use. AGREEMENT No. Concluded on: 1. (hereinafter: the Customer) Article 1 Subject and Definition
AGREEMENT on cpanel Hosting service use AGREEMENT No. Concluded on: Between the Parties: 1. (hereinafter: the Customer) and 2. EUnet d.o.o, Milentija Popovića 9, Sava Centar, 11070 Novi Beograd, represented
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationStudent Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
More informationNew Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
More informationAASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
More informationCOMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE
COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE Section: 300 Human Resources Subject: 320 Employment Policy: Information Technology Date Approved: June 16, 2009 Acceptable Use Policy #: 321.01 Date of Last Amendment:
More informationTYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy
TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative
More information3359-11-10.3 Information technology security and system integrity policy.
Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values and perspectives
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
More informationAcceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
More informationResponsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationPolicy on Connection to the University Network
Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05
More informationORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
More informationAcceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationAbstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
More informationUCLA Policy 401 Minimum Security Standards for Network Devices
UCLA Policy 401 Minimum Security Standards for Network Devices Issuing Officer: Associate Vice Chancellor, Information Technology Responsible Dept: Office of Information Technology Effective Date: November
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationNetwork Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationAccount Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
More informationLinux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
More informationAcceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
More informationSTATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION
STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission
More informationDelphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
More informationSecure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
More informationDRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL
The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and
More informationComputing and Network Use Policy
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
More informationFMGateway by FMWebschool
FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationUnited Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationCablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationHeart of Iowa Communications Cooperative. Acceptable Use and Network Management Policy
Heart of Iowa Communications Cooperative Acceptable Use and Network Management Policy Heart of Iowa Communications Cooperative (hereinafter Heart of Iowa ) inclusive of its affiliates, Heart of Iowa Ventures,
More information933 COMPUTER NETWORK/SERVER SECURITY POLICY
933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.
More informationCOMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
More informationNetwork & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
More informationSHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")
More informationWYANDOTTE ONLINE ACCEPTABLE USE POLICY
WYANDOTTE ONLINE ACCEPTABLE USE POLICY Wyandotte Online may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Online High Speed Internet users should
More informationDIGITAL SUBSCRIBER LINE (DSL)
Title Page DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE REGULATIONS, RATES, AND CHARGES Applying to the Provision of DSL For Customers of This DSL Service Guide does not include Internet Access, Content
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationBUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationC H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationCT Communications Internet Handbook
CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,
More informationAcceptable Use Policy
Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)
More informationLab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationBiological Sciences Computer Systems
Biological Sciences Computer Systems Summary of Acceptable Use Policies There are several policies that users must adhere to when using the Life Sciences Network. Most are derived from federal and state
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationINFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
More informationFirewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
More informationmaintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.
CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services
More informationStudent Affairs Information Technology Policies. January 2013
Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships
More informationUpdated January 2016. Hosting and Managed Services Acceptable Use Policy
Updated January 2016 Hosting and Managed Services Acceptable Use Policy Key Comment This policy provides Cologix customers ordering hosting and managed services from Cologix with standards and rules regarding
More informationAuburn Montgomery. Registration and Security Policy for AUM Servers
Auburn Montgomery Title: Responsible Office: Registration and Security Policy for AUM Servers Information Technology Services I. PURPOSE To outline the steps required to register and maintain departmental
More informationNetwork Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
More informationManaged Hosting Terms of Service
Managed Hosting Terms of Service This document contains s (the "company", "us", "we", or "our") Managed Hosting Terms of Service. expects its clients (the customer, user, you, or your ) to carefully read
More informationEnterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
More informationDomain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services
Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided
More informationFAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
More informationTerms of Services. Revision date: 6/4/2014
Terms of Services Revision date: 6/4/2014 All services provided by Vernox Computer Services LLC \"DBA\" DDOS Safety ("Vernox Computer Services LLC \"DBA\" DDOS Safety") may be used for lawful purposes
More informationQuality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
More informationConfiguring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors
Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! TCP/IP Port Monitoring TCP/IP ports
More informationInformation Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY Dedicated Server Store s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what Dedicated Server Store expects of them while using
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationAppropriate Use Policy for Information Technology
Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be
More informationLab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
More informationPark Avenue motor cars
Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.
More informationOLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
More informationSONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
More informationHTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
More informationSTATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age.
STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age. PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationMulti-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino. http://staff.polito.it/mario.
Multi-layer switch hardware commutation across various layers Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Based on chapter 10 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill,
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationDUUS Information Technology (IT) Acceptable Use Policy
DUUS Information Technology (IT) Acceptable Use Policy Issue Date: October 1, 2013 Effective Date: October 1, 2013 Revised Date: Number: DHHS-2013-002 1.0 Purpose and Objectives The purpose of this policy
More informationThe Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")
The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of
More informationVirtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationAcceptable Use of Information Technology (IT) Resources
ANDREW M. CUOMO GOVERNOR State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.cio.ny.gov New York State Information Technology Policy IT Best Practice Guideline: Acceptable Use of Information Technology
More informationTerms of Services Revision date: May 16, 2014
Terms of Services Revision date: May 16, 2014 All services provided by CheapHost Provider ("CheapHost Provider") may be used for lawful purposes only. Transmission, storage or presentation of any information,
More informationOne-to-One Technology Initiative Table of Contents
One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification
More informationN-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
More information