-
About
ExploreUp a level (this gets replaced in JS)
-
Strategic Plan
Explore
-
College Overview
Explore
- Dean's Lecture Series
- Environmental Health Sciences
-
Diversity, Equity and Inclusion
Explore
-
Get Involved
Explore
-
People
Explore
-
Achievements
Explore
- Administrative Offices
- Discover HHD
- College News and Events
- Commencement
- Contact Us
-
Strategic Plan
-
Undergraduate
ExploreUp a level (this gets replaced in JS)
-
Getting Started
Explore
-
Student Support
Explore
-
Get Involved
Explore
-
Gain Experience
Explore
-
Careers
Explore
-
Get Connected
Explore
-
Policies and Procedures
Explore
- Summer Session
- Discover HHD
- Visit and Apply
- New Student Orientation Program (NSO)
- Undergraduate News
- Commencement
- Contact Us
-
Getting Started
-
Graduate
ExploreUp a level (this gets replaced in JS)
-
Getting Started
Explore
-
Student Support
Explore
-
Student Profiles
Explore
-
Get Involved
Explore
-
Get Connected
Explore
-
Gain Experience
Explore
- Environmental Health Sciences
-
Diversity, Equity and Inclusion
Explore
-
Commencement
Explore
- Discover HHD
- Admissions
- Contact
-
Getting Started
-
Online & Outreach
ExploreUp a level (this gets replaced in JS)
-
Online Degrees and Programs
Explore
-
Outreach Programs
Explore
-
Short-term Courses
Explore
-
Teaching Support
Explore
- Contact Us
-
Online Degrees and Programs
-
Research
ExploreUp a level (this gets replaced in JS)
-
Researcher Resources
Explore
-
Research Units
Explore
-
Ongoing Research
Explore
-
Diversity, Equity and Inclusion
Explore
- Environmental Health Sciences
-
Get Involved
Explore
-
Stay Connected
Explore
- Discover HHD Research
- Research News and Events
- Contacts
-
Researcher Resources
-
Alumni
ExploreUp a level (this gets replaced in JS)
-
Become a Member
Explore
-
Resources for Alumni
Explore
-
Building Diversity and Inclusion
Explore
-
Get Involved
Explore
- Meet Our Volunteer Leaders
-
Stay Connected
Explore
- Alumni Achievements
-
Parents and Family
Explore
- Donate
- Attend an Alumni Event
- Give to HHD
- Update Your Contact Information
- Contact Us
-
Become a Member
-
Contact
Explore
-
Departments
Explore
-
Research Centers
Explore
-
Central Administration
ExploreUp a level (this gets replaced in JS)
- Dean's Office
- Center for Student Advising and Engagement
- Communications and Marketing
- Development and Alumni Relations
- Facilities
- Finance and Accounting
- Human Resources
- Information Systems and Services (ISS)
- Online Education and Outreach
- Research and Graduate Education
- Office for Diversity and Inclusion
- Office for Faculty Affairs
-
Training and Support
Explore
- Contacts/Directory
04-01 Computer and Network Security
Breadcrumb
- Home
- 04-01 Computer and Network Security
Policy # : 04-01
Effective: July 1, 2004
Revised: June 30, 2019
Section: Security
Subject: Computer and Network Security
PURPOSE
To list the conditions under which computers and other networked devices are permitted to connect to the college networks and the requirements and responsibilities of the users and administrators of these devices.
POLICY APPLIES TO
All full and part-time Penn State employees who require access to the college networks.
POLICY
General
Any computer, computer system or other networked device connected to college computer and network resources will be subject to and must comply with the conditions set forth in University Policy AD95 and in this policy.
In order to protect the security and integrity of computer and network resources against unauthorized or improper use, and to protect authorized users from the effects of such abuse or negligence, the college reserves the rights, at its sole discretion, to limit, restrict, or terminate any account or use of computer and network resources, and to inspect, copy, remove or otherwise alter any data, file, or system resources which may undermine authorized use. The college also reserves the right to inspect or check the configuration of computer and network resources for compliance with this policy, and to take such other actions as in its sole discretion it deems necessary to protect college computer and network resources.
The college shall not be liable for, and the user assumes the risk of, inadvertent loss of data or interference with files resulting from the college's efforts to maintain the privacy, integrity and security of the college's computer and network resources.
The college reserves the right to suspend network access or computer account(s) if user-maintained files, programs or services are believed to have been operating in violation of either law or policy.
The college reserves the right to install and maintain network firewalls to protect the college networks by restricting network communication that is deemed to be a security risk.
The college reserves the right to maintain log files for the purpose of diagnosing network and system problems. The log files generally do not contain personal information on users. University Policy governs the purposes under which these files can be used.
The college reserves the right to limit or prevent the operation of computer servers in any campus building or off-campus office location. The only approved location for a server is in the college's server room. If a staff member is exempted from this policy and allowed to administer their own server, we reserve the right to revoke their server administration privileges and relocate their equipment if events demonstrate that they are incapable of performing the duties of the system administrator's job (as described below under System Administrator Responsibilities) in a professional manner.
System User Responsibilities
- Understanding, agreeing to and complying with all security policies governing college computer and network resources and with all federal, state and local laws, including laws applicable to the use of computer facilities, electronically encoded data and computer software.
- Safeguarding passwords and/or other sensitive access control information related to their own accounts or network access. Such information must not be transmitted to, shared with, or divulged to others. Similarly, system users must recognize the sensitivity of all other passwords and computer or network access information in any form, and must not use, copy, transmit, share or divulge such information, nor convert the same from encrypted or enciphered form to unencrypted form or legible text. Any attempt to conduct such actions by a system user is a violation of this policy.
- Ensuring accounts or computer and network access privileges are restricted to their own use only. Users must not share their accounts, nor grant accounts to others nor otherwise extend their own authorized computer and network access privileges to others.
- Respecting the physical hardware and network configuration of college-owned networks. System users must not extend the physical network on which their system resides. No use of mini-hubs, switches, wireless access points, routers, wire splitters, etc. is permitted. The use of these devices is permitted on private networks as long as those networks are not connected to college-owned networks in any way. In the case of wireless access points, the college reserves the right to request removal of wireless access points if they are causing interference with college-owned/operated wireless access points.
- Helping to ensure that the college has an accurate and up to date inventory of all computers and other networked devices that are connected to college networks. This involves not attaching new computers and other networked devices to existing network connections and not swapping or moving existing computers and other networked devices between network connections. Users may physically move the computers and other networked devices but must request that their computer deputy submit a service request for ISS to update its record of the device before connecting the devices to the new network connection. In the case of attaching new computers and networked devices to existing network connections, users must contact ISS before connecting the new device. ISS will inventory the device, affix an identification tag to the device for the purpose of recording the device in our network database and either configure the network settings or verify the correctness of the user configured network settings. Violators of this policy will lose their network access.
- Ensuring that the one computer or other networked device per one network connection rule is not exceeded. No sharing of network connections or IP addresses between multiple computers or other networked devices is allowed unless approved by ISS. Exceptions may be allowed in the event that a user wishes to use a laptop temporarily on their desktop's network connection. In this case, the IP address from the desktop may be temporarily assigned to the laptop. Prior approval must be given by ISS in these cases.
- Treating non-college computer and network resources in accordance with this policy. College computer and network resources must not be used to attempt to breach the security or security policy of other sites (either willfully or negligently).
- Taking reasonable and appropriate steps to see that all hardware and software license agreements are faithfully executed on their systems.
- Individuals aware of any breach of information or network security, or compromise of computer or network security safeguards, must report such situations to either ISS or the University's Security Operations and Services Director.
- Ensuring the content of files, programs or services that they operate, maintain, store or disseminate using college computer and network resources (to include personally-owned computers connected to such resources) are compliant with both law and college and university policy.
System Administrator Responsibilities
Unless otherwise stated, system administrators have the same responsibilities as system users. However, because of their position, system administrators have additional responsibilities and privileges for specific systems or networks. For systems which they directly administer, system administrators are responsible for:
- Ensuring the secure configuration and operation of the computers and other networked devices that are connected to college computer and network resources. This includes the devices themselves and any services (e.g., web servers) they may have established. This includes good administration and configuration practices, installing security patches in a timely manner and running anti-virus software and updating the definition files, usually at a minimum of once a week, on such software.
- Ensuring user accounts and passwords meet minimum standards as defined by ISS. In addition to the base level of security as required by university policy, the college requires that advanced account policy settings must be utilized when available. This includes configuring the system to remember, at a minimum, the previous 4 passwords and configuring the system to set a minimum password age of 14 days or higher.
Exceptions and Exemptions
Exception to or exemptions from any provision of this policy must be approved by ISS. Similarly, any questions about the contents of this policy, or the applicability of this policy to a particular situation should be referred to the College's Computer Security Officer.
Health and Human Development
health-and-human-developmen Menu
-
Health and Human Development
- About
-
Undergraduate
- Getting Started
- Majors and Minors
- Honors Program
-
Advising
- Academic Integrity
- Academic Progress
- Advising Resources
- Change of Campus
- Enforcement of Recommended Preparation
- Learning Support
- Petitions to University Policies and Procedures
- Policies and Procedures
- Schedule an Appointment with Your Adviser
- Undergraduate Adviser and Student Handbook
- Contact
- Dean's List
- Student Organizations
-
Student Profiles
- Take a Professor to Lunch
- Financial Aid and College Scholarships
- Summer Session
- Undergraduate News
- Dean's Welcome Meeting
- Visit and Apply
- Contact
-
Discover HHD
-
Career and Professional Development
-
Engaged Learning
- Experiential Education Spotlights
- HHD Instagram Ambassadors
- Undergraduate Research Grants
- Undergraduate Activities and Events
-
Graduate
-
Alumni
- Get Involved
-
Awards
-
College Awards
- Carol Clark Ford Staff Achievement Award
- HHD Faculty Sustainability Award
- Joyce Hopson-King Diversity Achievement Award
- Martha “Marty” Adams Undergraduate Advising Award
- Ann C. Crouter Early Career Faculty Award
- Evelyn R. Saubel Faculty Award
- HHD Alumni Society Excellence in Teaching Award
- Leadership in Outreach Award
- Evan G. and Helen G. Pattishall Outstanding Research Achievement Award
-
Pauline Schmitt Russell Distinguished Research Career Award
- Nomination Form
-
Past Recipients
- Energy deficiency in sport: impacts on health and performance in exercising women - Nancy Williams
- Health as a Daily Experience - Dave Almeida
- Measuring a Moving Target: Cognition-on-the-Go and the New Science of Brain Health
- The Curious Case of the Rarámuri Foot-Runners - Mark Dyreson
- Why the Fat You Eat Matters - Greg Shearer
- Previous Award Recipients
- Magazine
- Update Your Contact Information
- Donate
- Contact
- Henderson Building Transformation
- Research
-
Contact
- Departments
-
Outreach
- Guidelines
Information Systems and Services (ISS)
16 BBH Building
University Park, PA 16802
Helpdesk
iss-helpdesk@psu.edu
814-865-INFO (4636)
Hours
Monday-Friday
8 a.m. - 4:30 p.m.