It is important that the personal and Trinity-owned devices that connect to the Trinity network are maintained appropriately in order to protect Trinity IT resources. As a service to the University Community, Trinity provides services related to these devices. The Device Management Policy provides guidelines for the responsibilities of the University and the device users.
The Device Management Policy applies to all users of the Trinity computing network. Use of the Trinity computing network constitutes the user’s acceptance of this policy.
Resident Computer Consultants
Resident Computer Consultants (RCCs) are students hired by Information Technology
Services to assist students with their network configuration and connection to the Trinity Netowrk. A student with connectivity issues may contact the Helpdesk x7409 or helpdesk [at] trinity.edu to receive assistance from an RCC. The following guidelines are provided for students administering and receiving computer and network related services.
RCCs are required to:
Students receiving computer assistance will:
Services are governed by the Student Computing Service Center. Please note that hardware removal or installation is not supported.
Reinstalling operating systems may be necessary if damage to the existing operating system occurs through virus infection, intrusion by a hacker, or spyware related programs, to name a few. A student may either have a Residential Computer Consultant (RCC) or Information Technology Services (ITS) technician reinstall the operating system for the fee listed above, or may choose to reinstall the operating system him or herself. Whether an RCC or ITS technician reinstalls the operating system or the student reinstalls the operating system, the student is responsible for backing up the data he or she wishes to keep. RCCs will not be responsible for backing up data. If a student chooses to have his or her operating system reinstalled by an RCC or ITS technician, the software and license must be legitimately owned by the student or licensed through the university.
RCCs or ITS technicians who reinstall an operating system will ensure that drivers to any hardware that was determined to be compatible with the software are installed and functioning correctly. RCC or ITS technician will also ensure that Symantec Anti-Virus software is installed and configured appropriately on the Windows/Mac machine before the project will be considered completed. Only with reinstallations of operating systems performed by an RCC or ITS technician will a student not be charged for the installation of Symantec Anti-Virus software.
Software installation refers to antivirus, Microsoft, or Mac software that is legitimately licensed to the student or licensed through Trinity University for student use. Examples include Microsoft Office products, BitDefender. Trinity University technicians or RCCs will not install other types of software such as games, AIM, or BitTorrent clients.
Virus, Spyware, and Adware Removal is required when malicious code and spyware is present in computers which can dramatically affect a computer’s performance and compromise network security. Such code includes viruses, worms, and spyware. For more, please read our Computer Security guide.
While some malicious code can be removed without also installing software, the removal of spyware will require software to be installed on the computer in question and configured properly for effective cleaning. Trinity cannot guarantee a student’s machine will function normally after the computer has been cleaned and cannot be held liable for the loss of intellectual data or integrity of the computer’s operating system. If the computer is experiencing residual effects after the malicious code has been removed, the computer’s operating system may have to be reinstalled. If the student’s operating system is functioning abnormally, the student will be encouraged to reinstall it or have an RCC or ITS technician reinstall it.
RCCs will attempt to resolve software related issues. However, depending on the degree of damage sustained to a computer’s operating system by malicious code or a file corruption, there may be residual effects that inhibit application features or reduce system performance. RCCs and Trinity University cannot be held liable either for virus infections or how the operating system responds to the removal. Additionally, based on a student’s Internet surfing and computing habits, there may be a propensity for the issues that have been resolved to re-occur. If an RCC has to remove a virus or spyware problem again, the situation will be treated as a separate work order with the appropriate fees charged to the student.
Port Deactivation and Reactivation can occur for, but is not limited to, a violation of the Technology and Information Responsible Use policy. One of the main reasons that a port may be disabled would be if the Information Technology Services Department determines that a student’s PC is infected with malicious code. The port to that machine will be turned off until that machine has been cleaned. The computer can be cleaned by an RCC, a technician from the University’s ITS department, or by an outside source. If someone other than Trinity personnel cleaned the system, that computer must be inspected by a Trinity representative prior to accessing or connecting it to the Trinity Network. Port deactivation may also occur for violations of copyright as in the illegal downloading of music, games, movies and other such media.
Trinity University provides all students with the software and instructions necessary to perform an installation of supported and university provided software. These materials can be found at the Circulation Desk located on the third floor, main entrance level, of the Elizabeth Huth Coates Library. Before installing such software, the person conducting the installation should:
Security vulnerabilities are inherent in computing systems and applications. These flaws allow the development and propagation of malicious software which can disrupt normal business operations in addition to placing university data at risk. In order to effectively mitigate this risk, software “patches” are regularly made available to remove a given security vulnerability.
Given the large number of computer workstations and servers that comprise the Trinity University network, it is necessary to utilize a comprehensive patch management solution that can effectively distribute security patches automatically when they are made available. The patch management solution has the ability to evaluate individual computer workstations and servers for vulnerabilities. Patches may then be automatically installed and, when necessary, the affected machine rebooted.
Effective security is a team effort involving the participation and support of every Trinity University employee and affiliate who is a user of the Trinity University computer network. The “patches” involve software that may be applied to all equipment that is owned or leased by Trinity University such as all electronic devices, servers, application software, computers, peripherals, routers, and switches.
In the event that a critical or security patch cannot be centrally deployed by ITS, it must be installed in a timely manner using the best resources available. In the case of non- Microsoft desktop operating systems where a centralized deployment is not available, then installation should occur in a timely manner by a member of User Support Services or Network, Security, and System Services personnel or the end user.
Failure to properly configure new workstations is a violation of this policy. Disabling, circumventing or tampering with patch management protections and/or software constitutes a violation of policy.
Employees may be given the opportunity to purchase a cell phone through a Trinity University account or with Trinity University funds. Cell phones purchased with a Trinity Account should be approved by ITS prior to purchase. ITS will be unable to support unapproved cell phones. (Any cell phone, including Android, Blackberry, and iPhone, supported by AT&T will likely be supported by ITS.)
The following guidelines outline the employee cellphone purchase process:
The following guidelines detail how to switch from a current provider:
Cell phones and cell phone equipment purchased through Trinity University accounts or with Trinity University funds that have been replaced and or are no longer in use should be sent to Trinity Information Technology Services (ITS) for proper disposal. Before cell phones are turned over to ITS for disposal, a reasonable attempt should be made to delete and erase all information from the phone. ITS will then wipe clean the memory of the phone again before properly disposing of it.
ITS will make every effort to inform the Trinity community of discretionary changes that substantially affect their devices and service well ahead of time. Examples include migration to a new email service or introduction of major new services. Occasionally, it may become necessary to interrupt network or system services for routine maintenance, installation of software upgrades, repairs, etc. These events are planned in advance. ITS will work to alert members of the community to these impending events through multiple communication venues. Announcement of pending changes will be made through emails and via appropriate listservs. Training and documentation, as needed, will be available at or ahead of the time for the change.
Unfortunately, unexpected system outages do occur, in which one or more file servers, email services or some portion of the network becomes unavailable without warning. ITS will provide timely information whenever possible when these instances occur through emails from its-announcement [at] trinity.edu.
Patch – A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance.
Patch management – The process of using a strategy and plan of what patches should be applied to which systems at a specified time.
Port de-activation – A security function ensuring that no unwanted devices are connected to the network.
Any behavior in violation of this policy is cause for disciplinary action. Violations will be adjudicated, as appropriate, by the CIO, the Office of the Dean of Students, the Office of Housing and Residential Life, and/or the Office of Human Resources. Sanctions as a result of violations of this policy may result in, but are not limited to, any or all of the following:
Reports of non-compliance with this policy should be reported to: infosec [at] trinity.edu