Policies
- Computer Labs
- Overview of Using External (non-NCSU) Storage/Computing Services to Store/Host University Data
- Printing
- Registration of “Personal” equipment on “wired” Network
- Remote Access
- Security Incident Response
- Server/Desktop Security Guidelines
- Server Rooms
- Support of “Personal” Equipment
- Technology Lending e-Checkout/Loaner Policies
- Web Crawling
- Report misuse of campus IT Resources
Computer Labs
These policies apply to all CSC IT-managed teaching labs: Lampe 200, Lampe 201, Lampe 255, & EBII 1221
Definition of Terms
Organizer = individual(s) responsible for unlocking the lab and who must be physically present at all times in the lab.
- We require at least one-week reservation notice for non-Computer Science sponsored events/camps.
- For non-Computer Science sponsored events or curricula, CSC IT doesn’t accept software installation requests.
- Do NOT turn OFF computers.
- Do NOT unplug cables, monitors, or input devices from computers.
- Turn OFF the projector before you leave the lab.
- Upon reservation request approval, Organizer(s) must request lab access by contacting the Computer Science building security liaison Linda Honeycutt at http://www.csc.ncsu.edu/people/lshoneyc. Lab access is handled with card readers through the campus Security Applications and Technologies office (SAT). Requests may take up to 2 business days.
- Event organizers must be present at all times during lab use.
- All doors must be shut closed when the lab is not in use.
- Don’t leave doors propped open as card reader alarms will go off.
- Erase whiteboard(s) before leaving the lab
- Organizers are responsible for leaving the lab in the same condition as it was found (tables/chairs/etc). Do not let anyone in who is not part of the class/event.
- No food or drinks in the lab
- Do not request the building cleaning crew to let you in the labs.
- To submit reservation requests, or to report technical or any lab issues contact: csc_help@ncsu.edu Be sure to check calendars for room availability before submitting your request.
Failure to comply with the above lab rules will result in cancellation/denial of future reservation requests.
Printing
CSC IT-managed printers are firewalled. There are 3 basic firewall rule sets for our printers. Click here for Printer Setup.
Registration of “Personal” equipment on “wired” Network
CSC IT does not register “personal” devices on the “wired” network. We recommend using the campus wireless network if you have a WiFi-capable device. Visit the campus nomad Web site to register your personal WiFi device.
Remote Access
CSC IT doesn’t allow remote access to administrative office computers (centrally managed) without prior approval from the requestor’s direct supervisor. Furthermore, remote access will only be considered if it is done from a departmental-owned computer. To request remote access, have the direct supervisor submit a request to csc_help@ncsu.edu including:
- name of employee
- office number
- desktop hostname
- Period of time that remote access will be needed (e.g. 1 month)
- does the employee have a departmental-owned machine to remote from? This is a “MUST”
Requests will be reviewed individually while taking into consideration the protection of university data as mandated by the Universty Data Sensitivity Framework.
Security Incident Response
Compromised machines in our department will be handled as follows:
- The compromised machine gets blocked from the network
- Users/Owners are immediately notified via email about the incident
- If physically possible, the machine gets confiscated into the CSC IT suite
- CSC IT works with University Security & Compliance group on performing forensics
- CSC IT reports forensic findings to S&C and computer owner(s) and any other party affected by the break-in (if applicable)
- CSC IT meets with computer owner(s) and backup data that needs to be preserved
- CSC IT along with computer owner(s) DBANs and performs a clean install
- The computer is allowed back on the network
- CSC IT rescans machine
Additonal Incident Response Plan Items
Server/Desktop Security Guidelines
In order to minimize the amount of break-ins and ssh attacks on CSC boxes, the security measures and procedures below must be followed. These guidelines apply to all departmental Linux, Windows, and Mac OS boxes. Click here to learn about access, accounts, and more.
Support of “Personal” Equipment
CSC IT doesn’t provide technical support on “personal” equipment. please contact NCSU Help.
Technology Lending e-Checkout/Loaner Policies
While the primary objective of some of the departmental technology equipment is for use on-site, there are times when it is ok for staff and faculty to check out equipment off-campus. All faculty and staff are required to electronically acknowledge and agree to the following prior to checking out equipment:
- Requests must be submitted 2 or more business days in advance using the technology lending e-checkout page.
- no changes to the equipment’s hardware
- To use care in protecting and safeguarding the use of the equipment and returning it in the same condition it was in prior to checkout, with the exclusion of normal wear and tear
- To return equipment on or before the due date – not to exceed 30 days.
- To be the sole user of this equipment
- To follow university computer regulations if the equipment is used on campus
- Faculty/staff may submit requests on behalf of a student but must accept full responsibility for checked-out equipment and return it in the same condition as they were checked out.
This loaner program (especially for laptops) is NOT intended to support daily research operations for periods extending 3-4 weeks. Instead, faculty/researchers should use research or startup funds to purchase the necessary equipment to conduct their research experiments. Alternatively, feel free to check with CSC IT (via csc_help@ncsu.edu) about “spare” equipment/desktops that can be loaned for longer periods of time to support your research and/or teaching activities (subject to spare equipment availability).
Web Crawling
Web crawling may have the potential for disrupting the services of another web site, causing extra effort to deal with the invasion of your crawler or even creating a legal liability for NCSU.
Before researchers begin web crawling, they must submit the following form for approval:
*For policies not addressed above, please refer to NCSU Computer Use Policies.
IT Resource Misuse
Report misuse of campus IT resources by Computer Science faculty, staff, or students to
csc-report-abuse@ncsu.edu