A-to-Z Index

Computing Homepage

Information Technology Help Desk

Mon -Thu: 8:00am -9:00 pm
Friday: 8:00am - 5:00pm
Saturday: Closed
Sunday: 3:00pm - 9:00pm

(when classes are in session)

Exceptions for the year


Information SecuritY


General Requirements for All Network Connected Devices

These apply to all clients, servers, access methods, and access paths.

Single-user Computers

  • Each single-user computer will have a designated operator responsible for the operation of the computer. That operator will be responsible for the following:
    • Registering the computer and ensuring the registration data is kept up to date.
    • Ensuring University provided anti-virus protection software is installed and operating.
    • Following university procedures concerning computer updates at least once a month.
    • Investigating and correcting vulnerabilities reported to them by JMU IT in a timely manner.
    • Abiding by the university's policy regarding Appropriate Use of Information Technology Resources (AUP; JMU Policy 1207).
    • Selecting strong passwords, as defined by the campus RUNSAFE guidelines, for all server accounts accessed from the computer.
    • Selecting and using client software that provides encrypted communications whenever it is an available and practical choice.
    • Using care in choosing software to run on their computer paying particular attention to email attachments, software from unofficial vendor distribution sites, and software whose author is unknown or untrusted.
    • Computers offering shell accounts giving interactive, programmable control of the computer through programs like telnet, ssh, X-Windows, and PC-Anywhere shall provide an individual account for each remote user.
    • Any server (including personal web servers, Microsoft file shares, and Appleshares) that provide access to confidential, sensitive, or critical data must protect such data with strong passwords as defined in the campus RUNSAFE guidelines. People providing such services are cautioned that incorrectly implementing the service could quickly lead to total compromise of the machine and related data. Best practices should always be followed when installing, configuring, and operating such servers.
    • Reporting computer abuse to abuse@jmu.edu and cooperating with the JMU Computer Incident Response Team in the investigation of such incidents.

Shared Computers and Servers

  • Shared computers and computers whose primary function is to act as a server will have an individual designated as responsible for the administration of the computer. The administrator will be responsible for the following:
    • Registering the computer and ensuring the registration data is kept up to date.
    • Ensuring University provided anti-virus protection software is installed and operating.
    • Following university procedures concerning computer updates at least once a month.
    • Investigating and correcting vulnerabilities reported to them by JMU IT in a timely manner.
    • For non-public, university-owned servers, implement any user level authentication and authorization mechanism provided by the server. In other words, at a minimum require userIDs and passwords to access non-public files, information, or services.
    • Abiding by the university's policy regarding Appropriate Use of Information Technology Resources (AUP; JMU Policy 1207).
    • Abiding by the AUP and to ensure that any persons having shell accounts on the server, whether university-owned or not, abide by the AUP
    • Selecting and using client software that provides encrypted communications whenever it is an available and practical choice.
    • Using care in choosing software to run on their computer paying particular attention to email attachments, software from unofficial vendor distribution sites, and software whose author is unknown or untrusted.
    • Reporting computer abuse to abuse@jmu.edu and cooperate with the JMU Computer Incident Response Team in the investigation of such incidents.
    • Computers offering shell accounts giving interactive, programmable control of the computer through programs like telnet, ssh, X-Windows, and PC-Anywhere shall provide an individual account for each remote user.
    • Servers offering the ability for anonymous persons to upload data must be configured so the uploaded data is not available to other clients until it can be verified that:
      • Other clients are not exposed to hostile software such as viruses
      • The data does not consist of illegal materials such as child pornography or unauthorized copyrighted material.

This is to protect the operator of the server, other clients, and the university (if it is a university owned system) from being exposed to hostile software and the liability associated with harboring illegal materials.

In addition, if anonymous persons can overwrite or modify existing files, users of the service must be warned that the integrity of any files they store on the service and any files they download from the service cannot be guaranteed.