12.07.2015 Views

to download the 2012-2013 Student - Methodist University

to download the 2012-2013 Student - Methodist University

to download the 2012-2013 Student - Methodist University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Q. 30: I have a lap<strong>to</strong>p that came with an internal wireless card. Will it work with <strong>the</strong> <strong>Methodist</strong><strong>University</strong> Wireless network?A: If you currently have a lap<strong>to</strong>p that came with an internal or external (PCMCIA) wireless network card,you will need <strong>to</strong> find out if it is compatible with <strong>the</strong> <strong>University</strong>’s wireless access points. The <strong>University</strong>uses wireless access points that are “B”, “G”, or “B/G” compatible. If your wireless network cardsupports one of <strong>the</strong>se standards, <strong>the</strong>n yes it will work with <strong>Methodist</strong> <strong>University</strong> Wireless network.Q. 31: Can you install Instant Messenger or network paging on my computer?A: Due <strong>to</strong> bandwidth capacity limitations and risk of spreading viruses, we will not install, configureor support any Instant messaging services (AOL, Hotmail etc.), network paging services or filesharing programs on computers connected <strong>to</strong> MuNet.Q. 32: What are Computer Services’ responsibilities in all of this?A: Computer Services’ responsibilities include:• Maintaining MuNet (<strong>Methodist</strong> <strong>University</strong> Network) <strong>to</strong> maximize <strong>the</strong> time it is available forall users.• Moni<strong>to</strong>ring systems <strong>to</strong> assure that individuals are not using <strong>the</strong> system without expressauthority. The activities of MuNet users may be moni<strong>to</strong>red at any time <strong>to</strong> insure that <strong>the</strong> useis consistent with <strong>the</strong> guidelines spelled out in this publication. To use a system on MuNetis <strong>to</strong> consent <strong>to</strong> such moni<strong>to</strong>ring. If such moni<strong>to</strong>ring reveals possible evidence of criminalactivity or violations of <strong>University</strong> policy, system personnel will provide <strong>the</strong> evidence of suchmoni<strong>to</strong>ring <strong>to</strong> both <strong>University</strong> administration and <strong>to</strong> law enforcement officials.• Strictly adhering <strong>to</strong> and informing our users adhere <strong>to</strong>, copyright laws.• Protecting <strong>the</strong> integrity of your work by providing a secure computing environment, includingnetwork server anti-virus protection, assuring reasonable confidentiality of correspondence,and making backup copies of materials s<strong>to</strong>red on servers.Q 33: What are <strong>the</strong> student’s responsibilities?A: Your responsibilities include:• You are not authorized <strong>to</strong> install or configure such devices <strong>to</strong> connect <strong>to</strong> MuNet, which mayinclude, but not limited <strong>to</strong>: wireless access points, bridges, routers, switches, hardwareand software servers, transceivers, converters, hubs, printers, or concentra<strong>to</strong>rs. You are notallowed <strong>to</strong> attach anything <strong>to</strong> our network that we do not authorize.• NEVER INSTALL A WIRELESS ACCESS POINT, it is violation of <strong>the</strong> <strong>University</strong> Network Policy.• Installing and configuring your own printers, wireless cards, network cards, zip drives, jazzdrives, scanners, and speakers <strong>to</strong> your own computer.• Never attempting <strong>to</strong> read, modify, copy, or destroy ano<strong>the</strong>r user’s data files, diskettes or o<strong>the</strong>rmaterials without <strong>the</strong> permission of <strong>the</strong> owner. All members of <strong>the</strong> electronic community haveownership rights <strong>to</strong> <strong>the</strong>ir own intellectual work.• Never harassing o<strong>the</strong>r users by altering system software or computer system, by propagatingviruses and o<strong>the</strong>r damaging software, sending malicious, annoying, or offending messages.• Accessing your own account <strong>to</strong> read and remove mail at regular intervals so that ample s<strong>to</strong>ragespace remains on <strong>the</strong> systems for all users. Each user will have an assigned s<strong>to</strong>rage quotafor s<strong>to</strong>rage of essential data.• Refraining from tying up resources by staying on <strong>the</strong> Internet for long periods, or by usingbandwidth hogging programs such as Instant Messenger services or file sharing programs.• Never allowing o<strong>the</strong>rs <strong>to</strong> use your account and always selecting passwords that cannot be guessed.• Strictly adhering <strong>to</strong> copyright laws.Q 34: What if I have problems and need help?A: Call 630-7300.91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!