The use of ResNet is subject to:
ICT code of practice for Students
Additional Regulations for the use of ResNet Facilities Conditions of Service for the use of ResNet Facilities Explanation of the Regulations Statement on copyright and Internet filesharing Guidelines for the responsible use of file sharing Server Regulations University policy on wireless LAN equipment Users must agree to these regulations and conditions when they sign the application form and apply to use the service.
1.1 Rights in software.
ResNet users may be permitted to use software specifically licensed to the University; users must remove such software from their computers when they leave the University or are instructed to do so.
1.2 Use of University Resources.
Users must not operate a service that redistributes ResNet access or any other University resource to others.
No device attached to the University ResNet network may be configured with any addresses other than those issued to it or authorised for it.
1.4 Equipment connected to ResNet data networks.
Each user may connect a single computer to the ResNet data network point in his or her room. Connection of any other device will usually cause the point to become inoperative. The following uses of a computer connected to the ResNet data networks are contraventions of these regulations:
provision of access to the ResNet data networks by any person other than the one registered as the user of this connection; use as a server, unless registered with and authorised by Computing Services ; computers registered as servers must comply with all ResNet server regulations. If the user is in any doubt as to whether his or her computer should be categorised as a server the user must consult Computing Services .
1.5 Generation of chargeable data network traffic.
The University incurs charges for network traffic transferred across certain networks. Users are expected to generate such traffic only where necessary, and to minimise it as much as possible. Any user who persists in generating excessive chargeable data network traffic after having been requested not to do so by Computing Services is in contravention of these regulations and action will be taken to recover the charges incurred.
1.6 Computer Misuse.
It is a breach of these regulations, and it may also be a criminal offence under the Computer Misuse Act 1990, to:
attempt to damage or disrupt the hardware, software or data of computer systems. attempt to crash another computer, deny access to a service or disrupt a service in any other way. attempt to gain unauthorised access to any computer system. Unauthorised access includes, but is not limited to: gain access to password protected drives or directories without the owners expressed permission use password cracking programs, or attempt to gather passwords by intercepting traffic or other means, gain access or attempt to gain access to another computer without the owners permission. port scan any system without the owners expressed permission. distribute or attempt to install back-door trojan horse programs on computer systems Any reports received by Computing Services that computer misuse has occurred will result in the ResNet connection being disabled and the matter dealt with by University disciplinary procedures or reported to the police where appropriate.
1.7 Computer Security.
Users are responsible for the security and integrity of their system and must ensure that their computer and ResNet connection are secure and not open to misuse by others. Users must follow advice from Computing Services to install, reconfigure or upgrade software where necessary to ensure security. In cases where a users system has been breached it is recommended that the system is removed from the network in order to prevent the attack from spreading. If the system owner cannot be contacted in reasonable time, Computing Services reserve the right to disable their network connection. Only when the system owner has taken reasonable steps to ensure that the computer is not compromised, will network privileges be restored.
2.1 Withdrawal of facilities.
If a user is in breach of any of these regulations, Computing Services may withdraw or restrict access to ResNet facilities.
2.2 Disciplinary action.
Any breach of University regulations may be reported to the Director of Information Services to be dealt with under the University's disciplinary procedures. Computing Services may request that a user be charged for extra work that has arisen as the result of computer misuse.
1.1 Acceptance of Responsibility.
A user will be held responsible for any breach of regulations carried out by others with the use of his or her ResNet connection.
1.2 Service during vacations.
Service will be available during the Christmas and Easter vacations for users resident in their own room, and for users who move room temporarily within each of these vacations. ResNet access will be available during the summer vacation. Due to work on infrastructure upgrades the service may be subject to interruption without notice and only limited support will be available.
1.3 Interruption of service.
The service may be unavailable for brief periods due to normal scheduled maintenance, of which users will be notified in advance wherever possible. The ability to offer a service may be affected by failure of equipment on ResNet or connected networks, including those outside the control of the University. Users should be aware that problems which occur out of term time or when the University is closed, may take longer than normal to resolve.
1.4 Network security.
To ensure the security of ResNet, the University reserves the right to conduct scans of the network in order to determine what computers are connected to it and what services they are operating. If there is reasonable ground to believe that a computer connected to the network may present a security risk or contravenes the acceptable use policy, Computing Services may request full access to the system in order to assess and resolve the problem.
Why are there so many regulations?
ResNet has its own regulations to ensure that it can deliver its services to its users, protecting them from other, badly-behaved, users who could have a detrimental effect on the network. ResNet is connected to other networks, and each is governed by its own regulations. ResNet is a part of the University network, and so the University's Regulations, code of conduct and guidelines for the use of computing facilities apply to ResNet. ResNet's Internet access is provided through the national academic network, JANET, and so its Acceptable Use Policy applies. (www.ja.net)
What happens if I break the Regulations?
The possible penalties are explained clearly in the regulations for the use of Computing facilities and the additional regulations for the use of ResNet facilities.
I think someone else is breaking the Regulations, what do I do?
You should report this to Computing Services , as soon as possible, who will take appropriate action.
Why should I care about computer security?
Your computer and its data may be very important. For example, you could have a real problem if a computer virus destroyed your only copy of an essay you have been working on. Under ResNet's regulations, you can be held responsible for any abuse of the network that occurs using your computer or ResNet connection - even if someone else carried it out. For example, if anyone uses your computer to send abusive email you could be blamed. This could happen if they sit down and use your computer directly or break into it from anywhere else on ResNet or the Internet. Reading the document Information about viruses and computer security and following the advice will avoid these sorts of problems.
Can I run a Web server on my computer connected to ResNet?
The ResNet service is designed to offer Internet access to the majority of its users, who are interested in client access to basic services such as web and email. However we realise that some users have other needs and so try to accommodate them where we can.
What about other servers, like Mail, News, FTP and Telnet?
There is a set of regulations for the use of servers which specify what services you may offer. These are designed to ensure that servers operate without disrupting the network. If you are not sure whether your intended use of your computer counts as a server, ask for advice. Anyone found running a non registered server will be in breach of the ResNet Regulations.
If you want to offer a server, first check with the server regulations on the ResNet web site to see if it is allowed, or allowed with certain restrictions. You will then need to contact Computing Services to register your server by telling us what services you plan to offer. Only after you have registered your server and received permission will you be allowed to operate a server.
Can I connect more than one computer to ResNet?
To ensure the security of the ResNet network we need to know which computers are connected to the network and who is responsible for them. This is why you need to register your computer on ResNet when you first connect.
When you fill in the registration form the MAC address (also known as an ethernet address - nothing to do with Apple Macs) of your ethernet card is recorded and your ResNet socket will only work with this address in future. Connecting a different computer or ethernet card will disable the socket.
If you replace your computer or ethernet card during the year you will need to call Computing Services who can reset the socket to work with your new card.
You can't connect several computers to your ResNet socket through a hub as this will send multiple MAC addresses to the socket which will cause it to be disabled.
Sharing a ResNet connection by extending the network to someone else in another room who has not subscribed to ResNet is a theft of the ResNet service and is a breach of the Regulations.
Unless otherwise stated, all software and other information found on computers is protected by copyright. Do not attempt to copy software or any other files unless it is specifically stated that they are in the public domain or the copyright notice specifies that they may be copied. Often copyright notices specify the conditions under which the software or on-line information may be copied - for example that it may be copied for use free of charge in educational institutions only, or that it is 'shareware', that is, you may use it for a short evaluation period but you must then pay a fee to the copyright holder if you want to continue using it.
Some of the software supplied by ResNet is site-licensed to the University. Obtaining this software through the University by or for anyone who is not a member of the University is in breach of copyright law and may be liable to prosecution. You must remove this software from your computer when you leave the University.
Software is not the only copyrighted material you may come across. Music found on the Internet (normally as mp3 files) is often in breach of copyright rules. Making copies of, or receiving and distributing copyrighted materials to other people (eg by putting up a server or shared folder containing them) is also an offence and may be treated very seriously.
Many computers on the Internet offer public services such as World Wide Web and anonymous ftp servers. However, the fact that you can connect to a computer does not automatically give you a right to use it. If you use or attempt to use a computer that you are not authorised to use, you are committing an offence under the Computer Misuse Act 1990. If you are in any doubt as to whether you are entitled to use a computer or not, assume that you are not.
Computer misuse is not limited to the traditional image of breaking into computers used by banks or the military. Example of computer misuse include:
What you may think of as a joke or prank may be viewed more seriously by the recipient or the University authorities. In most cases the offender will be barred from using ResNet. If you suspect you have been a victim of such an attack please report the incident to Computing Services .
What is port-scanning and why is it against the regulations?
Port scanning is a method of connecting to other networked computers to see what services (shared folders, web servers, etc) they are operating. For example, port scanning could be systematically scanning every computer on a network to see if it has shared folders, or scanning one individual computer to check for every possible service.
Unless you have been given permission by the owner of the computer you must not port scan or otherwise attempt to access any services provided by that computer. Testing which services a computer offers is the first step an intruder uses as part of an attempt to break into a computer and gain control of it. Security-aware users, such as those with personal firewall software, will notice connection attempts and be suspicious because without their permission in advance you should have no reason to connect to their systems.
Therefore you must never port scan a computer unless you have been given permission to do so. Under no circumstances are you permitted to scan an entire network of ResNet users. Software is available (one popular example is called Essential NetTools) that will scan whole networks looking for shared folders or other services. You must not use that feature of it, and should now understand why.
Statement on copyright and Internet file sharing
Music found on the Internet (typically as MP3 files) is normally subject to copyright and reproduced illegally without a licence from the copyright holder. Although some MP3 files found on the Internet are distributed legally, it is fair to say that the vast majority are distributed without permission. Anyone distributing, accessing or storing such material is breaking the law. Copyright applies to software, music, video and other forms of information stored on computer. There are a number of Internet filesharing networks used to distribute files. The original and best known of these is Napster.
If you use an Internet filesharing program you need to know that as well as letting you download files from other people it will also (unless you specifically tell it not to) share files you have so that anyone else can access them, turning your computer into a server. Industry organisations responsible for copyright enforcement can trace who is serving the files and take action (including legal action) accordingly. The University has been contacted on several occasions by copyright holders alerting us to a user breaching copyright. We then had to take action to prevent the offence continuing, including immediately disconnecting the user's network connection.
If you use Internet filesharing to download or make available copyrighted files via the University's network then you are:
University computing regulations state that failure to comply with the terms of copyright legislation will render the user personally liable for any fines. ResNet regulations state that you cannot run a server (i.e. a computer that makes files or services available remotely) on your ResNet connection without permission from Computing Services . Breaches of the regulations can be dealt with by University disciplinary procedures.
In addition to legal problems, there are other problems with filesharing programs:
They are massive bandwidth hogs, generating disproportionate amounts of Internet traffic and so swamping other uses of the network, including academic use. We have guidelines on the responsible use of filesharing to reduce network congestion. By following the guidelines you can reduce congestion by stopping other people accessing your computer but still be able to access files from other computers yourself. They are a risk to your security and privacy on the Internet - by their nature they make files on your computer available to other people. An additional problem is the third-party programs that are bundled with filesharing clients in order to finance them. These extra programs are generally installed on your computer without you realising, and can then take various actions such as collecting personal information about you, tracking web sites you visit, and targeting you with additional advertising. See this information on Adware and Spyware. They can break your network connection and stop your Internet access working. For example, when Kazaa is installed on many computers, Netscape & Internet Explorer crash every time you type in a web address. Uninstalling Kazaa solves that problem, but some similar problems are much more difficult to resolve. We recommend that you don't use Internet filesharing programs. However if you do use them you need to follow our guidelines on responsible use of filesharing. There is also a file and printer sharing feature built into Windows (Network Neighbourhood/My Network Places). This is limited so that it is contained within the University network and may be useful (for example when collaborating on a group project with other students). However it also has its own security risks and so if you use it you need to read our Instructions on Windows File & Printer Sharing.
Guidelines for the responsible use of Internet file sharing
· Turn off the server portion of the program - tell it not to make files on your hard disk available to other users, or restrict it to only share files from a single (empty) folder.
· After using filesharing programs, make sure you shut them down correctly by choosing File, Exit or File, Quit. If you can see an icon for it in the system tray at the bottom right it is still running and you need to close it. Click the right-hand mouse button on the icon and choose Quit, Exit or Close.
· Assume any file is subject to copyright unless you know otherwise and get the written permission of the copyright holder before receiving or distributing it.
· Limit your usage of filesharing as much as possible so that filesharing doesn't swamp other usages and other people can still access the network for academic purposes. Remember that the network is a shared resource and the primary purpose of providing network access is for educational use.
· Don't use a 'start this program when I start the computer' option if provided.
· Turn off the computer when not using it.
Most users of ResNet use the network for client applications such as web and email and this is what the network is intended for. However we are aware that some users have broader needs to run servers as well as clients. We allow this as much as possible, as long as it does not cause problems with security, bandwidth or disruption of other services.
Before running any server software you must read and agree to this document. Then email Computing Services and ask for permission, detailing what services you wish to offer and the OS and software you will use to do so. There are certain services that you won't be permitted to run as they could interfere with the correct operation of the network. Other servers are fine, or allowed providing they are configured in a certain way.
If in any doubt about the regulations on servers, always contact Computing Services for advice.
Restrictions on all servers
You must be aware and agree that:
You must ensure that your computer is secure and cannot be broken into by someone else. Keeping a server secure can be a difficult task as new vulnerabilities are continually reported. You need to subscribe to relevant mailing lists and apply patches as soon as they are available. Note that under the ResNet regulations if someone else takes over your computer system and breaks the regulations you will also be held responsible for those actions due to your negligence in not securing the system. ResNet is intended for educational and personal use only - we can't permit commercial use as this would break agreements under which the University receives its network access. Commercial use, for example would include hosting a web site for a company external to the University. You must abide by the ResNet regulations and the law on copyright. You must not make copyrighted materials available to other people without permission from the copyright holder. Logs must be made of all service access and kept for a minimum of 6 weeks. If any non-anonymous services are offered to people other than the registered ResNet user are offered then accounts on the machine must conform to the University common username scheme. Only people who are members of the University with an email address @student.marjon.ac.uk or @marjon.ac.uk may be registered on any system. A number of services are firewalled out so that connections on certain ports from outside the University will never reach servers on ResNet. This is done to protect vulnerable systems from automated attacks and notably includes web, ftp and telnet servers. We cannot make exceptions to these restrictions on a case by case basis, and may add further restrictions at any time it becomes necessary. There are no guarantees that your network connection will stay up permanently. There will be interruptions due to scheduled maintenance or unexpected problems. Bandwidth is limited collectively in incoming and outgoing directions. If your server generates very large amounts of traffic to the detriment of other users you will be required to stop it. Your IP address is likely to stay the same for very long periods but may change. In any case your dns registration will remain constant. The University may port-scan the network including your system for security reasons to see what services are operating. You are responsible for ensuring that your server is correctly licensed. For example, if you are using Windows NT or Windows 2000 you must have necessary connector licenses for the services you offer. Proscribed Services
These may not be offered under any circumstances:
University policy on wireless LAN equipment
Notice of prohibition of wireless LAN equipment that is not centrally administered
No wireless LAN equipment (access points, bridges, etc) that is not under the direct supervision of Computing Services may be attached to the University's network.
Basis of prohibition
1. Security: wireless LAN is inherently insecure. Please refer to the following document published by the UK government for an excellent summary of the risks: http://www.uniras.gov.uk/l1/l2/l3/tech_reports/NISCCTechnicalNote04.htm.
2. Radio spectrum: the efficient operation of wireless LAN depends on a planned approach to the allocation of the spectrum available in the 2.4Ghz band available to wireless LAN. Rogue wireless hardware will interfere with other wireless hardware, resulting in degradation of performance on both networks.
Revised January 2016
Approved by: The Director of Information Services
Date: 26th July 2004