- Frequently Asked Questions
- Use Policy
- Setting Up Your Computer
- Setting Up Gaming Consoles
- Mobile Device Email Setup
- Preventing Viruses
Acceptable Use Policy
Individuals who use the University of North Dakota computer facilities assume the responsibility of seeing that these resources are used in an appropriate manner. Misuse of computer facilities is considered a violation of University policy and regulations and may also be a violation of law if data or other computer users are disturbed or the privacy of individuals are violated.
As covered under State Board of Higher Education Policy 1901.2 and adopted by the University of North Dakota, ALL users of State Board of Higher Education (SBHE) data processing capabilities are required to comply with the following:
The DNS policy states: The NDUS and HECN will retain ownership and control of nodak.edu and 134.129.x.x. (This means that students are NOT allowed to register domain names to NDUS or HECN IP addresses.
Files, sign-ons, usernames, passwords, and computer output belonging to an individual or to the institution are considered to be personal property. Users shall not examine, change, or use another person's or institutional files, output, or username for which they do not have explicit authorization.
Users shall not deliberately attempt to degrade system performance or capability. Knowledge of systems or special passwords shall not be used to damage a system or file, or to change or remove information without authorization.
The Following activities are prohibited:
1. Chain Letters: A letter sent to several persons with a request that each send copies of the letter to an equal number of persons.
2. Spamming: Internet equivalent of junk mail.
3. E-mail Bombing: Sending repeat messages to other persons many times over to clog their mail boxes and to cause them to waste their time deleting those messages.
4. Mail Spoofing: Sending mail so as to appear to come from someone other than the actual sender.
5. Ping Flooding: Shutting down a Internet user or provider by jamming the communications channels.
6. Packet Sniffing: Putting your network interface card (Ethernet Card) in the promiscuous mode in order to see data destines for other machines.
7. Password Cracking: Using applications such as crack or crackerjack to do password guessing of servers.
8. Propagating Trojan Programs such as Netbus or Backorifice to remotely control or change hosts on the network.
9. TCP Spoofing: Making your computer look like a different computer on the network.
10. Smurf Attack: Sending ICMP (ping) data to a broadcast address, all of it having a spoofed IP address of a victim.
Users shall not use the system for any illegal purpose or to enter or send any material that is obscene or defamatory, or material that is intended to annoy, harass or alarm another person which serves no legitimate purpose.
Material of pornographic nature, copyrighted materials, illegal software, and other illegal programs may not be shared on the "Network Neighborhood."
Browsing and/or sharing of pornographic material, or Internet chat of the sexual nature is prohibited on University owned computers.
The Provision of network services from user computers (e.g. BBS, IRC Server, DHCP Server, DNS Server, FTP, POP3, SMTP, WINS Server, Napster, Hotline, SNMP) are prohibited. Users who have an academic need to provide such services from their personal computers must have prior written authorization from ResNet before running and such services.
All users shall use software only in accordance with applicable license agreements. Users shall not make unauthorized copes of any software under any circumstances. Duplication of licensed software for any purpose except for backup and archival purposes or when otherwise specifically authorized is prohibited. Users shall not give or transfer software to anyone except other employees of the university system unless they are specifically authorized to do so. All software must be lawfully purchased or acquired.
Use of computer systems and databases shall be limited to the purpose(s) for which access is granted. Use of system or databases for employee's or other user's duties or purposes for which access is granted, is prohibited.
Faculty or other employees or students who violate this policy shall be subject to discipline. Other users who violate this policy may be denied access to the system.
The University of North Dakota agrees to provide ONE, unlimited use, in-room network connection. The UND Housing Office is not liable for any damage to the resident's/owner's computer or accessories nor responsible for any maintenance or repair to any part of the resident's/owner's computer. Under no circumstances will UND Housing Office be liable to the resident for any special, consequential, indirect or similar damages, including the loss of data arising from the use or inability to use the network as well as from interrupted services.
Network Administrators & ResNet Staff
ODNA Network Administrators and ResNet staff will routinely run security scans to prevent unauthorized access and/or misuse of the network. Auditing scans will also be run to determine any services that may degrade network performance.
The Housing Office reserves the right to discontinue or refuse this service to any student, for the reasons of misuse, conduct, or violations of the above policies.