You are logged out -> Log in

ITS Staff Data Security

The ITS staff should not give out any information to anybody upon request without an official permission from the AVP for ITS and that includes any link between tables in various databases.
The ITS staff are responsible for the:

  • Confidentiality of the information: (protecting information from unauthorized use)
  • Integrity of the information: (protecting information from unauthorized changes, updates and make sure that the information is accurate and complete)
  • Availability of the information: (make sure that the information is available when needed)

Note:

  • Any financial information requested by anyone must have the approval of the finance office head
  • Any information about students requested by anyone must have the approval of the registrar’s office head
  • Any information related to Admission  and Teacher evaluation requested by anyone must have the approval of the Academic office head

Upon unauthorized use or leak of data:
An official clarification must be submitted from the person held responsible to the Computer Center Supervisor within 24 Hours
The Computer Center Supervisor has the authority to take any measures to insure the integrity of the data

Standard Operating System / Software

Following are the standard operating systems and software to be installed on all BU computers connected to our network. Any computer found to violate this policy will be disconnected from the network until the standards are met.

Operating systems :

  • Windows XP Pro SP3 - In the process of replacement
  • Windows 7 Ultimate
  • For servers: Windows 2003, 2008 , 2012 server, CentOS Linux, Novell (4 or 5)

Antivirus & Anti Spywares:

  • All computers Must have Kaspersky Antivirus 6 for Windows Workstations MP4

Word Processing / Spreadsheets / Database:

  • Microsoft Office Professional Plus 2010

Internet Browsers:

  • Internet Explorer, Firefox

Software that are NOT allowed for any reason:

  • Peer-to-Peer software (such as: Kaza, Imesh, e-donkey, ….) or any software that affects the internet line speed.
  • Proxy and firewall bypass (such as: hopster, ...)
  • Games
  • Yahoo or MSN Messengers or Toolbars or Skype.
  • Screensavers software
  • Any software that downloads huge amounts of data (such as: Google Earth, Secondlife,....)
  • And any other software that is not work related.
  • YouTube is not allowed in offices. In case there is a need for academic use, the supervisor should put in writing the reason. The computer center will give access for that person. The computer center has the right to block YouTube on that person , if there is a huge amount of download. 

Network User Account Policy

PURPOSE:

To establish conditions for use of, and requirements for appropriate security for University Computer and Network Resources.

SCOPE:

This policy is effective at all University locations and applies to all system users at any location, including those using privately owned computers or systems to access University Computer and Network Resources. This policy represents the minimum requirements that must be in place. This policy is not intended to inhibit access to information services that University employees and students have made accessible for public inquiry. However, use of such services to access or attempt to access information not intended for public display or use, or to circumvent or violate the responsibilities of system users or system administrators as defined in this policy, is prohibited 

Policy:

The following paragraphs explain the use of your Netware account on any file server administered by the Computer Center at Bethlehem University. The term “User” refers to any individual who requests and is assigned an account in the Netware environment administered by the Network Services Dept.

  • By using your account, you confirm reading, understanding and obeying all regulations and Policies written in the "Computer Use Policy" booklet. You should also obey all system messages and instructions of.
  • User accounts are issued to Faculty and Staff members requesting such accounts. Accounts will be issued to all students registered for the current semester. Others accounts will be issued under certain conditions. No general use accounts will be created for use by multiple Users. Every User, including Student Workers, is to receive his/her own account.
  • You must protect your account and system from unauthorized use. You are responsible for all activities on your account or that originate from your system. Your account and password act together as your electronic signature.
  • You must access only information that is your own, that is publicly available, or to which you have been given authorized access
  • Don't use another person's account, system, files, or data without permission (note that permission from an individual user may not be sufficient - some systems may require additional authority).
  • Accounts will be periodically reviewed by Computer Center and accounts with a period of inactivity greater than one (1) year will be removed.
  • Select a good choice for a password not less than six characters and keep it secure. It is recommended to change it periodically.
  • Report any system security violation (or suspected system security violation) or any behavior that is contrary to the guidelines described in this document to Computer Center.
  • Attempting to gain access to other users accounts and computers, or attempting to hack the university network or servers is strictly prohibited. Any violators of this rule will be severely punished (see Penalties).
  • Users are responsible for protecting their own files or data (from reading by others) using whatever protection mechanisms that are offered by the operating system in use.
  • Operate Computer equipments responsibly. Do not cause damage to equipment and try to prevent damage, if possible. Please report any damaged or malfunctioning equipment immediately to Computer Center. During off-hours and in cases of emergency conditions, such as water leaks or fire, contact Campus Security and attempt to send e-mail warnings, if possible.
  • Above all, be responsible at all times for using the BU Systems in a manner that is ethical, legal and not to the detriment of others.
  • In general, learn how to use the computing facilities effectively.

Disk Space Policy

BU has over 3500 users on its system. Each user has a limited quota that is enforced by the server. When you exceed your limit you will not be able to save files or receive email messages. And in some cases your email inbox might become corrupted, which might cause the loose of old email messages.

Disk Usage and File Restore Policies

  • If a server is running out of space,
    • we will look for files that are clearly non-academic related.
    • We will check the largest home directories first.
  • We do not restore files for users. You should archive/backup your files on zip tapes, CDs or other media on your own.
  • You may be asked at any time to remove files to reduce your disk space usage until you are back under your quota. Files will be deleted by the Computer Center staff if you do not comply.
  • For course accounts, teaching accounts, or research accounts, an instructor, owner, or supervisor (if the instructor or owner is a student) can request a particular disk allocation.
  • The Computer Center may delete files to get your quota down to the minimum limit during an emergency WITHOUT WARNING.
  •  Large quantities of saved email are also not allowed and may be deleted.
  • Storing photos, pictures, software and big files are not allowed on your home drive H: at all times, unless it's academic work related.

 

Email and Internet Access Policy

Purpose

The Internet and E-Mail as well as computer facilities in general are important resources that the University makes available to faculty, staff, and students with the understanding that they are used for research, teaching and community services in agreement with the university mission and mandate. It is therefore the responsibility of the user to make appropriate use of these facilities.

Whatever the usage, the University expects the user to show that the use of these facilities is fully compatible with this guiding principle. In case of doubt it is for the user to prove that the facilities are used properly. Conversely the University has the right to establish that they are being misused.

Application & Scope

  • This policy applies to all usage of the University Internet and Electronic mail services.
  • All users should be aware of the policy, their responsibilities and legal obligations.
  • All users are required to comply with the policy and are bound by law to observe applicable statutory legislation.

Access to Internet/Email services

The University encourages the use of the Internet, including Email and Web Services, to facilitate communication among internal users and with the external community allowing users to better perform the duties assigned to them; and to allow greater efficiency in teaching, research, administrative and service functions.

To utilize the University's Internet and Email services it is necessary to have a user account. Such account can be obtained by contacting the Lab supervisor.

Electronic Mail Use Policy

Ownership

Electronic mail messages are part of the University's records of its work. They have the same status as any other written communication or record, and must be treated accordingly.

Email Quota System

Users have a limited quota for email and other files on our servers, therefore it's the user's responsibility to organize and delete unnecessary email messages, especially the ones with large attachments.

Confidentiality

Whilst the University seeks to preserve privacy and confidentiality in the provision of all IT Services, confidentiality of electronic mail cannot be assured.

Confidentiality may be compromised by unintended redistribution, or because of inadequacy of technologies to protect against unauthorized access. In addition, any confidentiality may be subordinate to the application of law or policy, including this policy.

As such, users should assume that the contents of electronic mail might be accessible to persons other than the recipient. Sensitive, libelous or abusive content should never be included in electronic mail.

Users should be aware that network and systems administrators, during the performance of their duties, need to observe the contents of certain data, on storage devices and in transit, to ensure proper functioning of the University's IT facilities. On these occasions they may inadvertently see the contents of email messages.

The University has a legitimate right to capture and inspect any data stored or transmitted on the University's IT facilities (regardless of data ownership), when investigating system problems or potential security violations, and to prevent, detect or minimize unacceptable behavior on that facility. This includes where maintaining system security and integrity including the management of unsolicited mail and virus protection.

Authentication and integrity

With current technology the University does not guarantee the authentication or integrity of an email. That is, it cannot guarantee that the sender is indeed the sender nor that the contents are as created by the apparent sender.

Unsolicited Mail

The University reserves the right to instigate measures to reduce the prevalence of unwanted or unsolicited email (SPAM) including blocking mail from known SPAM friendly sites.

Unacceptable Email use

•  Using electronic mail to harass others, send chain and junk mail (spam), disseminate mass mail without permission, or mail "bombs."

•  Email may not be used for commercial activities except in direct support of the Missions of the University.

•  Any harassment via email will be grounds for the removal of Email privilege.

•  Unauthorized use or forging of email header information or any TCP/IP packet header information..

•  Electronic mail must not be used to threaten or harass any person. A user must cease sending messages or interfering in any way with another user's normal use of email

•  Knowing or reckless distribution of unwanted mail or other messages is prohibited, specifically; chain letters and other schemes that may cause excessive network traffic or computing.

Removal of Account

University email accounts are only valid as long as the user is an employ of the University, or the user is a student in good standing with the University. University email accounts are audited periodically, and all non-valid student accounts are removed. Faculty and staff accounts are removed when a termination of employment notification is received from the personnel office.

Internet Use Policy

•  The Internet is a tremendous source of information made available to all BU staff, faculty, and students, which must be used for research, teaching and community services in agreement with the university educational mission. Therefore, the priority of using this facility is always for those who want to use it for its intended educational purpose, and not for entertainment or personal use.

•  The Internet is an unregulated information resource. The Bethlehem University does not in any way take responsibility for the content, accuracy or timeliness of information found on the Internet.

•  The existing International laws of copyright, privacy and decency govern access to and use of information on the Internet. Use of the Internet to access or transmit material that would violate any applicable law or regulation is prohibited.

•  Remember that you are using the Internet in a public facility. Although the university supports your right to freedom of access to all legally available information, there may be material on the Internet that is not appropriate for display in a public space. Therefore accessing adult or any other inappropriate web sites is extremely prohibited.

•  Files and software found on the Internet may be downloaded only to a floppy disk, never to the hard drive on a BU computer (refer to Downloading Files and Chatting Policy)

•  The University takes no responsibility for software or information downloaded from the Internet; Virus checking is the responsibility of the user.

•  Access to the Internet from within Bethlehem University must go through our proxy server ( proxy.bethlehem.edu Port: 3128 ). Accessing the Internet in any other way is prohibited.

•  The use of P-2-P and torrent (such as Imesh, Kaza, ..etc) applications are completely prohibited. Such applications are the main source of viruses and are the best way for hackers to hack other systems. Therefore, any PC found using such application will be blocked from accessing the internet.

Downloading Files and Chatting Policy

Due to the limited Internet connection speed available at BU, and in order to make the Internet available to as many users as possible with an acceptable speed; downloading files and using chatting sites (MSN, Yahoo, etc) have been limited to a specific period of time, and in a specific locations. Large files/software can be scheduled for downloading after working hours. To find out more information regarding time restrictions, locations, and how to schedule a file for downloading.

Podiums & LCD use in classs rooms

  • The teacher himself must take and return back the Podium’s key. Please don’t ask the students to open or close the Podiums.
  • The teacher is responsible about the equipments in the Podium.
  • The teacher must report any problem with the computer, monitor or LCD by sending a Computer Support Form.If there is a problem with the projector or sound system please notify Francis or George in the library building

IT Software Purchase and Development

IT software and applications are used to store and process important and confidential information that is used by various departments and offices.  IT software include locally hosted applications, as well as applications hosted o nthe loud by third party.All IT application purchases or development must go through the ITS office to make sure that there is no duplication of work, that most systems are integrated, and that the ITS office is able to provide the support to the new software.  Organizing and coordinating the purchase and development of new software is vital to ensure the proper function and business continuity of the various office and the University.To initiate the process of purchasing or developing a new application, kindly submit an IT Support Ticket with basic information including the business problem the new application will try to overcome, main functionalities to be included in the application, and information to be stored in the database.The ITS Office will evaluate the request and coordinate with other offices to secure the resources and funds, if any, to purchase or develop the software.

The ITS Office will prioritize the requests based on the scope of the request, who will benefit from the new application, and the available resources.  In case of developing new application, the ITS Office will provide a timeline for the development of the application based on the size of the work and the current plan and work load of the ITS Office. 

Software needed in the computer labs, Laptops and class Rooms

The computer center usually sends an email at the end of each semester reminding anyone who has a request for updating the software in the computer labs (Lab D-113, Lab S-306, and Füglister Lab, Education Lab B-008) and  Class rooms for the next semester therefore:

 

  1. Each department is required to provide the Computer Center with a list of any computer software needed to be utilized in the offered courses.
  2. It is the teacher responsibility to provide us with the software disc if it is not available at the computer center. 
  3. In case the registrar’s office didn’t assign a teacher for a course, it is the responsibility of the department to know what software is needed for that course.
  4. Due to technical reasons, the Computer Center reserves the right not to add any software requested after the deadline.
  5. The computer center must receive the software list before the deadline assigned on the request*.
  6. The computer center staff will try their best to deliver fully functional Computer Labs with all the requested software. However, it is the responsibility of the teacher to test the functionality of his/her own new added software on the day assigned by the computer center.

 

Faculty and Staff Policies

Faculty & Staff must not allow anyone (relatives and friends) to use office computers
Anyone violates this rule will receive an official written notice from the Computer Center Supervisor. If this violation continues:

  1. An official written notice will be sent to the supervisor
  2. Account will be temporary blocked until a clarification from the supervisor

Computer Support Form

To receive assistance from the Computer Center, you must fill the “Computer Support Form” available on the website.

Requests will be handled on first-come first-serve basis, or according to its urgency. The computer Center will not provide any service unless a Computer support form is submitted.

Don't call and come to the computer center for confirmation.

Wireless Policy

PURPOSE:

To allow University Employees to access the internet only through their personal laptops.

SCOPE:

This policy is effective at all University locations and applies to all system users at any location, including those using privately owned computers or systems to access University Computer and Network Resources. This policy represents the minimum requirements that must be in place. This policy is not intended to inhibit access to information services that University employees have made accessible for public inquiry. However, use of such services to access or attempt to access information not intended for public display or use, or to circumvent or violate the responsibilities of system users or system administrators as defined in this policy, is prohibited

Policy:

The wireless exists "as is" for personal equipment, we only provide wireless internet through our proxy server, any problems with personal equipment is not our problem, any problem with using a program on these personal equipment is not our problem, any software that does not use a proxy and can not access the internet through the wireless access points is not our problem.
For example we do not troubleshoot or support problems on Iphones, Ipads, cell phones, etc.....

 

Penalties

Penalties may include loss of access, either temporary or permanent, to BU computing systems and networks. In some cases where violators had attempted to change any system configuration or to access other's files or accounts, penalties may include suspension and/or dismissal from the University.

Any student caught attempting to compromise BU's network security or even trying to use any type of hacking software on campus will be referred to a disciplinary committee. The committee can take decisions ranging from suspension for few semesters to complete dismissal from the university

Bethlehem University Foundation
Email: brds@bufusa.org
Phone: +1-240-241-4381
Fax: +1-240-553-7691
Beltsville, MD USA
Bethlehem University in the Holy Land
E-mail: info@bethlehem.edu
Phone: +972-2-274-1241
Fax: +972-2-274-4440
Bethlehem, Palestine