Institutional Policy

Don Bosco College has established systems and procedures for maintaining and utilizing physical, academic and support facilities. They provide guidance to members in a number of academic areas. The College has regular maintenance and periodic replenishment of essential facilities.
College policy is to have effective mechanism for the upkeep of the infrastructure and other facilities as to have optimum utilization of the facilities in order to have effective college functioning.



IT Policy


Acceptable Use


Computer Usage:
The purpose of Don Bosco College policies regarding computer and network usage is to protect all individuals affiliated with Goa University. Inappropriate use exposes the Don Bosco College to risks, including virus attacks, compromise of network systems and services, and possible legal liability.
Access to the information technology environment at Dom Bosco College is a privilege and must be treated as such by all users. Students are expected to be positive members of the college community, which extends to cyberspace, by following the Community Code and all University policies.
Users who violate any acceptable use policy will be subject to disciplinary action, up to and including loss of privileges and/or expulsion, and may be at risk for civil or criminal prosecution. All violations will be handled in accordance with Don Bosco College policies and procedures.
Following is a brief summary of relevant college policies regarding computer and network usage. All policies in their entirety can be found on the Don Bosco College.
Acceptable Use Policy: Don Bosco College information technology resources, including electronic communications on and off the Don Bosco College, Panjim campus and the computers attached to this network, are for the use of persons currently affiliated with Don Bosco College, including faculty, staff and students. Information technology resources are provided by the College to further the mission of lifelong education. Use of these resources should be consistent with this mission and this policy.
Central to appropriate and responsible use is the stipulation that computing resources shall be used in a manner consistent with the instructional, public service, research, and administrative objectives of the College. Use should also be consistent with the specific objectives of the project or task for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use and may jeopardize further access to services.
Unacceptable uses include, but are not limited to, the following:

  • Using the resources for any purpose that violates federal or state laws.

  • Using the resources for commercial purposes, sales and/or advertising.

  • Using excessive data storage or network bandwidth in such activities as propagating of “chain letters” or “broadcasting” inappropriate messages to lists or individuals or generally transferring unusually large or numerous files or messages.

  • Sending or storing for retrieval patently harassing, intimidating, or abusive material.

  • Misrepresenting your identity or affiliation in the use of information technology resources.

  • Using someone else’s identity and password for access to information technology resources or using the network to make unauthorized entry to other computational, information or communications devices or resources.

  • Attempting to evade, disable or “crack” password or other security provisions of systems on the network.

  • Reproducing and/or distributing copyrighted materials without appropriate authorization.

  • Copying or modifying files belonging to others or to the College without authorization
  • including altering data, introducing or propagating viruses or worms, or simply damaging files.
  • Interfering with or disrupting another information technology user’s work as well as the proper function of information processing and network services or equipment.

  • Intercepting or altering network packets.


Network Use Policy


Summary
To establish guidelines governing the use and connection of networking devices on the College Data Communications Network. This policy applies to all College networked devices, ranging from multi-user systems to single user personal computers. This includes networked printers, mini-hubs, routers, switches, and any other network communication devices, which are connected to the College network. The individual with primary responsibility is the Network Administrator and the back-up designee.
The College provides network access and capabilities through the Network Services Division of the College Information Technologies Department. The guidelines listed below are required in order to provide the College a reliable and stable networking platform.
Guidelines
All networking equipment connected to the Don Bosco College network must first be registered and approved by Network Services Division of the College Information Technologies Department. The responsible parties with problem network devices and/or services will be notified and expected to correct the problem in a timely manner. Any networked devices or services that degrade the quality for service on the network, will result in termination of network service to that device until the correction occurs. Activities, which interfere with the operation of the network, are prohibited. These include but are not limited to the propagation of computer worms, network sweeps, network probing, viruses, or Trojan horses.

Password Policy


Summary
The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change The individual with primary responsibility is the Network Administrator and the back-up designee.
Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Don Bosco Coolege entire network. Thus, all Don Bosco College employees are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
The scope of this policy includes faculty, staff and students who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Don Bosco College facility, has access to the Don Bosco College, Panjim network, or stores any non-public Don Bosco College, Panjim information.
All system-level passwords (e.g., root, enable, 2000 admin, application administration accounts, etc.) must be changed on at least a quarterly basis. All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least every six months. The recommended change interval is every four months. Passwords should never be inserted into email messages or other forms of electronic communication. All user-level and system-level passwords must conform to the guidelines described below.
Guidelines.
A. General Password Construction Guidelines
Passwords are used for various purposes at Don Bosco College. Some of the more common uses include: user level accounts, web accounts, email accounts, screen saver protection, voicemail password, and local switch logins. Since very few systems have support for one-time tokens, (i.e., dynamic passwords which are only used once), everyone should be aware of how to select strong passwords.
Poor, weak passwords have the following characteristics:

  • The password contains less than eight characters

  • The password is a word found in a dictionary (English or foreign)

  • The password is a common usage word such as: dog, desk, apple, etc.

  • Names of family, pets, friends, co-workers, fantasy characters, etc.

  • Computer terms and names, commands, sites, companies, hardware, software.

  • Birthdays and other personal information such as addresses and phone numbers.

  • Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.

  • Any of the above spelled backwards.

  • Any of the above preceded or followed by a digit (e.g., secret1, 1secret)


Strong passwords have the following characteristics that are required for all WWU users:

  • Contain both upper and lower case characters (e.g., a-z, A-Z)

  • Have digits and punctuation characters as well as letters e.g., 0-9, <>?,./">!@#$%^&*()_+|~-=\`{}[]:";'<

  • Are at least eight alphanumeric characters long.

  • Are not words in any language, slang, dialect, jargon, etc.

  • Are not based on personal information, names of family, etc.

  • Passwords should never be written down or stored on-line. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.


NOTE: Do not use either of these examples as passwords!
B. Use of Passwords and Pass phrases for Remote Access Users
Access to the Don Bosco College Networks via remote access is to be controlled using either a one-time password authentication or a public/private key system with a strong passphrase.
C. Pass phrases
Pass phrases are generally used for public/private key authentication. A public/private key system defines a mathematical relationship between the public key that is known by all, and the private key, that is known only to the user. Without the passphrase to "unlock" the private key, the user cannot gain access.
Pass phrases are not the same as passwords. A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words. Because of this, a passphrase is more secure against "dictionary attacks."
A good pass phrase is relatively long and contains a combination of upper and lowercase letters and numeric and punctuation characters. An example of a good passphrase: "The*?#>*@TrafficOnThe101Was*&#!#ThisMorning"
All of the rules above that apply to passwords apply to passphrases.
D. Enforcement
Violation of this policy will be handled in accordance with Don Bosco College policies and procedures.

Mailbox Management Policy


Summary
To establish guidelines for automatic removal of older mail items in the Inbox, Sent Items, Calendar, and Deleted Items folders. Automatic purging will maintain the client databases, limit disk space usage, and reduce possible corruption. Reasonable mailbox sizes are necessary to efficiently manage the College email system. Users exceeding limitations for more than 14 days will be notified by College Information Technologies. The individual with primary responsibility is the Network Administrator and the back-up designee.
Guidelines
The email system is set up so that the following purges are automatically implemented as follows:

  • Inbox - 180 days: The Inbox is the primary folder for all incoming mail items. Items that are older than 180 days will automatically be deleted. These items will be placed in the Deleted Items folder for up to seven days.

  • Calendar - 365 days: Appointments, Tasks, and Notes that are older than 365 days will automatically be deleted. These items will be placed in the Deleted Items folder for up to seven days as indicated below. Reoccurring appointments will only be removed from the calendar if they meet the 365-day criteria.

  • Deleted Items - 7 days: The items that are marked for deletion are placed in the Deleted Items folder for seven days. Afterward, the items will be automatically removed. These items cannot be restored easily; therefore, it is critical to mark only the items that need deleting.


*In order to maintain mail past the date limitations, users may establish automatic archiving to a specific directory on your personal computer or within another folder in your mailbox before the dates indicated above. Please reference HELP in the particular email client for assistance.

Email Policy


Summary
This policy covers appropriate use of any email sent from Don Bosco College email address and applied to all employees, vendors, and agents operating on behalf of Don Bosco College.
Guidelines
The Don Bosco College email system shall not to be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, disabilities, age, sexual orientation, religion, or national origin. Employees who receive any emails with this content from any Don Bosco College employee should report the matter to their supervisor immediately.
All email sent or received from a Don Bosco College, Panjim server must comply with the Acceptable Use Policy.
While it is our intent to maintain a creative and educational environment, please be aware that all equipment and functions related to the operations of the computer systems at Don Bosco are college owned. Please also be aware that no expectation of privacy should exist for any material stored on the computer network or computer equipment. Because College personnel are responsible for the maintenance and support of the computer systems, the College reserves the right to access equipment and material stored on any computer equipment or software programs at any time.
Violations of this policy will be handled in accordance with Don Bosco College policies and procedures.

File Sharing Policy


Summary
The purpose of this policy is to define Don Bosco College position on the sharing, distributing, or using illegal or unauthorized copies of software, music, video, and all other forms of piracy; digital or non-digital. The individual with primary responsibility is the Network Administrator and the back-up designee.
Guidelines
Providing or obtaining unauthorized copies of audio and visual works in either digital or nondigital format is not appropriate and may be illegal.
Any number of file-sharing applications, Kazaa or Morpheus for example, enables you to locate and download music, movies and video in digital format. Use of this type of software raises important issues regarding copyright law, network traffic and security.

Copyright Law


Copyright laws were enacted to protect the original expression of an idea, whether it is expressed in the form of music, art or written material. A number of rights are given copyright owners by cyber law. These rights include the right to control the reproduction, distribution and adaptation of their work, as well as the public performance or display of their work.
Don Bosco College takes a strong stand against unlawful distribution of copyrighted music, movies and software. If a student is found to be distributing copyrighted material using any college computing resources, that person’s network connection will be terminated and the student will be referred to the Office of Community Life. If the user* provides or obtains copyrighted files (music, videos, text, etc.) without permission from the copyright owner or their representative, the user* is in violation of federal and state copyright laws and the Don Bosco College Acceptable Use Policy.

Network Service


Transferring large movie or music files may overload the network and degrade services. Transferring large files can slow the network making it less responsive or even unavailable to users*. Excessive network traffic can be generated, adversely affecting performance for other users*. Don Bosco College routinely monitors network usage patterns. Interfering with the ability of others to use the network services violates College policy and may result in termination of access to the College network services, and other disciplinary action.
*User is defined as all faculty, staff and students.

Drop off Form


Drop-In computing user agreement
UIT will work with students to get computers connected to the campus network. We use a web based system, Trust Wave to protect our network from viruses and worms. Trust Wave will not let you on the campus network if you do not have an updated antivirus product.
These two steps will normally allow your computer to pass onto the campus network. If it does not, it generally means that one or more of the following are causing the problem:

  • Spyware infestation

  • Third-party software like AOL, Kazaa, Limewire etc.

  • Corrupt or illegal Windows installation

  • Hardware problem


If you bring your computer to the helpdesk, UIT will attempt to address some of these problems, but we cannot solve all of them. If you bring your computer to the helpdesk for us to work on, we may do any of the following:

  • Uninstall personal virus/security software – Norton, McAfee etc.

  • Uninstall personal Internet software – AOL, Netzero, Skype etc.

  • Uninstall other software that may cause spyware problems like file-sharing programs, torrent software etc.

  • Install spyware scanning software

  • Install virus detection software

  • Remove objectionable or problematic themes, wallpapers and screensavers.


In some cases, attempts to address these problems may cause corruption of the Windows operating system. If that is the case, the student will be responsible for addressing it. UIT is not
responsible for any software or hardware corruption these steps may cause. Often, the only solution in serious spyware infestations is to format and reinstall all software. UIT will NOT perform this task for any student. We recommend that any important files and software be backed up before bringing the computer to the helpdesk.

Copyright in the Classroom


Don Bosco College, Panjim follows the Fair Use provisions in India copyright law as determined by the Don Bosco College, Panjim copyright policy. UIT offers several training sessions a year to Don Bosco College, Panjim faculty, staff and students. If you would like someone to speak to your class or group on the topic, please contact us.

Fair Use


The Fair Use section of US Copyright Law allows the use of copyrighted materials for non-profit use if you consider the following conditions. The full statute is here.

  • The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

  • The nature of the copyrighted work;

  • The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

  • The effect of the use upon the potential market for or value of the copyrighted work.


The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.
Back to Top