Summary
The purpose of this document is to specify the terms of usage for student-owned computer
connected to the Juniata College computer network, known as EagleNet. Connection
to EagleNet provides access to network file and print services, access to the email
system, and access to the internet.As part of Juniata College’s commitment to expand
students’ college experience and education through the use of technology, direct network
connections to EagleNet are provided in every residence hall.Access to EagleNet is
a privilege and service provided to enhance students’ educational experience and knowledge.
It is not a right, and access is dependent on responsible and ethical conduct. Certain
rules and expectations are outlined in this document.Despite its capacity, EagleNet
is a limited and shared resource. Actions by one user can adversely affect the performance
of EagleNet for all users. For this reason, it is important that users understand
the terms of usage. These guidelines serve to protect both Juniata College and users
of EagleNet.
Technical Specifications
As of the publication date of this document the specifications of EagleNet are as
follows:• Gigabit Ethernet fiber-optic backbone between dorms and large campus buildings•
Wireless access in academic buildings• 100 Mbps switched ethernet for servers and
core network equipment• 10 Mbps switched and shared ethernet to the desktop (residence
hall rooms)• 13.5 Mbps Internet Uplink• Remote Access to EagleNet via dial-up or VPN
for students who do not live in residence halls• Microsoft Windows 2003 Server, Microsoft
Exchange Server 2003, Sun Solaris & Linux Servers• Cisco and 3Com network equipment
Terms of Usage
Please refer to the Ethical and Responsible Use of EagleNet Policy athttp://services.juniata.edu/cts/forms/EthicalUse.pdf
for the complete policy regarding the use of EagleNet. This section specifies the
terms of usage for student-owned computers directly connected to EagleNet from students’
residence hall rooms.
Non-adherence
Non-adherence to these terms may result in suspension of access privileges including
disabling the offending user’s account and/or network port. Multiple or serious offenses
will be referred to the Dean of Students Office for disciplinary action. Such offenses
are subject to a range of sanctions including termination of EagleNet service, indefinite
suspension of EagleNet privileges, action by Housing in accordance with terms governing
residence life, academic sanction (expulsion, adjudication), and legal sanction (adjudication,
fines, imprisonment).
Unethical/Illegal Use of EagleNet
The following list provides some examples of unethical and/or illegal use of EagleNet.
These examples may demonstrate unethical behavior, violation of EagleNet policy, and/or
violation of local, state and/or federal law.• Unauthorized access to systems, software,
services, or data.• Activities that interfere in any way with the function of EagleNet
or the security of EagleNet.• Activities that interfere with the ability of others
to use EagleNet for educational purposes.• Commercial activity, solicitation, marketing,
advertising, or recruiting purposes.• Interruption of or denial of EagleNet services
to an individual, violation of an individual’s rights, or harassment of an individual
by electronic means.• Provision, extension, or re-transmission of EagleNet access
or services.• Unauthorized duplication and/or distribution of copyrighted material
(software, graphics, audio/video recordings). This includes downloading (making a
local copy of) copyrighted music to a personal computer without authorization from
the copyright owner.• Obtaining personal data under false pretenses, and/or without
authorization from the individual (Freedom of Information Act of 1966 and Privacy
Act of 1974).• Unauthorized interception of electronic communications (Electronic
Communications Privacy Act of 1986).
Terms of Usage
TERMINATION OF SERVICEInformation Technology and Library Services reserves the right
to disconnect any network port at any time in order to maintain the secure and efficient
operation of EagleNet.PORT USAGEOnly one computer may be connected to one network
port in any residence hall room. Students may not connect hubs, switches, wireless
access points or other network equipment to residence hall network ports. High bandwidth
use or other problems related to a residence hall network port may result in one warning
to the user of the offending port followed by disconnection. Each student is responsible
for their network port and any activity that occurs on that port.TAMPERINGNetwork
cabling or devices beyond the wall plate may not be tampered with. Students may not
service telecommunications wiring or equipment and should contact the Help Desk for
repair.SERVERSWith the exception of personal file, print, and web sharing services,
server applications are prohibited.UNAUTHORIZED ACCESSUnauthorized access to any computer
is prohibited. This includes Juniata servers or workstations, other student-owned
computers, or computers external to EagleNet. Use of remote control software is prohibited.SERVICE
ACCESSServices my not be extended or retransmitted. Users may not extend network service
from the wall plate to another room or building. Users may not provide another individual
modem, wired, or wireless access to EagleNet.PERMITTED OPERATING SYSTEMSAs listed
in the document titled Personal Computer Specifications, network connections for the
following operating systems only are supported by Computer and Network Services: Windows
2000 Professional, Windows XP Professional, Macintosh OS 7.5.5 or higher. Windows
Server platforms are not permitted without faculty sponsorship and approval of Computer
and Network Services. Other operating systems must be authorized by Computer and Network
Services before connecting to EagleNet. CampusTechnology Services reserves the right
to update this list as new operating systems are released.SECURITYEach student is
responsible for the security of their own personal computer. Improper configuration
of file sharing or other network services may allow malicious users to infiltrate
a student’s personal computer. Downloaded files from the internet or email may contain
viruses or trojan horse programs which may compromise the security of a computer system.
Students must use current anti-virus software. Users with compromised systems may
have network access suspended until the security breech is fixed.EMAIL ACCESSStudents
are strongly advised to use Microsoft Outlook which comes with the Microsoft Office
product to access email from their residence hall room. Microsoft Webmail and Microsoft
Exchange are the only recommended alternatives. Webmail can be accessed for free within
a Web Browser and Exchange Client is available for free from the Solutions Center.
POP3 access to our email servers is not provided due to security implications. IP
ADDRESSStudents are required to use DHCP to dynamically obtain IP addresses and may
not configure systems with a static IP address unless approved by Information Technology
and Library Services.COMPUTER NAMESStudent computer names must match the student’s
user ID.ACCOUNTABILITYUsers may not forge another person’s identity nor attempt to
disguise their own identity. Users are responsible for content, subject to laws applying
to libel, threat, invasion of privacy, software piracy, pornography, and other crimes.
Students are responsible for their individual computers and accounts. It is not permitted
to use another person’s account or to allow your account to be used by another person.COMMERCIAL
ACTIVITIESEagleNet services may not be used to engage in commercial, business, or
money-making activities.EXTRA-ACADEMIC ACTIVITIESExtra-academic activities such as
network gaming, electronic messaging (ICQ, AIM, IRC), and large file transfers (MP3s)
generate additional network traffic that may impact other students who are using EagleNet
for academic purposes. This is especially true of internet applications. Students
are expected to engage in extra-academic activities in an appropriate manner that
does not degrade the performance of the network for others. Repeated high bandwidth
use may result in disconnection.UPDATES/RELATED DOCUMENTSAll users are responsible
to be aware of all updates to this document and any others that govern the use of
EagleNet. Policies are updated at least annually and are available on Juniata’s web
site at http://services.juniata.edu/cts/policies.html. All EagleNet usage is governed
by the document titled Ethical and Responsible Use of EagleNet at http://services.juniata.edu/cts/forms/EthicalUse.pdf.
Requirements and recommendations for student-owned computers can be found in the document
titled Personal Computer Specifications at http://services.juniata.edu/cts/Policies/computer_specs.pdf.
Support
Information Technology and Library Services supports network connectivity to each
network port in each residence hall room. In addition, Information Technology and
Library Services provides instructions and some assistance to students connecting
personal computers that meet the requirements listed in the document titled Personal
Computer Specifications at http://services.juniata.edu/cts/Policies/computer_specs.pdf.
Campus Technology Service does not support any non-network related software or hardware
issues. Each student connecting a personal computer to EagleNet will also have access
to Microsoft Exchange Client for email access, as well as Microsoft Internet Explorer
and Netscape Navigator to access the World Wide Web.
Privacy
Network Services staff monitors network traffic only to maintain the healthy operation
of EagleNet. Information gathered may include the source and destination of a network
session, the amount of bandwidth used, and the time each session was opened and closed.
Network Services reserves the right to terminate a user’s EagleNet connectivity if
that user’s network activity adversely affects EagleNet and/or other users of EagleNet.Network
Services does not monitor the content of network communication without the consent
of the Dean of Students and the Provost or unless specifically and legally requested
by a law enforcement agency. In the case of serious and repeated misuse of EagleNet
or suspected illegal activity, the required authorization to monitor and record the
contents of network traffic may be obtained.
06/10/04 AMW