This information will cover five (5) areas. They are:
1. Campus Network
2. Resources Available
4. Your Responsibility
5. Technology Support
The University of Arkansas - Fort Smith campus network is connected by fiber optics. The fiber optic backbone connects all buildings to the network. The network consists of several different resources, which are tied together within the fiber optic network. Each resource has a unique name, which will be important to you in determining your destination. Other resources can be added to the network if needed. The requirements of your job will determine what resource(s) you will need to be able to access.
There are about 1800 PC's connected to the campus network. Some of them are called servers. From an individual PC you cannot target another PC as a resource, but you can get to the servers. An example of a server is the servers that handle LionsLink.
For our protection, both on and off the campus, there is a firewall system.
The servers and network systems are maintained by the Academic Computer Support staff and the MIS Telecommunications staff.
One of the most widely used resources is the Internet. This is our connection to the world. It allows you to send email to anyone with an email account anywhere in the world. It also allows you to tap into information sources from all over the world. You can receive information on any subject in which you might be interested, be it personal or related to your occupation. This is possible through a machine that is somewhat like a personal PC, called a router. The router is connected to our network and allows the user, using the telephone lines, to access other network systems.
The library system is available via the web, as is LionsLink, the campus email system.
Another one of the most widely used hosts is the IBM RS/6000 computer. It is where the Banner system resides with the host name of alpha. This is where the data for students, student financial aid, payroll, finance, fixed assets, human resources and University of Arkansas - Fort Smith Foundation is located.
With all of the flexibility these resources offer comes responsibility. This is where the issue of security comes into the picture. Security is a very important and vital issue at UA Fort Smith. While it is a burden, it is very important that we are extremely careful with our security for the network.
If we are not careful with security, anyone in the world could access the network, thus having access to the personal records for the students and staff on the IBM RS/6000, and also to your email files.
There are federal laws that govern the use of these personal records. One is the Buckley amendment, which deals with student records. It says that we as a college can provide data on an individual student to employees who have a need for that information, but nobody else. For example, if a parent of a student who is 18 years of age calls and requests their child's grades, we are not allowed to give that information to the parent. The student is to be contacted and if they want their parent to have the information, they can do so.
Another law is the Family Educational Right and Privacy Act, known as FERPA. Should someone call on campus and request to speak to a student, you are not to go get the student to talk on the phone. You should tell the person that you will try to let the student know the person wishes to speak with them and then end the conversation. If you can contact the student, do so and give them the message and they can decide whether to contact the caller.
Access to the Banner system data records is defined according to your job. Your supervisor will request the access they feel you need to perform your duties and if approved, then you will be given access to those data records.
The logon codes consist of a user ID and a password. The user ID is the first initial of the first name and up to seven characters of the last name. The password is a string of characters randomly assigned by the program. This password will need to be changed once you log in the first time. To ensure security of the password some suggestions in selecting a password are:
Some examples of good passwords are:
| Use a string of letters and numbers (beginning with a letter and no special characters). |
| Do not use a name of someone such as your child, spouse, significant other, license plate number, etc. |
Your Windows and LionsLink password will expire every 90 days and must be changed in LionsPass. After you create a new password in LionsPass, it is advised that you change the passwords for any other application you use that requires a password.
You are responsible for your password. You will be responsible for that logon code and the information that is added to the database or changed with the use of that user ID. When you enter information into the database, that information is tagged with your user ID. This enables us to be able to identify what user ID made changes to each record. We cannot tell what individual made the changes, only what user ID was used to make the changes.
You are responsible for any emails sent with your user ID.
You should not let someone else use your logon to access a computer or a software application. Some suggestions to guard your password are:
Do not leave your PC logged on if you are going to be gone for an extended period of time or at the end of your work shift. If you feel that someone has used your password, you need to change your password and report your suspicion to Technology Support. Click ChangePassword? for instructions on changing passwords. If you use a screen saver, you should turn on the password protection option.
The bottom line is - YOU are responsible for any changes to information or sent emails that show your user ID.
Part of working at UA Fort Smith involves being part of the Neighborhood Watch. In order to have a working campus that is useful for the students and staff, all of our resources need to be available and in place. Be observant when you are out or at your workstation. If you notice someone removing a computer and you do not recognize the person as part of the University staff, ask them for identification. The ACS staff moves computers constantly and should be willing to identify themselves. If you notice that a computer is missing, ask about it. If no one around you knows where the equipment is, contact Technology Support and see if they know where the computer might be. If you see any suspicious behavior, report it immediately to your supervisor or Security.
| Should you need to write your password down, place it in a secure location that only you will know. |
| Do not hang it on your monitor, or tape it under your keyboard. |
| Do not share your password with anyone else. This includes family, friends, co-workers, etc. |
| Take care when logging in if people are standing over you. |
The first step in solving the above problems is to contact Technology Support. You can do this by either calling 788-7460, sending an email to email@example.com, or go to Technology Support web site and send an online Technology Support request.
Be specific in the details of your problem. If the equipment is assigned to you, tell the operator your name. If the equipment is a lab setup or not assigned to a specific person, give the operator either the assigned name of the equipment from the USER tag or the UA Fort Smith equipment tag number. Click ReportProblems? to report a problem via Technology Support information web site.
While the Technology Support operator may not be able to solve your problem, they will record the problem and route it to the appropriate persons.
In summary, the campus network provides many resources for your use and to assist you in performing your job. Protect yourself by keeping your logon information secure and not sharing it with anyone. If you have a problem or question, call Technology Support. Be observant and security conscious to protect yourself and UA Fort Smith.
- Are you having problems with your computer hardware (CPU, printer, monitor, etc), for example the monitor will not power on?
- Are you having problems with your computer software (applications you use with the computer hardware), for example you are unable to access Banner?
- Are you having problems with your telephone, for example, no dial tone.
- Do you need information about the software on your computer?
- Have you forgotten your password?