UC San Diego SearchMenu

UCSD ResNet Acceptable Use Policy

  1. General Guidelines

    Through a joint effort of Housing and Dining Services, Administrative Computing and Telecommunications, and Academic Computing & Media Services, high-speed data (ResNet) service is provided in on-campus residences, including housing at the six undergraduate colleges and the graduate apartments at Warren and Coast. The primary purpose of ResNet is to provide access to UCSD's electronic resources, and educational and research related material on the Internet. Although personal use of the network is expected and encouraged, it is important to remember that this is NOT the primary objective of the network.

  2. Registering Your Computer(s)

    You must register your computer at the beginning of each quarter, as outlined in the ResNet Guide and on our website (http://resnet.ucsd.edu). The registration is used to contact you with critical information about your network connection.

  3. Responsibility

    You are responsible for all network traffic generated by any computer or network device registered to you. You will be held accountable for violations of the applicable policies regardless of whether you: 1) generated the traffic, 2) are aware of the traffic or 3) are aware of the policy violation. It is your responsibility to seek advice from the ResNet office about any situation that you feel may violate policy.

  4. Prohibited Activities

    The performance of normal UCSD business, research, education and other vital functions is dependent upon the appropriate use of the computing environment. To maintain this performance, the conditions listed below are strictly prohibited. Note that many of these activities are caused by inaction, not action.

    • Any intentional or unintentional action that impairs the overall function of the network.
    • Any intentional or unintentional action that would deny or impair network service to another system or user.
    • Any intentional or unintentional distribution of computer viruses.
    • Operation of any unauthorized server.
    • Operation of any service that makes unusually high demands on the network.
    • Any action that violates Federal, State or University policy or law.
    • Providing a service or distributing any product for a fee.
    • Providing access to University facilities to non-University affiliates.
    • Scanning any systems or networks other than the computer(s) registered to you.
    • Unauthorized installation of networking hardware (router, wireless router).
  5. Anti-Virus and Firewall Software

    Viruses are now commonly spread not only through email attachments, but through instant messaging clients (AIM, ICQ), file sharing software (BitTorrent, Limewire, etc.), open (not password protected) file shares and through vulnerabilities in the operating system. For this reason, firewall and antivirus software packages are required on every computer connected to the residential network. It is your responsibility to keep them installed, updated and running. Check the ResNet website (http://resnet.ucsd.edu) for recommended low-cost or no-cost solutions.

  6. Updated Operating Systems and Software

    You must keep the operating system and software on your computer updated. It is part of responsible computing and required to keep your computer free from viruses. The manufacturers of your operating system and software provide regular updates to their products to patch security vulnerabilities. Ignoring these updates will not only put your data at risk, but could also allow someone to take control of your computer to violate policies and laws. You will be held responsible for these violations. Check the ResNet website (http://resnet.ucsd.edu) for recommendations on how to keep your computer updated.

  7. Computer Security

    Because you are responsible for anything that happens from your computer, and to reduce the risk of unauthorized access to your computer, set your computer to automatically log off if left unattended for more than 20 minutes.

  8. Authentication

    To prevent unauthorized access to your computer (hackers, malware, viruses), strong authentication must be used for all access. We recommend using a passphrase (a collection of words) instead of a password. A phrase is significantly more secure and is often easier to remember. Here are some examples.

    "You can do the Boogie 2!"
    "Call dad re: the party!"
    "Pickles make me want to HURL."

    Use the following guidelines to create your passphrase:

    1. Do not use a famous quote or a well-known line from a song.
    2. Make sure you can remember it.
    3. Use characters from at least three of the following four groups: lower case letters, upper case letters, numbers, non-alphanumeric characters (!$@#,etc).

    Remote access to a computer must use encrypted authentication. Any applications using unencrypted authentication (such as Telnet and FTP) can be easily monitored. Compromised applications like these should be replaced with their encrypted equivalents.

  9. Copyright Law

    It is illegal to copy or distribute copyrighted material if you do not have permission from the copyright owner. Most of the material (movies, TV shows, music, software) that is available with peer-to-peer file sharing software (BitTorrent, Limewire, etc) is not legal for you to download. You should also note that most file sharing software deceptively acts as a server on your computer to distribute the material you have downloaded.

  10. Violations in Policy

    These policies exist to protect the quality of your network and Internet connection. The response to violations will be the following.

    1. First violation - Your connection is blocked until your computer has gone through a security scan and you must attend a Copyright Violation presentation, as well as reply to the copyright
    2. Second violation - Your connection is blocked again and your case is referred to the office of Student Conduct, as well as your college Dean. The Student Conduct Officer (i.e Dean, Assistant Dean, Director of Student Conduct) hearing your case will determine when you regain your connection. You may be subject to sanctions (i.e. disciplinary probation based off your responsibility in the case and previous incidents). The case will also become part of your UCSD disciplinary record.
    3. Third violation - Same as second violation unless significant mitigating circumstances are present. You may be subject to additional and more serious sanctions (i.e. disciplinary probation for your tenure and/or suspension from the University) based off your responsibility in the case and previous incidents.
  11. Network Monitoring

    To keep the network running properly, the network is constantly monitored for vulnerable computers, infected computers and abuse. If connections to and from your computer look unusual, you will receive an email or a phone call from a network administrator about the activity to ensure that your computer is configured correctly. In some cases, you may be asked to modify the activity.

  12. Network Blocking

    In some cases it may be necessary to immediately block network connectivity to your computer. For this reason, ResNet reserves the right to block network access to/from your machine without warning.

  13. Other Relevant Policies

    In addition to the ResNet Acceptable Use Policy, the following University policies apply to your ResNet connection. Please read them carefully.
    UCSD Minimum Network Connection Standards (Please see Exhibit C)
    UCSD ACMS Acceptable Use Policy
    University of California Electronic Communications Policy
    UCSD Email Procedures and Practices

  14. Questions

    ResNet is always available to assist you with questions or concerns that you have about responsible computing and policies. We would be glad to help you investigate a particular concern or issue.

    Applied Physics & Mathematics 1313 (Muir College)

Telephone: (858) 534-2267
E-mail: resnet@ucsd.edu
Location: Applied Physics and Mathematics 1313

twitter facebook