PESIT Internet Policy

 
 

Introduction

These guidelines describe thebasic computer security measures PESIT Students are obligated to follow when they use PESIT's computer systems, whether the access is internal or external. Within this document the reference to PESIT is to be understood to mean PESIT and wholly owned subsidiaries.

PESIT Management Approved Use Of Computer Services

PESIT computer systems must only be used for  PESIT's work or for purposes authorized by PESIT management. Usage is subject to audit at any time by PESIT management.

Personal use of PESIT computing equipment may only be approved by PESIT management if such use is clearly insignificant, does not interfere or compete with PESIT work, and does not involve any incremental cost to PESIT. Any questions concerning personal use of PESIT computing resources should be discussed with the system administrator.

Using PESIT computer systems to send or reply to "chain letters", or to distribute offensive or inappropriate material, is prohibited.

Passwords

A computer access password is the primary key to computer security. Your login name uniquely identifies you, and allows you access to PESIT computer services. For your own protection, and for the protection of PESIT's resources, you must keep your password secret and not share it with anyone else. Also, if giving your password to another person is inevitable (eg. printing work when you are not present) then it is advisable to change the password immediately after that. Please note that you are solely responsible for anything done by a person using your login and password.

The following guidelines are designed to help you select passwords that are not trivial or predictable, and are resistant to compromise by computer "hackers" .Computer access passwords must:

Also: Note: If you access computer systems that are not under PESIT control, do not select the same password on external systems that you selected for use on PESIT internal systems. (eg. Your Hotmail password *must* be different from your PESIT login password)

Protecting Against Computer Viruses

A "computer virus" is a program designed to copy itself into other programs. The virus may also be designed to cause the loss or alteration of data on a computer, or in extreme cases, to completely disable a computer. The virus is activated when the program "infected" by it is executed on a computer.

Be alert to the potential dangers of accepting programs from public sources such as bulletin boards and conferences, or unsolicited software. Do not execute a program if you are uncertain of expected results or do not know the source of the program. Also be wary of any program you recieve over the Internet (especially from hacker sites or unknown sites). If your mail reader supports ActiveX, Java, Javascript or VBScript, disable it. E-Mail is very effective in plain-text mode itself. Do not necessarily trust a site which claims to be safe either.

If programs on your machine are infected by a virus, report the virus infection immediately.
Harmful code false alarms and hoaxes are also a problem in networked environments. PESIT Students are not to send or forward e-mail notices concerning virus or harmful code warnings to other students.

 The Internet

INTRODUCTION

The internet is the mother of all networks.Initially, it consisted of a few computers in USA engaged in military applications in different locations that needed networking.They were collectively called Arpanet. It soon grew beyond that and educational institutions were also joined to this network, quickly allowing it to gain momentum. With the influx of students, the internet spawned a number of new ideas and protocols. The internet is not a product of genius and is not a miracle. It was largely formed due to the bright ideas of many people and slow development. As of today, there is no definition to the internet. One can best describe it as a collection of computers using many standard protocols and powering different applications. The internet has boomed only after the introduction of the World Wide Web (WWW). This allowed a new dimension in communication bringing the technology of the internet into the hands of a common man whose primary concern is ease of use and effectiveness.

The biggest step in the development in the initial phases of the internet is easily the allowing of universities to join it, instead of keeping it as a military network. It is with the same spirit that we plan to introduce the PESIT Internet Services.The Internet is a rapidly growing important resource for PESIT. Effective use of the Internet can provide a competitive advantage to us in the form of new opportunities, information gathering, improved external communications, and increased student responsiveness.

Internet access includes, but is not limited to; viewing web sites, sending and receiving electronic mail, transmitting or receiving files, accessing Usenet, and running Internet applications.

Noncompliance with the principles described in this document may result in disciplinary action, including dismissal.
 

Establishing New Internet Services

Connecting PESIT systems and networks to the Internet can present a very serious risk to PESIT. The technology involved in establishing a new Internet connection, a new Internet gateway/firewall, or a new Internet server is relatively simple. However, the technical and administrative controls necessary to protect that service against highly skilled Internet hackers can be very complicated and labor intensive. It is possible to expose the entire PESIT network and the systems and data on it, without even knowing you are doing so.

Because of the potential risk, establishment of new PESIT Internet services is strictly controlled, and all proposed new services must be approved before being placed into operation.

Privacy

PESIT's Internet web sites are obligated to respect the privacy wishes of individuals who visit the sites. PESIT web sites must not collect personal information about site visitors without the visitors' permission. Any personal information collected at an PESIT  web site must be protected against unauthorized access or disclosure.

All electronic documents created or stored or communicated using PESIT's computers are the property of PESIT. PESIT may access documents or communications stored on its property or in its systems whenever warranted by educational need or legal requirements; and reserves the right to monitor its systems for accounting purposes, to ensure proper use, and to detect security violations. Students should not expect that their communications using the college's systems are absolutely private. We are not very sure of Indian laws right now (We intend to find out.) but in the USA, e-mail messages older than 180 days can be accessed by others ( Read FBI,etc. ) without a court warrant. So please make sure that you delete all old messages.

Harmful Code

Be aware that there are potential dangers in accepting programs or viewing data from unknown sources on the Internet.

A "computer virus" is a program designed to copy itself into other programs. The virus may also be designed to cause the loss or alteration of data on a computer, or in extreme cases, to completely disable a computer. The virus is activated when the program "infected" by it is executed on a computer.

Be alert to the potential dangers of accepting programs from public sources such as bulletin boards and conferences, or unsolicited software. Do not execute a program if you are uncertain of expected results or do not know the source of the program.
If programs on your machine are infected by a virus, report the virus infection immediately.

Harmful code false alarms and hoaxes are also a problem in networked environments. PESIT students are not to send or forward e-mail notices concerning virus or harmful code warnings to other employees.

Other forms of harmful code can act similar to a computer virus, but are not transmitted by copying and executing infected programs. These newer forms of attack are activated by simply viewing a web site that contains maliciously programmed applets or JavaScript.

Web sites established by individuals (rather than by companies), and web sites established by organizations with questionable ethics, are prime candidates for hosting harmful code. You should avoid these sites whenever possible. Also note that sometimes big companies' web sites can also be dangerous. This is because their sites could have been cracked and hackers might be controlling it. NASA and the Pentagon have been hacked countless times ( But these always ended in those responsible being arrested - You can hack them but can't escape them.)

Conduct

When accessing the Internet :

When using electronic mail to communicate with people on the Internet: While using Usenet: When using telnet to login to systems/servers on the Internet:

Intellectual Property Rights

When downloading materials from the Internet:

Inappropriate Internet Web Sites

Numerous Internet web sites contain or distribute material that is objectionable. While it is impossible to list every possible web site or form of objectionable material, some clear examples include: PESIT students are not to access such web sites, or distribute or obtain similar material through the Internet. Questions concerning other inappropriate web sites or objectionable material should be discussed by students with system administrator.

If PESIT students' access to specific web sites containing inappropriate material becomes a source of embarrassment to the PESIT college due to news media or trade press reports, PESIT may choose to apply technical control measures to prevent further access to those sites. PESIT does not routinely scan Internet web sites for inappropriate material, nor does it attempt
to maintain a complete list of inappropriate web sites. PESIT students should not presume that PESIT approves access to all web sites not blocked by PESIT technical control measures.

Receiving Unsolicited E-MAIL


PESIT students holding an Internet e-mail address may be recipients of unsolicited non-educational e-mail (sometimes referred to as spam or junkmail). This situation is very similar to receiving unsolicited telephone calls or unsolicited postal mail. If you are spammed, please do not spam back. A flame war can be very taxing on system resources. Instead, please contact the system administrator asking him/her to block the other person's mail out using filters.

The easiest, and generally most effective response to unsolicited e-mail is simply to ignore the mailing. In specific cases where individuals or organizations on the Internet demonstrate themselves to be a continuous source of unwanted and unsolicited e-mail, PESIT may choose to apply technical control measures to prevent the receipt of further mailings from those individuals or organizations.

PERSONAL USE


Access to Internet services for personal use during your normal hours is allowed if such use is clearly insignificant as compared to your educational  use. In addition, personal use during or outside of normal hours must:

In addition to the above, personal use activities must not involve additional hardware or software costs to PESIT .

Questions concerning personal use of Internet services and PESIT computing
resources should be discussed with system administrator.