Regulations and Services Available from a Public Network Access Point (incl Student Villages)

Size: px
Start display at page:

Download "Regulations and Services Available from a Public Network Access Point (incl Student Villages)"

Transcription

1 Regulations and Services Available from a Public Network Access Point (incl Student Villages) General Guidelines As with all computing or communications resources at the University of Limerick all users are obliged to abide by the University's Code of Conduct for Users of the University of Limerick computing resources. Reference to ITD below refers both to the Information Technology Division and to agents acting on behalf of ITD. Service Provided ITD provides the following services to Student Villages and Public Access network connection points. Services are operated on a continuous basis. In the event of a failure outside of the period 8.30 AM to 6.00 PM, Monday to Friday inclusive, services will be restored, as soon as possible, normally the next working day. In the event of a network maintenance call to any village house, this will be serviced within the maintenance window of 2.30 PM to 4.00 PM, Monday to Friday inclusive Internet access through a proxy server-supporting HTTP. Internet access to the University of Limerick is routed directly access using either POP or IMAP File Transfer access (FTP) using client software which is "Socks4" compliant Access to Instant Messaging and File Transfer using MSN Messenger and ICQ, verified for Windows 2000 Access to the University of Limerick print services ITD does not provide: Access to University application servers (such software is only licenced for computers owned by the University). Access from outside the University to computers located within the Village (WEB, FTP, Telnet etc.) The University can only provide software licences for computers that it owns. Some software is also licensed for home use by staff and students of the University and such licences are available for purchase from the Print Room or loan from the Library. PC Connection from a PNAP Page 1 of 6 Last Updated: 21 September 2006

2 Responsibility Individuals are responsible for all the software and hardware on their computer and are responsible for configuring same for use on the computer network. The University cannot take any responsibility for the way that this software is configured or as to whether it will work on the University network. ITD does not offer advice, assistance or support on configuring privately owned PCs for use on the University computer network. Users are responsible for all traffic originating from their machine regardless of whether or not they personally generated it, whether or not they know the affect and implications of what they are doing, and whether or not they realize that they have violated any specific policies. In most cases, unintentional violations will result in a temporary loss of connectivity pending the resolution of the problem. Repeat violations may result in a longer term or even permanent loss of connectivity. In some cases, especially those in which the Code of Conduct have been violated, the student will be referred to the University Discipline Committee. Registration Any machine attached to any part of the campus network must be properly registered with ITD. If your machine is not properly registered, it may be disconnected at any time without notice. For any given machine, ITD needs to know: the primary user of the machine the location of the machine the network adaptor address of the machine This information is critical to being able to diagnose and resolve network problems in a reasonable manner. Any machine on the network not properly registered, will be disconnected without notification. Under no circumstances may machines be configured with IP addresses that have not been assigned by ITD. By using an unregistered IP address or an IP address assigned to another, you deprive other users of network service and/or make it considerably more difficult to diagnose network problems on the campus network. Routers Routers are not permitted to be attached to any portion of the campus network. Any devices, which provide a routing service, will be immediately disconnected from the campus network. PC Connection from a PNAP Page 2 of 6 Last Updated: 21 September 2006

3 Ethernet hubs, which attach multiple devices to a single network outlet, are not routers and may be attached to the campus network. It is important that all machines connected to a hub be registered with ITD. Most operating systems do not provide routing functionality and are perfectly safe to attach to our network in any configuration. Some operating systems such as Windows NT, Windows NT Server, and most UNIX operating systems have the capability to provide routing functionality; for these operating systems, you should ensure that routing is not configured. Domain Name Servers. No Domain Name Servers are to be attached to the network. Network Traffic Network traffic should be considered private. Because of this, any "packet sniffing", or other deliberate attempts to read network information which is not intended for your use will be grounds for loss of network privileges. Student Village connections to the campus network, and to the Internet, are provided to allow students, staff and faculty to fully participate in the education and research missions of the University of Limerick. It may not remain feasible to provide unlimited connectivity for systems, which are not strictly serving the University's missions. Because of this possibility, ITD reserves the right to request that users reduce the amount of traffic being caused by their service, or where necessary, to remove such systems from the campus network. In all but extreme cases, ITD will contact the owner of the system before removing it from the network. ITD regularly monitors network traffic both content and amount. Miss-configured Services There may be times when a machine is unintentionally miss-configured and subsequently causes a problem on the campus network. In such cases, in order to preserve the best service possible for the majority of the users, the machine will be disconnected from the campus network immediately. The machine will only be allowed back onto the network after the owner notifies ITD that they have reconfigured the machine, resolving the problem. Accounts PC Connection from a PNAP Page 3 of 6 Last Updated: 21 September 2006

4 Some operating systems, specifically UNIX operating systems, allow the system administrator to create accounts for other users. While this is not discouraged for machines connected to the campus network, there are some things that should be considered. All users must be accurately identifiable. The user name field for any given account should contain the user's real name. There is no valid reason to allow a user to have a fictitious name assigned to their account. Off-campus users with no affiliation to the University of Limerick are explicitly prohibited from having accounts on machines connected to the campus network. It should also be noted that university resources, such as the campus network, are provided for university purposes. As a system administrator you are fully responsible for the conduct of your users. If the users in question are violating computing policies or causing other problems, the system administrator will be expected to take appropriate action to resolve the problem. If ITD determines that the problem has not been resolved, the system used will be disconnected from the campus network. Security Users are responsible for the security and integrity of their systems. In cases where a computer is "hacked into", it is recommended that the system be either shut down or be removed from the campus network as soon as possible in order to localize any potential damage and to stop the attack from spreading. In such cases, if the system administrator cannot be contacted in a reasonable time, ITD reserves the right to disable the network connection. Once the system administrator is made aware of the situation and agrees to take reasonable steps to ensure that the machine is not compromised, network privileges may be restored. In cases where, despite the efforts of the system administrator, the machine continues to pose a security concern, ITD reserves the right to require that the user switch to a single user OS before allowing the system back onto the campus network. Commercial Use Individuals are only permitted to use their network connection or computing privileges for commercial purposes with the explicit permission of the Director, ITD. Anonymous Mailers All electronic communications at UL must accurately identify the sender. Anonymous mail forwarders are explicitly prohibited. Running an anonymous mail forwarding service is grounds for removal of campus network privileges. Intentional Abuse PC Connection from a PNAP Page 4 of 6 Last Updated: 21 September 2006

5 Systems found to be intentionally running programs, which disrupt network activity or attack specific machines on the network will be subject to immediate removal. In some cases, disciplinary action may be taken against the owner of the system. Common Problems ITD has noted a few "recurring themes" in the computer abuse area. Some of these are outlined below, mainly to make you aware that some activities, which you might not consider to be "bad", may get you into trouble. Music and Video Files It is a common misconception that the creation and subsequent distribution of music and video files is an acceptable activity. The distribution of any copyright protected materials is illegal. The most common type of illegally distributed copyright files are music (MP3) and video files. Users found to be distributing copyrighted files may have their network connections revoked and be subject to disciplinary action. Software Piracy Distributing licensed software is illegal and constitutes a violation of the Code of Conduct. Systems being used to distribute copyrighted software will be removed from the network immediately and the system administrator may be subject to disciplinary action. Denial of Service Attacks No one should deliberately attempt to degrade or disrupt system performance or to interfere with the work of others. Any attempt to disrupt service or performance on systems on or off campus can result in the loss of network privileges and disciplinary action. The following items are all examples of denial of service attacks: Mail bombing (sending thousands of mail messages to a group or individual) Ping flooding (launching continuous ping requests at a specific machine) "Smurf attacks" "SYN flooding" By making you aware of some of the activities that frequently cause problems for users on the campus network, ITD hopes that you will be able to avoid situations, which could jeopardize your network access. PC Connection from a PNAP Page 5 of 6 Last Updated: 21 September 2006

6 If you wish to avail of these services, it is required that you print the registration form and complete the required details. PC Connection from a PNAP Page 6 of 6 Last Updated: 21 September 2006

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Linux MPS Firewall Supplement

Linux MPS Firewall Supplement Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel

More information

AGREEMENT on cpanel Hosting service use. AGREEMENT No. Concluded on: 1. (hereinafter: the Customer) Article 1 Subject and Definition

AGREEMENT on cpanel Hosting service use. AGREEMENT No. Concluded on: 1. (hereinafter: the Customer) Article 1 Subject and Definition AGREEMENT on cpanel Hosting service use AGREEMENT No. Concluded on: Between the Parties: 1. (hereinafter: the Customer) and 2. EUnet d.o.o, Milentija Popovića 9, Sava Centar, 11070 Novi Beograd, represented

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Student Network Acceptable Use Policy Lone Jack C-6 School District

Student Network Acceptable Use Policy Lone Jack C-6 School District Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

AASTMT Acceptable Use Policy

AASTMT Acceptable Use Policy AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating

More information

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE Section: 300 Human Resources Subject: 320 Employment Policy: Information Technology Date Approved: June 16, 2009 Acceptable Use Policy #: 321.01 Date of Last Amendment:

More information

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative

More information

3359-11-10.3 Information technology security and system integrity policy.

3359-11-10.3 Information technology security and system integrity policy. Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values and perspectives

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

Acceptable Use Policy

Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Policy on Connection to the University Network

Policy on Connection to the University Network Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

UCLA Policy 401 Minimum Security Standards for Network Devices

UCLA Policy 401 Minimum Security Standards for Network Devices UCLA Policy 401 Minimum Security Standards for Network Devices Issuing Officer: Associate Vice Chancellor, Information Technology Responsible Dept: Office of Information Technology Effective Date: November

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Network Security Policy

Network Security Policy Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Account Management Standards

Account Management Standards Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and

More information

Computing and Network Use Policy

Computing and Network Use Policy Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted

More information

FMGateway by FMWebschool

FMGateway by FMWebschool FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Heart of Iowa Communications Cooperative. Acceptable Use and Network Management Policy

Heart of Iowa Communications Cooperative. Acceptable Use and Network Management Policy Heart of Iowa Communications Cooperative Acceptable Use and Network Management Policy Heart of Iowa Communications Cooperative (hereinafter Heart of Iowa ) inclusive of its affiliates, Heart of Iowa Ventures,

More information

933 COMPUTER NETWORK/SERVER SECURITY POLICY

933 COMPUTER NETWORK/SERVER SECURITY POLICY 933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.

More information

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

WYANDOTTE ONLINE ACCEPTABLE USE POLICY

WYANDOTTE ONLINE ACCEPTABLE USE POLICY WYANDOTTE ONLINE ACCEPTABLE USE POLICY Wyandotte Online may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Online High Speed Internet users should

More information

DIGITAL SUBSCRIBER LINE (DSL)

DIGITAL SUBSCRIBER LINE (DSL) Title Page DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE REGULATIONS, RATES, AND CHARGES Applying to the Provision of DSL For Customers of This DSL Service Guide does not include Internet Access, Content

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

CT Communications Internet Handbook

CT Communications Internet Handbook CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Biological Sciences Computer Systems

Biological Sciences Computer Systems Biological Sciences Computer Systems Summary of Acceptable Use Policies There are several policies that users must adhere to when using the Life Sciences Network. Most are derived from federal and state

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy. CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services

More information

Student Affairs Information Technology Policies. January 2013

Student Affairs Information Technology Policies. January 2013 Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships

More information

Updated January 2016. Hosting and Managed Services Acceptable Use Policy

Updated January 2016. Hosting and Managed Services Acceptable Use Policy Updated January 2016 Hosting and Managed Services Acceptable Use Policy Key Comment This policy provides Cologix customers ordering hosting and managed services from Cologix with standards and rules regarding

More information

Auburn Montgomery. Registration and Security Policy for AUM Servers

Auburn Montgomery. Registration and Security Policy for AUM Servers Auburn Montgomery Title: Responsible Office: Registration and Security Policy for AUM Servers Information Technology Services I. PURPOSE To outline the steps required to register and maintain departmental

More information

Network Security Policy: Best Practices White Paper

Network Security Policy: Best Practices White Paper Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security

More information

Managed Hosting Terms of Service

Managed Hosting Terms of Service Managed Hosting Terms of Service This document contains s (the "company", "us", "we", or "our") Managed Hosting Terms of Service. expects its clients (the customer, user, you, or your ) to carefully read

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Terms of Services. Revision date: 6/4/2014

Terms of Services. Revision date: 6/4/2014 Terms of Services Revision date: 6/4/2014 All services provided by Vernox Computer Services LLC \"DBA\" DDOS Safety ("Vernox Computer Services LLC \"DBA\" DDOS Safety") may be used for lawful purposes

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors

Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! TCP/IP Port Monitoring TCP/IP ports

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY Dedicated Server Store s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what Dedicated Server Store expects of them while using

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Appropriate Use Policy for Information Technology

Appropriate Use Policy for Information Technology Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Park Avenue motor cars

Park Avenue motor cars Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together

More information

STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age.

STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age. STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age. PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino. http://staff.polito.it/mario.

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino. http://staff.polito.it/mario. Multi-layer switch hardware commutation across various layers Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Based on chapter 10 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill,

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

DUUS Information Technology (IT) Acceptable Use Policy

DUUS Information Technology (IT) Acceptable Use Policy DUUS Information Technology (IT) Acceptable Use Policy Issue Date: October 1, 2013 Effective Date: October 1, 2013 Revised Date: Number: DHHS-2013-002 1.0 Purpose and Objectives The purpose of this policy

More information

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

The Armstrong Chamberlin Web Hosting Acceptable Use Policy (AUP) The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Acceptable Use of Information Technology (IT) Resources

Acceptable Use of Information Technology (IT) Resources ANDREW M. CUOMO GOVERNOR State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.cio.ny.gov New York State Information Technology Policy IT Best Practice Guideline: Acceptable Use of Information Technology

More information

Terms of Services Revision date: May 16, 2014

Terms of Services Revision date: May 16, 2014 Terms of Services Revision date: May 16, 2014 All services provided by CheapHost Provider ("CheapHost Provider") may be used for lawful purposes only. Transmission, storage or presentation of any information,

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information