Acceptable Use Policy
Individuals who use UND computer and network facilities assume responsibility for using these resources in an appropriate manner.
Acceptable Use
Acceptable use of computer and network resources is defined in NDUS Procedure 1901.2: Computer and Network Usage, available at ndus.edu/makers/procedures/ndus and in the Code of Student Life.
- Misuse of UND computers and network resources may result in termination of access to any or all of these resources without notice to the user.
- In more serious situations, a computer may be seized by campus or law enforcement authorities.
- Refer to the ResNet website for notices of any additional policies adopted by Apogee ResNet, and also be aware that state and federal laws regulate some types of computer and network usage.
Misuse
- Personal wireless access points are not allowed in the residence halls.
- Use of personal access points causes interference with the UND provided wireless coverage and will degrade signal for others.
As covered under State Board of Higher Education Policy 1901.2 and adopted by the University of North Dakota, all users of State Board of Higher Education (SBHE) data processing capabilities are required to comply with the following:
- The DNS policy states: The NDUS and HECN will retain ownership and control of nodak.edu and 134.129.x.x. (This means that students are NOT allowed to register domain names to NDUS or HECN IP addresses).
- Files, sign-ons, usernames, passwords, and computer output belonging to an individual or to the institution are considered to be personal property. Users shall not examine, change, or use another person's or institutional files, output, or username for which they do not have explicit authorization.
- Users shall not deliberately attempt to degrade system performance or capability. Knowledge of systems or special passwords shall not be used to damage a system or file, or to change or remove information without authorization.
The following activities are prohibited:
- Chain Letters: A letter sent to several persons with a request that each send copies of the letter to an equal number of persons.
- Spamming: Internet equivalent of junk mail.
- E-mail Bombing: Sending repeat messages to other persons many times over to clog their mail boxes and to cause them to waste their time deleting those messages.
- Mail Spoofing: Sending mail so as to appear to come from someone other than the actual sender.
- Ping Flooding: Shutting down a Internet user or provider by jamming the communications channels.
- Packet Sniffing: Putting your network interface card (Ethernet Card) in the promiscuous mode in order to see data destines for other machines.
- Password Cracking: Using applications such as crack or crackerjack to do password guessing of servers.
- Propagating Trojan Programs such as Netbus or Back Orifice to remotely control or change hosts on the network.
- TCP Spoofing: Making your computer look like a different computer on the network.
- Smurf Attack: Sending ICMP (ping) data to a broadcast address, all of it having a spoofed IP address of a victim.
- Users shall not use the system for any illegal purpose or to enter or send any material that is obscene or defamatory, or material that is intended to annoy, harass or alarm another person which serves no legitimate purpose.
- Material of pornographic nature, copyrighted materials, illegal software, and other illegal programs may not be shared on the "Network Neighborhood."
- Browsing and/or sharing of pornographic material, or Internet chat of the sexual nature is prohibited on University owned computers.
- The Provision of network services from user computers (e.g. BBS, IRC Server, DHCP Server, DNS Server, FTP, POP3, SMTP, WINS Server, Hotline, SNMP) are prohibited. Users who have an academic need to provide such services from their personal computers must have prior written authorization from UIT before running and such services.
- All users shall use software only in accordance with applicable license agreements. Users shall not make unauthorized copes of any software under any circumstances. Duplication of licensed software for any purpose except for backup and archival purposes or when otherwise specifically authorized is prohibited. Users shall not give or transfer software to anyone except other employees of the university system unless they are specifically authorized to do so. All software must be lawfully purchased or acquired.
- Use of computer systems and databases shall be limited to the purpose(s) for which access is granted. Use of system or databases for employee's or other user's duties or purposes for which access is granted, is prohibited.
Faculty or other employees or students who violate this policy shall be subject to discipline. Other users who violate this policy may be denied access to the system. 1901.2 can be found at NDUS.edu.
Service Agreement
The University of North Dakota agrees to provide one, unlimited use, in-room network connection. The UND Housing & Residence Life Office is not liable for any damage to the resident's/owner's computer or accessories nor responsible for any maintenance or repair to any part of the resident's/owner's computer. Under no circumstances will UND Housing & Residence Life Office be liable to the resident for any special, consequential, indirect or similar damages, including the loss of data arising from the use or inability to use the network as well as from interrupted services.
Contract Termination
The Housing & Residence Life Office reserves the right to discontinue or refuse this service to any student, for the reasons of misuse, conduct, or violations of the above policies.