Through a joint effort of Housing and Dining Services, Administrative Computing and Telecommunications, and Academic Computing & Media Services, high-speed data (ResNet) service is provided in on-campus residences, including housing at the six undergraduate colleges and the graduate apartments at Warren and Coast. The primary purpose of ResNet is to provide access to UCSD's electronic resources, and educational and research related material on the Internet. Although personal use of the network is expected and encouraged, it is important to remember that this is NOT the primary objective of the network.
You must register your computer at the beginning of each quarter, as outlined in the ResNet Guide and on our website (http://resnet.ucsd.edu). The registration is used to contact you with critical information about your network connection.
You are responsible for all network traffic generated by any computer or network device registered to you. You will be held accountable for violations of the applicable policies regardless of whether you: 1) generated the traffic, 2) are aware of the traffic or 3) are aware of the policy violation. It is your responsibility to seek advice from the ResNet office about any situation that you feel may violate policy.
The performance of normal UCSD business, research, education and other vital functions is dependent upon the appropriate use of the computing environment. To maintain this performance, the conditions listed below are strictly prohibited. Note that many of these activities are caused by inaction, not action.
Viruses are now commonly spread not only through email attachments, but through instant messaging clients (AIM, ICQ), file sharing software (BitTorrent, Limewire, etc.), open (not password protected) file shares and through vulnerabilities in the operating system. For this reason, firewall and antivirus software packages are required on every computer connected to the residential network. It is your responsibility to keep them installed, updated and running. Check the ResNet website (http://resnet.ucsd.edu) for recommended low-cost or no-cost solutions.
You must keep the operating system and software on your computer updated. It is part of responsible computing and required to keep your computer free from viruses. The manufacturers of your operating system and software provide regular updates to their products to patch security vulnerabilities. Ignoring these updates will not only put your data at risk, but could also allow someone to take control of your computer to violate policies and laws. You will be held responsible for these violations. Check the ResNet website (http://resnet.ucsd.edu) for recommendations on how to keep your computer updated.
Because you are responsible for anything that happens from your computer, and to reduce the risk of unauthorized access to your computer, set your computer to automatically log off if left unattended for more than 20 minutes.
To prevent unauthorized access to your computer (hackers, malware, viruses), strong authentication must be used for all access. We recommend using a passphrase (a collection of words) instead of a password. A phrase is significantly more secure and is often easier to remember. Here are some examples.
"You can do the Boogie 2!"
"Call dad re: the party!"
"Pickles make me want to HURL."
Use the following guidelines to create your passphrase:
Remote access to a computer must use encrypted authentication. Any applications using unencrypted authentication (such as Telnet and FTP) can be easily monitored. Compromised applications like these should be replaced with their encrypted equivalents.
It is illegal to copy or distribute copyrighted material if you do not have permission from the copyright owner. Most of the material (movies, TV shows, music, software) that is available with peer-to-peer file sharing software (BitTorrent, Limewire, etc) is not legal for you to download. You should also note that most file sharing software deceptively acts as a server on your computer to distribute the material you have downloaded.
These policies exist to protect the quality of your network and Internet connection. The response to violations will be the following.
To keep the network running properly, the network is constantly monitored for vulnerable computers, infected computers and abuse. If connections to and from your computer look unusual, you will receive an email or a phone call from a network administrator about the activity to ensure that your computer is configured correctly. In some cases, you may be asked to modify the activity.
In some cases it may be necessary to immediately block network connectivity to your computer. For this reason, ResNet reserves the right to block network access to/from your machine without warning.
In addition to the ResNet Acceptable Use Policy, the following University policies apply to your ResNet connection. Please read them carefully.
UCSD Minimum Network Connection Standards (Please see Exhibit C)
UCSD ACMS Acceptable Use Policy
University of California Electronic Communications Policy
UCSD Email Procedures and Practices
ResNet is always available to assist you with questions or concerns that you have about responsible computing and policies. We would be glad to help you investigate a particular concern or issue.