Eastern Michigan University

ResNet Rules

Purpose

The University has a responsibility to both ResNet users and the greater internet community to protect them from each other. These rules are meant to help educate, inform, and provide a basis for good Net-etiquette. They are meant to help foster a friendly, safe, and clean network environment for ResNet users. These rules are not optional nor negotiable.

I.T. Acceptable Use Policy

Residents connecting to ResNet agree to abide by I.T.'s Acceptable Use Policy.

Specific Rules

In addition, EMU will hold students to the following rules:

  1. Access to ResNet is a privilege, not a right. 

    Rules are in place to ensure quality of and access to ResNet for all residents. Abuse of this privilege can and will result in loss of access to the ResNet service.

  2. Computers connected to ResNet must have antivirus software installed. 

    Network attacks and email attachments are just a couple of ways that viruses can enter your computer. ResNet provides a great connection, but it also provides an avenue for viruses to reach your computer. EMU provides as much protection as possible; but, in order to help, you must install antivirus software. If you do not have any installed on your computer, please see the antivirus information page.

    In addition to installing the software, you need to keep the software current.

  3. Computers connected to ResNet must be kept up-to-date. 

    Keeping your computer up-to-date with a current operating system and software patches, updates, and fixes is critical to maintaining a safe computer environment. Viruses and hackers very often exploit known bugs in operating systems to gain access. By patching your computer (e.g. Windows Update), you close potential avenues for infection or attack.

    We recommend that you set your operating system updates to happen automatically. If you need help with this, call the Help Desk at 734.487.2120 for assistance.

  4. No server of any kind will be allowed on the network.

    Servers open security holes in your computer which allow attackers to gain access to your computer. They also may serve files you are not aware of. The University provides all students with web server space for a personal website on people.emich.edu. If you have an academic need to run a server on your computer, you will need to have your professor send a signed letter on departmental letterhead confirming the type of server to be run, the duration of the project, and the reason for the project to Network Engineering, Division of Information Technology, 118 Pray-Harrold. If you have any questions about this, contact I.T. Security at it-security@list2.emich.edu. 

    Specific examples of servers are: web servers (Apache, Windows Personal Web Server, etc), FTP servers (Serv-U, WS-FTPD, etc), file sharing servers (KaZaa, Bearshare, Gnutella, etc), and others.

  5. No file sharing software is allowed on ResNet.

    File sharing programs are prohibited on ResNet. The amount of data traffic generated by these applications is not supportable and impacts performance for all network users. While there are legitimate uses of these programs, almost all legitimate files shared via these applications are available via FTP or web sites.

    When ResNet detects the use of a file sharing program such as BitTorrent, KaZaa, etc., the network will lock your access to the internet for a period of 30 minutes. After you exit the file sharing software, your access should be restored automatically within 30 minutes. 

    If you have an academic need to run file sharing software on your computer, you will need to have your professor send a signed letter on departmental letterhead confirming your name and contact information, the type of server to be run, the duration of the project, and the reason for the project to Network Engineering, Division of Information Technology, 118 Pray-Harrold. If you have any questions about this, contact I.T. Security at it-security@list2.emich.edu.

  6. No unsecured wireless access points will be allowed.

    Wireless technology is becoming pervasive and cheap. However, when a wireless access point is installed but not secured, it becomes a liability to the owner. Many access points are designed to act as a router for wireless traffic. This means that they all have the same problems as a router.

    Additionally, wireless signals can be picked up in common areas (such as a parking lot). If not properly secured, this signal can then be used by anyone. This means that the person who registered the access point is now responsible for anything the person in the parking lot does.

  7. No static IPs will be allowed to any system.

    There is no reason to have a static IP on ResNet. The ResNet system monitors IP addresses and assigns them as needed.

  8. No network attacks of any kind will be tolerated. 

    Network attacks are serious concerns to EMU and should be of serious concern to the student involved. Examples of network abuse include port scans, spam emails, denial of service attacks, etc. Malicious network attacks can result in expulsion from the University and even criminal charges.

    Compromised computers can perform network attacks without the knowledge of the owner. This is why patching and antivirus software are so important. Infected computers that perform network attacks are the responsibility of the owners even if they did not have knowledge of the attack.

Consequences of Rule Violation

Violation of the ResNet rules may result in being disconnected from ResNet (temporarily or permanently) and/or referral to Student Conduct and Community Standards for disciplinary action. A SCCS referral could result in a formal reprimand, probation, suspension, or dismissal from the University. Depending on the nature of the violation, you could also be prosecuted under local, state, or federal laws.

If events beyond the scope of these rules should arise, EMU will investigate their impact and will proceed appropriately. If you have any questions about these rules and would like clarification, please contact I.T. Security at it-security@list2.emich.edu.

Owner Responsibilities

As the person registering a device for use on ResNet, you accept the above rules and recognize that should you break the rules you will be held responsible.

As the owner of the device, you are responsible for any and all traffic coming from the device, regardless of whether you are aware of it or not. This includes, but is not limited to, illegitimate traffic caused by viruses, traffic caused by a compromised device, and traffic caused by routers or wireless access points. Should someone knowingly or unknowingly gain access to ResNet through your device and break the rules, you as the registered owner of the device are still held responsible. It is YOUR RESPONSIBILITY to be sure that your computer and/or other devices attached to the network do not violate ResNet rules or the I.T. Acceptable Use Policy.