Eastern Michigan University

ResNet Rules

Purpose

The University has a responsibility to both ResNet users and the greater internet community to protect them from each other. These rules are meant to help educate, inform, and provide a basis for good Net-etiquette. They are meant to help foster a friendly, safe, and clean network environment for ResNet users. These rules are not optional nor negotiable.

I.T. Acceptable Use Policy

Residents connecting to ResNet agree to abide by I.T.'s Acceptable Use Policy.

Specific Rules

In addition, EMU will hold students to the following rules:

  1. Access to ResNet is a privilege, not a right. 

    Rules are in place to ensure quality of and access to ResNet for all residents. Abuse of this privilege can and will result in loss of access to the ResNet service.

  2. Computers connected to ResNet must have antivirus software installed. 

    Network attacks and email attachments are just a couple of ways that viruses can enter your computer. ResNet provides a great connection, but it also provides an avenue for viruses to reach your computer. EMU provides as much protection as possible; but, in order to help, you must install antivirus software. If you do not have any installed on your computer, please see the antivirus information page.

    In addition to installing the software, you must routinely or automatically apply updates to keep the software current.

  3. Computers connected to ResNet must be kept up-to-date. 

    Keeping your computer up-to-date with a current operating system and software patches, updates, and fixes is critical to maintaining a safe computer environment. Viruses and hackers very often exploit known bugs in operating systems to gain access. By patching your computer (e.g. Windows Update), you close many potential avenues for infection or attack.

    We recommend that you set your operating system updates to happen automatically. If you need help with this, call the Help Desk at 734.487.2120 for assistance.

  4. No server of any kind will be allowed on the network.

    Servers open security holes in your computer which allow attackers to gain access to your computer. They also may serve files you are not aware of. The University provides all students with web server space for a personal website on people.emich.edu. If you have an academic need to run a server on your computer, you will need to have your professor send a signed letter on departmental letterhead confirming the type of server to be run, the duration of the project, and the academic reason for the project to Network Engineering, Division of Information Technology, 118 Pray-Harrold. If you have any questions about this, contact I.T. Security at it-security@list2.emich.edu. 

    Specific examples of servers are: web servers (Apache, Windows Personal Web Server, etc), FTP servers (Serv-U, WS-FTPD, etc), file sharing servers, and others.

  5. Peer 2 Peer software on ResNet

    Sharing copyrighted files is illegal. Students subject to repeated copyright infringement allegations are referred to Student Conduct and Community Standards for disciplinary action.  File sharing applications are disabled on EMU networks by default. Students that wish to use peer-to-peer (P2P) file sharing applications must “opt-in” to use technologies on the EMU WiFi network.  

    P2P technologies (such as BitTorrent) have value for some legitimate uses. However, these technologies are also frequently abused to illegally share copyrighted materials including films, music and textbooks. In some cases, this results in legal copyright infringement claims (called DMCA violations) against EMU users, including lawsuits and fines.  Torrents are also occasionally infected with viruses and other malware.

    EMU fully supports the right to use these tools for legitimate purposes. EMU will help students, faculty and staff that need to use the technology to "Opt-In". This opt-in process is intended to ensure that those using the technology fully understand their obligations and risks associated with P2P technologies. Those that opt-in will be able to use torrent software on the EMU wireless network when authenticated using their NetID.

    To opt in:

    Go to  https://tiny.emich.edu/p2p  (You may be prompted to login with your NetID/password).

    Read/accept the terms, complete the form, and click “Request Item”.

    Information Technology staff will verify your identity, verify that you do not have a prior copyright infringement claim and then grant your NetID access to use P2P on the WiFi network.  You will receive a notice via when your request has been processed and your access is active.

    Please note:  Students that receive a copyright infringement allegation forfeit the privilege to opt-in to this service.

  6. No unsecured wireless access points will be allowed.

    Wireless technology is becoming pervasive and cheap. However, when a wireless access point is installed but not secured, it becomes a liability to the owner. Many access points are designed to act as a router for wireless traffic. This means that they all have the same problems as a router.

    Additionally, wireless signals can be picked up in common areas (such as a parking lot). If not properly secured, this signal can then be used by anyone. This means that the person who registered the access point is now responsible for anything the person in the parking lot does using the router.

  7. No static IPs will be allowed to any system.

    There is no reason to have a static IP on ResNet. The ResNet system monitors IP addresses and assigns them as needed.

  8. No network attacks of any kind will be tolerated. 

    Network attacks are serious concerns to EMU and should be of serious concern to the student involved. Examples of network abuse include port scans, spam emails, denial of service attacks, etc. Malicious network attacks can result in expulsion from the University and even criminal charges.

    Compromised computers can perform network attacks without the knowledge of the owner. This is why patching and antivirus software are so important. Infected computers that perform network attacks are the responsibility of the owners even if they did not have knowledge of the attack.

Consequences of Rule Violation

Violation of the ResNet rules may result in being disconnected from ResNet (temporarily or permanently) and/or referral to Student Conduct and Community Standards (SCCS) for disciplinary action. A SCCS referral could result in a formal reprimand, probation, suspension, or dismissal from the University. Depending on the nature of the violation, you could also be prosecuted under local, state, or federal laws.

If events beyond the scope of these rules should arise, EMU will investigate their impact and will proceed appropriately. If you have any questions about these rules and would like clarification, please contact I.T. Security at it-security@list2.emich.edu.

Owner Responsibilities

As the person registering a device for use on ResNet, you accept the above rules and recognize that should you break the rules you will be held responsible.

As the owner of the device, you are responsible for any and all traffic coming from the device, regardless of whether you are aware of it or not. This includes, but is not limited to, illegitimate traffic caused by viruses, traffic caused by a compromised device, and traffic caused by routers or wireless access points. Should someone knowingly or unknowingly gain access to ResNet through your device and break the rules, you as the registered owner of the device are still held responsible. It is YOUR RESPONSIBILITY to be sure that your computer and/or other devices attached to the network do not violate ResNet rules or the I.T. Acceptable Use Policy.