Skip to main content

Policies

Computer Labs

These policies apply to all CSC IT managed teaching labs: Lampe 200, Lampe 201, Lampe 255, & EBII 1221

Definition of Terms

Organizer = individual(s) responsible for unlocking lab and who must be physically present at all times in the lab.

  • For non-Computer Science sponsored events/camps, we require at least one-week reservation notice.
  • For non-Computer Science sponsored events or curricula, CSC IT doesn’t accept software installation requests.
  • Do NOT turn OFF computers.
  • Do NOT unplug cables, monitors, or input devices from computers.
  • Turn OFF the projector before you leave the lab.
  • Upon reservation request approval, Organizer(s) must request lab access by contacting the Computer Science building security liaison Linda Honeycutt at http://www.csc.ncsu.edu/people/lshoneyc. Lab access is handled with card readers through the campus Security Applications and Technologies office (SAT). Requests may take up to 2 business days.
  • Event organizers must be present at all times during lab use.
  • All doors must be shut closed when the lab is not in use.
  • Don’t leave doors propped open as card reader alarms will go off.
  • Erase whiteboard(s) before leaving the lab
  • Organizers are responsible for leaving the lab in the same condition as it was found (tables/chairs/etc). Do not let anyone in who is not part of the class/event.
  • No food or drinks in the lab
  • Do not request the building cleaning crew to let you in the labs.
  • To submit reservation requests, or to report technical or any lab issues contact: csc_help@ncsu.edu Be sure to check calendars for room availability before submitting your request.

Failure to comply with the above lab rules will result in cancellation/denial of future reservation requests.


Printing

CSC IT-managed printers are firewalled. There are 3 basic firewall rule sets for our printers. Click here for Printer Setup.


Registration of “Personal” equipment on “wired” Network

CSC IT does not register “personal” devices on the “wired” network. We recommend using the campus wireless network if you have a WiFi-capable device. Visit the campus nomad Web site to register your personal WiFi device.


Remote Access

CSC IT doesn’t allow remote access to administrative office computers (centrally managed) without prior approval from the requestor’s direct supervisor. Furthermore, remote access will only be considered if it is done from a departmental-owned computer. To request remote access, have the direct supervisor submit a request to csc_help@ncsu.edu including:

  1. name of employee
  2. office number
  3. desktop hostname
  4. Period of time that remote access will be needed (e.g. 1 month)
  5. does the employee have a departmental-owned machine to remote from? This is a “MUST”

Requests will be reviewed individually while taking into consideration the protection of university data as mandated by the Universty Data Sensitivity Framework.


Security Incident Response

Compromised machines in our department will be handled as follows:

  1. The compromised machine gets blocked from the network
  2. Users/Owners are immediately notified via email about the incident
  3. If physically possible, the machine gets confiscated into the CSC IT suite
  4. CSC IT works with University Security & Compliance group on performing forensics
  5. CSC IT reports forensic findings to S&C and computer owner(s) and any other party affected by the break-in (if applicable)
  6. CSC IT meets with computer owner(s) and backup data that needs to be preserved
  7. CSC IT along with computer owner(s) DBANs and performs a clean install
  8. The computer is allowed back on the network
  9. CSC IT rescans machine

Additonal Incident Response Plan Items


Server/Desktop Security Guidelines

In order to minimize the amount of break-ins and ssh attacks on CSC boxes, the security measures and procedures below must be followed. These guidelines apply to all departmental Linux, Windows, and Mac OS boxes. Click here to learn about access, accounts, and more.


Server Rooms

DESCRIPTION: We’d like server room spaces to be manageable for as many people as possible. To help aid in that endeavor we are providing access based on the following policies. As is always the case there may be a need for an exception to these rules. CSC IT staff will make a determination on whether an exception should be granted. If there is a conflict it will be decided by the Department Head and the Computing Committee.

  • No cabling (power, network, empty boxes, etc.) on the server room floors.
  • All systems must be in a rack.
  • Non-rack mount systems must be on a rack mount shelf in a rack.
  • All systems should be labeled with hostname/FQDN, IP Address, and Faculty contact person.
  • Both ends of all cables should be labeled.
  • Rack mount systems are preferred.
  • Newly purchased rack mount equipment will force non-rack mount systems out of the server room if space is needed.
  • All systems must be run headless (without keyboard, monitor, and mouse).
  • If a keyboard, monitor, and mouse is required you must use a rack-mount KVM and 1U rack specific LCD solution which you will provide and pay for.
  • If a UPS is required it will be rack mount and paid for by the person in need.
  • All servers are subject to CSC IT security policies.
  • The half-rack mounted on the wall and the network wall boxes are off-limits.
  • Any additional networking or power arrangements required to service a particular person’s needs will be paid for by that person.
  • Access to the server room will be removed if a Faculty member or their students continuously violate the above policies.
  • IT staff will provide one week notice via email for systems that are in violation of the above policies. If corrective action is not taken by the end of that week the system(s) will be unplugged and removed from the server room.

Support of “Personal” Equipment

CSC IT doesn’t provide technical support on “personal” equipment. please contact NCSU Help.


Technology Lending e-Checkout/Loaner Policies

While the primary objective of some of the departmental technology equipment is for use on-site, there are times when it is ok for staff and faculty to check out equipment off-campus. All faculty and staff are required to electronically acknowledge and agree to the following prior to checking out equipment:

  • Requests must be submitted 2 or more business days in advance using the technology lending e-checkout page.
  • no changes to the equipment’s hardware
  • To use care in protecting and safeguarding the use of the equipment and returning it in the same condition it was in prior to checkout, with the exclusion of normal wear and tear
  • To return equipment on or before the due date –  not to exceed 30 days.
  • To be the sole user of this equipment
  • To follow university computer regulations if the equipment is used on campus
  • Faculty/staff may submit requests on behalf of a student but must accept full responsibility for checked-out equipment and return it in the same condition as they were checked out.

This loaner program (especially for laptops) is NOT intended to support daily research operations for periods extending 3-4 weeks. Instead, faculty/researchers should use research or startup funds to purchase the necessary equipment to conduct their research experiments. Alternatively, feel free to check with CSC IT (via csc_help@ncsu.edu) about “spare” equipment/desktops that can be loaned for longer periods of time to support your research and/or teaching activities (subject to spare equipment availability).


Web Crawling

Web crawling may have the potential for disrupting the services of another web site, causing extra effort to deal with the invasion of your crawler or even creating a legal liability for NCSU.

Before researchers begin web crawling, they must submit the following form for approval:

Web Crawling Form

*For policies not addressed above, please refer to NCSU Computer Use Policies.