The purpose of this document is to specify the terms of usage for student-owned computer connected to the Juniata College computer network, known as EagleNet. Connection to EagleNet provides access to network file and print services, access to the email system, and access to the internet.As part of Juniata College’s commitment to expand students’ college experience and education through the use of technology, direct network connections to EagleNet are provided in every residence hall.Access to EagleNet is a privilege and service provided to enhance students’ educational experience and knowledge. It is not a right, and access is dependent on responsible and ethical conduct. Certain rules and expectations are outlined in this document.Despite its capacity, EagleNet is a limited and shared resource. Actions by one user can adversely affect the performance of EagleNet for all users. For this reason, it is important that users understand the terms of usage. These guidelines serve to protect both Juniata College and users of EagleNet.
As of the publication date of this document the specifications of EagleNet are as follows:• Gigabit Ethernet fiber-optic backbone between dorms and large campus buildings• Wireless access in academic buildings• 100 Mbps switched ethernet for servers and core network equipment• 10 Mbps switched and shared ethernet to the desktop (residence hall rooms)• 13.5 Mbps Internet Uplink• Remote Access to EagleNet via dial-up or VPN for students who do not live in residence halls• Microsoft Windows 2003 Server, Microsoft Exchange Server 2003, Sun Solaris & Linux Servers• Cisco and 3Com network equipment
Terms of Usage
Please refer to the Ethical and Responsible Use of EagleNet Policy athttp://services.juniata.edu/cts/forms/EthicalUse.pdf for the complete policy regarding the use of EagleNet. This section specifies the terms of usage for student-owned computers directly connected to EagleNet from students’ residence hall rooms.
Non-adherence to these terms may result in suspension of access privileges including disabling the offending user’s account and/or network port. Multiple or serious offenses will be referred to the Dean of Students Office for disciplinary action. Such offenses are subject to a range of sanctions including termination of EagleNet service, indefinite suspension of EagleNet privileges, action by Housing in accordance with terms governing residence life, academic sanction (expulsion, adjudication), and legal sanction (adjudication, fines, imprisonment).
Unethical/Illegal Use of EagleNet
The following list provides some examples of unethical and/or illegal use of EagleNet. These examples may demonstrate unethical behavior, violation of EagleNet policy, and/or violation of local, state and/or federal law.• Unauthorized access to systems, software, services, or data.• Activities that interfere in any way with the function of EagleNet or the security of EagleNet.• Activities that interfere with the ability of others to use EagleNet for educational purposes.• Commercial activity, solicitation, marketing, advertising, or recruiting purposes.• Interruption of or denial of EagleNet services to an individual, violation of an individual’s rights, or harassment of an individual by electronic means.• Provision, extension, or re-transmission of EagleNet access or services.• Unauthorized duplication and/or distribution of copyrighted material (software, graphics, audio/video recordings). This includes downloading (making a local copy of) copyrighted music to a personal computer without authorization from the copyright owner.• Obtaining personal data under false pretenses, and/or without authorization from the individual (Freedom of Information Act of 1966 and Privacy Act of 1974).• Unauthorized interception of electronic communications (Electronic Communications Privacy Act of 1986).
Terms of Usage
TERMINATION OF SERVICECampus Technology Services reserves the right to disconnect any network port at any time in order to maintain the secure and efficient operation of EagleNet.PORT USAGEOnly one computer may be connected to one network port in any residence hall room. Students may not connect hubs, switches, wireless access points or other network equipment to residence hall network ports. High bandwidth use or other problems related to a residence hall network port may result in one warning to the user of the offending port followed by disconnection. Each student is responsible for their network port and any activity that occurs on that port.TAMPERINGNetwork cabling or devices beyond the wall plate may not be tampered with. Students may not service telecommunications wiring or equipment and should contact the Help Desk for repair.SERVERSWith the exception of personal file, print, and web sharing services, server applications are prohibited.UNAUTHORIZED ACCESSUnauthorized access to any computer is prohibited. This includes Juniata servers or workstations, other student-owned computers, or computers external to EagleNet. Use of remote control software is prohibited.SERVICE ACCESSServices my not be extended or retransmitted. Users may not extend network service from the wall plate to another room or building. Users may not provide another individual modem, wired, or wireless access to EagleNet.PERMITTED OPERATING SYSTEMSAs listed in the document titled Personal Computer Specifications, network connections for the following operating systems only are supported by Computer and Network Services: Windows 2000 Professional, Windows XP Professional, Macintosh OS 7.5.5 or higher. Windows Server platforms are not permitted without faculty sponsorship and approval of Computer and Network Services. Other operating systems must be authorized by Computer and Network Services before connecting to EagleNet. CampusTechnology Services reserves the right to update this list as new operating systems are released.SECURITYEach student is responsible for the security of their own personal computer. Improper configuration of file sharing or other network services may allow malicious users to infiltrate a student’s personal computer. Downloaded files from the internet or email may contain viruses or trojan horse programs which may compromise the security of a computer system. Students must use current anti-virus software. Users with compromised systems may have network access suspended until the security breech is fixed.EMAIL ACCESSStudents are strongly advised to use Microsoft Outlook which comes with the Microsoft Office product to access email from their residence hall room. Microsoft Webmail and Microsoft Exchange are the only recommended alternatives. Webmail can be accessed for free within a Web Browser and Exchange Client is available for free from the Solutions Center. POP3 access to our email servers is not provided due to security implications. IP ADDRESSStudents are required to use DHCP to dynamically obtain IP addresses and may not configure systems with a static IP address unless approved by Campus Technology Services.COMPUTER NAMESStudent computer names must match the student’s user ID.ACCOUNTABILITYUsers may not forge another person’s identity nor attempt to disguise their own identity. Users are responsible for content, subject to laws applying to libel, threat, invasion of privacy, software piracy, pornography, and other crimes. Students are responsible for their individual computers and accounts. It is not permitted to use another person’s account or to allow your account to be used by another person.COMMERCIAL ACTIVITIESEagleNet services may not be used to engage in commercial, business, or money-making activities.EXTRA-ACADEMIC ACTIVITIESExtra-academic activities such as network gaming, electronic messaging (ICQ, AIM, IRC), and large file transfers (MP3s) generate additional network traffic that may impact other students who are using EagleNet for academic purposes. This is especially true of internet applications. Students are expected to engage in extra-academic activities in an appropriate manner that does not degrade the performance of the network for others. Repeated high bandwidth use may result in disconnection.UPDATES/RELATED DOCUMENTSAll users are responsible to be aware of all updates to this document and any others that govern the use of EagleNet. Policies are updated at least annually and are available on Juniata’s web site at http://services.juniata.edu/cts/policies.html. All EagleNet usage is governed by the document titled Ethical and Responsible Use of EagleNet at http://services.juniata.edu/cts/forms/EthicalUse.pdf. Requirements and recommendations for student-owned computers can be found in the document titled Personal Computer Specifications at http://services.juniata.edu/cts/Policies/computer_specs.pdf.
Campus Technology Services supports network connectivity to each network port in each residence hall room. In addition, Campus Technology Services provides instructions and some assistance to students connecting personal computers that meet the requirements listed in the document titled Personal Computer Specifications at http://services.juniata.edu/cts/Policies/computer_specs.pdf. Campus Technology Service does not support any non-network related software or hardware issues. Each student connecting a personal computer to EagleNet will also have access to Microsoft Exchange Client for email access, as well as Microsoft Internet Explorer and Netscape Navigator to access the World Wide Web.
Network Services staff monitors network traffic only to maintain the healthy operation of EagleNet. Information gathered may include the source and destination of a network session, the amount of bandwidth used, and the time each session was opened and closed. Network Services reserves the right to terminate a user’s EagleNet connectivity if that user’s network activity adversely affects EagleNet and/or other users of EagleNet.Network Services does not monitor the content of network communication without the consent of the Dean of Students and the Provost or unless specifically and legally requested by a law enforcement agency. In the case of serious and repeated misuse of EagleNet or suspected illegal activity, the required authorization to monitor and record the contents of network traffic may be obtained.