Skip to main content

ResNet Acceptable Use Policy

A "UCSD Affiliate" includes students, staff, and faculty of the University of California, San Diego. All other persons on the ResNet Network will be held to the Guest AUP.

Introduction and Coverage of Service

Introduction

Through a joint effort between Housing, Dining, and Hospitality (HDH) and Information Technology Services (ITS), high-speed data service is provided in on-campus residences via the Residential Networking system (ResNet). Your agreement to the following points in this Acceptable Use Policy is required to use the ResNet network.

Locations

Access to the ResNet network is provided in residential housing located in the seven undergraduate colleges and The Village at Pepper Canyon transfer student housing.

Note

As of Fall 2020, the ResNet network has been transitioned to a wireless-only infrastructure to improve wireless coverage throughout the residences. Wireless access is available throughout the residence, including the common room and bedrooms. Wired connections are not available.

Purpose

The primary purpose of ResNet is to provide access to UCSD's electronic resources and educational / research related material on the Internet.

Personal use is expected and encouraged on the ResNet network, as long as it does not interfere with another user's ability to connect to the ResNet network or violate any portion of the Acceptable Use Policy. Please note that personal use is NOT the primary objective of the ResNet network.

Enforcement

As an Internet Service Provider (ISP), ResNet is committed to enforcing its policies. The Acceptable Use Policy draws heavily from the policies mentioned in Section VIII, "Other Relevant Policies," and a violation of these mentioned policies while on the ResNet network will also be considered a violation of the Acceptable Use Policy.

Violations

General violations of this Acceptable Use Policy, if not addressed under the appropriate section, will be handled individually, based on the nature of the violation and if this is a case of recidivism. Most general violations will be handled in this way, but ResNet makes no guarantee as to if your particular violation will be treated in the same manner.

First Violation

  1. Your connection will be blocked and you will be contacted by an ITS Service Desk / ResNet representative, usually over email, with remediation steps.
  2. Once these steps have been completed, your connection will be restored.
  3. For all intents and purposes, the first violation will be considered a warning.

Second Violation

  1. Your connection will be blocked again and you will be contacted by an ITS Service Desk / ResNet representative, usually over email, with remediation steps.
  2. You will typically be required to speak with an ITS Service Desk supervisor regarding the violation.
  3. Egregious violations will be sent to the Office of Student Conduct for follow up.
  4. ResNet will determine when your connection is restored. This is at the discretion of ITS Service Desk supervisors, typically the ResNet coordinator.

Third Violation

  1. Your connection will be permanently blocked, unless significant circumstances arise.
  2. You will typically be required to speak with an ITS Service Desk supervisor regarding the violation.
  3. Egregious violations will be sent to the Office of Student Conduct for follow up.

ResNet Registration and Authentication

Registration Requirements

You must register your network devices if you live in one of the areas mentioned above, under "Locations". You are required to provide accurate registration information in the event that ResNet needs to contact you with critical information regarding your network connection.

 

Authentication

All devices connected to the ResNet network must authenticate with a valid Active Directory username and password (your UCSD email address without the '@ucsd.edu' and email password) unless otherwise explicitly stated.

User Responsibilities

Extent of Liability

You will be held responsible for any and all network traffic generated by any network device registered and / or authenticated with your username. It is your responsibility to seek advice from ResNet about any situation that you feel may violate any policies.

Accountability

You will be held accountable for violations of policies mentioned here, regardless of whether you:

  1. Generated the traffic
  2. Were aware of the traffic
  3. Are aware of the policy violation

Prohibited Activities

Limitations of Activity

The performance of normal business, research, education, and other vital functions is dependent upon the appropriate use of the ResNet and UCSD network. To maintain this performance, the activities below are strictly prohibited. Please note that many of these activities are caused by inaction rather than action.

  1. Any intentional or unintentional action that impairs the overall function of the network  (including but not limited to moving or disconnecting existing network equipment or connecting misconfigured and/or unauthorized network devices).
  2. Any intentional or unintentional action that produces an excessive load on the network.
  3. Any intentional or unintentional action that would deny or impair network service to another system or user.
  4. Any intentional or unintentional distribution of computer viruses or malware.
  5. Operation of any unauthorized server.
  6. Any action that violates Federal or State law or any other University policy.
  7. Providing a service or distributing any product for a fee.
  8. Providing access to University facilities to non-University affiliates.
  9. Scanning any systems or networks other than the devices registered to you.
  10. Unauthorized installation of networking hardware (router, wireless router, network extender, etc.)
  11. Forging or attempting to hide your identity while using ResNet, including manually changing the Media Access Control (MAC) address or Internet Protocol (IP) address of any device connected to the ResNet network.
  12. Attempting to circumvent data protection schemes or security mechanisms.

Copyright Law and Enforcement

Copyright Law

It is illegal to distribute copyrighted material without the express permission of the copyright owner, as noted under the Copyright Act of 1976 and the Digital Millennium Copyright Act of 1999. Most material that is available through peer-to-peer (P2P) file sharing software, such as movies, television shows, and music, is not legal to download and distribute.

Enforcement

In the event that ResNet is notified of a copyright violation against a device registered / authenticated under your username, ResNet will take the following actions for the violation. These vary for first, second, and third violations.

First Violation

  1. Your connection is blocked from accessing the network until your computer is brought into ResNet for a security scan and meets the UCSD Minimum Network Connection Standards. You are given the option to be unblocked at this time.
  2. You are required to complete a Copyright Violation Presentation online course within 7 days of completing the security scan. You are allowed to complete the course before doing the security scan. Failure to complete the course within 7 days of the scan will result in the suspension of your network connection.

Second Violation

  1. All actions from a first violation will apply in addition to the following:
  2. You will be required to meet with an ITS Service Desk supervisor to discuss the violation.
  3. Your case is referred to the Office of Student Conduct and they will institute the following:
    1. An Officer of Student Conduct (e.g.: your college Dean, Assistant Dean, Director of Student Conduct) overseeing your case will determine when your network connection is restored.
    2. You may be subject to sanctions as laid out in the UCSD Student Conduct Code. These may include fines, disciplinary probation, essay, and / or ethics class.
    3. A disciplinary record is created and added to your permanent student record.

Third Violation

  1. All actions from a second violation will apply in addition to the following:
  2. An Officer of Student Conduct will determine if additional sanctions are required. These may include extended disciplinary probation, additional fines, and / or suspension from the University.
  3. Your network connection is blocked permanently, unless extreme circumstances exist. These are handled on a case-by-case basis and you are given no guarantee as to the restoration of your network connection.

Computer and System Requirements

Background

Malware (e.g.: viruses, Trojan horses, worms, adware, etc.) is commonly spread through computer-to-computer communications. This includes email attachments, instant messaging clients, P2P file sharing software, and vulnerabilities in installed software and the operating system. For this reason, ResNet requires that your computer meet certain security standards before connecting to the ResNet network.

Security Software

ResNet requires that antivirus and firewall software be active and updated on all devices connected to the ResNet network. It is your responsibility to ensure that your computer is compliant with this policy.

Updated Operating System and Software

You must keep the operating system and software updated on devices registered or authenticated to you. If the operating system is not under active support by the software manufacturer, your device will not meet the standards of an updated operating system. Updates are provided through the software manufacturer on a regular basis to patch security vulnerabilities. Ignoring these updates can and will leave your computer open to attack and may place your computer as a violator of Federal or State law, or University policies. Please note that though you may not be the one actively participating in these violations, you will be held responsible for these violations.

Computer Passwords and Access Control

To prevent unauthorized access to your computer, strong passphrase authentication must be used on your computers for any and all access. We recommend using a passphrase (a collection of several words) rather than a password, as a passphrase takes longer to crack and is often easier to remember.

You can use the following tips to create a secure passphrase:

  1. Do not use a famous phrase or well-known quote.
  2. Make sure that you are the only one who can remember the phrase.
  3. Use characters from at least three of the four categories:
    1. Lower case letters (abcde...)
    2. Upper case letters (ABCDE...)
    3. Numbers (12345...)
    4. Non-alphanumeric Characters (!@#$%...)

You must set your devices to log off or lock if left unattended for a period of time. Because you will be held responsible for any traffic generated from any device under your username, locking your computer after a period of time will mitigate unauthorized access.

 

Network Monitoring and Mitigation

Monitoring Techniques

To ensure the ResNet network is running at optimum efficiency, ResNet, in conjunction with Network Security, monitors the ResNet network for vulnerable or infected computers and / or abuse of resources. This is done through a combination of different techniques, including:

  1. IP Sourcing: The starting and terminating IP addresses of a connection are checked against a black list of known viral hosts. If any of these IP addresses match a known viral host, the computer is quarantined.
  2. High Resource Usage: Abnormally high load on the ResNet network is also flagged and your device may be blocked. In these cases, you may be contacted by ResNet to either modify or suspend the activity that caused the load.

Network Suspension and Blocking

ResNet reserves the right to immediately block your connection without prior warning or notification. If your computer is blocked under this circumstance, ResNet may notify you why your computer was blocked along with remediation options.

Other Relevant Policies

As mentioned in "Introduction and Coverage of Service: Enforcement," your acceptance of this Acceptable Use Policy and use of the ResNet network also includes your acceptance and compliance with the following policies.

  1. UCSD Minimum Network Connection Standards (Please see Exhibit B)
  2. UCSD ETS Acceptable Use Policy
  3. University of California Electronic Communications Policy
  4. UCSD Email Procedures and Practices
  5. UCSD Student Conduct Code

Introduction and Coverage of Service

Introduction

Through a joint effort between Housing, Dining, and Hospitality (HDH) and Information Technology Services (ITS), high-speed data service is provided in on-campus residences via the Residential Networking system (ResNet). Your agreement to the following points in this Acceptable Use Policy is required to use the ResNet network.

Note for Guests!

As guests on ResNet, you will be held to a more restricted Acceptable Use Policy. Areas of significant difference will be highlighted in this manner.

Locations

Access to the ResNet network is provided in residential housing located in the seven undergraduate colleges and The Village at Pepper Canyon transfer student housing.

Note

As of Fall 2020, the ResNet network has been transitioned to a wireless-only infrastructure to improve wireless coverage throughout the residences. Wireless access is available throughout the residence, including the common room and bedrooms. Wired connections are not available.

Purpose

The primary purpose of ResNet is to provide access to UCSD's electronic resources and educational / research related material on the Internet.

Personal use is expected and encouraged on the ResNet network, as long as it does not interfere with another user's ability to connect to the ResNet network or violate any portion of the Acceptable Use Policy. Please note that personal use is NOT the primary objective of the ResNet network.

Enforcement

As an Internet Service Provider (ISP), ResNet is committed to enforcing its policies. The Acceptable Use Policy draws heavily from the policies mentioned in Section VIII, "Other Relevant Policies," and a violation of these mentioned policies while on the ResNet network will also be considered a violation of the Acceptable Use Policy.

Violations

General violations of this Acceptable Use Policy, if not addressed under the appropriate section, will be handled individually, based on the nature of the violation and if this is a case of recidivism. In the case of guest user violations, your connection will likely be permanently blocked without any possibility of having your connection restored on the first violation. Most general violations will be handled in this way, but ResNet makes no guarantee as to if your particular violation will be treated in the same manner.

ResNet Registration and Authentication

Registration Requirements

You must register your network devices each year you live in one of the areas mentioned above, under "Locations". You are required to provide accurate registration information in the event that ResNet needs to contact you with critical information regarding your network connection.

 

Authentication

Guests to the ResNet network will be required to create an account on the ResNet guest system before gaining access. You will use the credentials generated by the system for every device you want to connect to the ResNet network.

User Responsibilities

Extent of Liability

You will be held responsible for any and all network traffic generated by any network device registered and / or authenticated with your username. It is your responsibility to seek advice from ResNet about any situation that you feel may violate any policies.

Accountability

You will be held accountable for violations of policies mentioned here, regardless of whether you:

  1. Generated the traffic
  2. Were aware of the traffic
  3. Are aware of the policy violation

Prohibited Activities

Limitations of Activity

The performance of normal business, research, education, and other vital functions is dependent upon the appropriate use of the ResNet and UCSD network. To maintain this performance, the activities below are strictly prohibited. Please note that many of these activities are caused by inaction rather than action.

  1. Any intentional or unintentional action that impairs the overall function of the network  (including but not limited to moving or disconnecting existing network equipment or connecting misconfigured and/or unauthorized network devices).
  2. Any intentional or unintentional action that produces an excessive load on the network.
  3. Any intentional or unintentional action that would deny or impair network service to another system or user.
  4. Any intentional or unintentional distribution of computer viruses or malware.
  5. Operation of any unauthorized server.
  6. Any action that violates Federal or State law or any other University policy.
  7. Providing a service or distributing any product for a fee.
  8. Providing access to University facilities to non-University affiliates.
  9. Scanning any systems or networks other than the devices registered to you.
  10. Unauthorized installation of networking hardware (router, wireless router, network extender, etc.)
  11. Forging or attempting to hide your identity while using ResNet, including manually changing the Media Access Control (MAC) address or Internet Protocol (IP) address of any device connected to the ResNet network.
  12. Attempting to circumvent data protection schemes or security mechanisms.

Copyright Law and Enforcement

Copyright Law

It is illegal to distribute copyrighted material without the express permission of the copyright owner, as noted under the Copyright Act of 1976 and the Digital Millennium Copyright Act of 1999. Most material that is available through peer-to-peer (P2P) file sharing software, such as movies, television shows, and music, is not legal to download and distribute.

Enforcement

In the event that ResNet is notified of a copyright violation against you, ResNet will block your connection permanently without the possibility of having your connection restored.

Computer and System Requirements

Background

Malware (e.g.: viruses, Trojan horses, worms, adware, etc.) is commonly spread through computer-to-computer communications. This includes email attachments, instant messaging clients, P2P file sharing software, and vulnerabilities in installed software and the operating system. For this reason, ResNet requires that your computer meet certain security standards before connecting to the ResNet network.

Security Software

ResNet requires that antivirus and firewall software be active and updated on all devices connected to the ResNet network. It is your responsibility to ensure that your computer is compliant with this policy.

Updated Operating System and Software

You must keep the operating system and software updated on devices registered or authenticated to you. If the operating system is not under active support by the software manufacturer, your device will not meet the standards of an updated operating system. Updates are provided through the software manufacturer on a regular basis to patch security vulnerabilities. Ignoring these updates can and will leave your computer open to attack and may place your computer as a violator of Federal or State law, or University policies. Please note that though you may not be the one actively participating in these violations, you will be held responsible for these violations.

Computer Passwords and Access Control

To prevent unauthorized access to your computer, strong passphrase authentication must be used on your computers for any and all access. We recommend using a passphrase (a collection of several words) rather than a password, as a passphrase takes longer to crack and is often easier to remember.

You can use the following tips to create a secure passphrase:

  1. Do not use a famous phrase or well-known quote.
  2. Make sure that you are the only one who can remember the phrase.
  3. Use characters from at least three of the four categories:
    1. Lower case letters (abcde...)
    2. Upper case letters (ABCDE...)
    3. Numbers (12345...)
    4. Non-alphanumeric Characters (!@#$%...)

You must set your devices to log off or lock if left unattended for a period of time. Because you will be held responsible for any traffic generated from any device under your username, locking your computer after a period of time will mitigate unauthorized access.

 

Network Monitoring and Mitigation

Monitoring Techniques

To ensure the ResNet network is running at optimum efficiency, ResNet, in conjunction with Network Security, monitors the ResNet network for vulnerable or infected computers and / or abuse of resources. This is done through a combination of different techniques, including:

  1. IP Sourcing: The starting and terminating IP addresses of a connection are checked against a black list of known viral hosts. If any of these IP addresses match a known viral host, the computer is quarantined.
  2. High Resource Usage: Abnormally high load on the ResNet network is also flagged and your device may be blocked. In these cases, you may be contacted by ResNet to either modify or suspend the activity that caused the load.

Network Suspension and Blocking

ResNet reserves the right to immediately block your connection without prior warning or notification. If your computer is blocked under this circumstance, ResNet may notify you why your computer was blocked along with remediation options.

Other Relevant Policies

As mentioned in "Introduction and Coverage of Service: Enforcement," your acceptance of this Acceptable Use Policy and use of the ResNet network also includes your acceptance and compliance with the following policies.

  1. UCSD Minimum Network Connection Standards (Please see Exhibit B)
  2. UCSD ETS Acceptable Use Policy
  3. University of California Electronic Communications Policy
  4. UCSD Email Procedures and Practices
  5. UCSD Student Conduct Code

Contact Us