Resources

BME information technology policies, procedures and support

Overview

The Whitaker Biomedical Engineering Institute (WBMEI) owns and operates information systems equipment. These information systems include, but are not limited to systems providing calendaring, computational services, audio/visual systems, administrative and instructional labs systems. These services and systems are provided to WBMEI information systems account holders to use in support of the mission of the WBMEI. All computers and/or networked devices located in WBMEI space, whether owned by the WBMEI or not, are subject to these policies and procedures. All users of WBMEI information resources, including, but not limited to the WBMEI network, computing equipment, printers, etc, are subject to these policies and procedures to ensure the availability of these shared resources for all. Use of WBMEI information systems constitutes consent to these policies and those of the Johns Hopkins University and the Johns Hopkins Medical Institutions.

Description

  • The WBMEI Network
    • The WBMEI network is a subset of the JHU/JHMI network and exists on the infrastructure of the JHU/JHMI network. The Johns Hopkins University and the Johns Hopkins Medical Institutions collectively own the JHU/JHMI network — all cabling, switches, routers, wireless access points, etc. — that connect your personal computer, lab computers and BMEI systems to the Internet and one another. JHU/JHMI determines who is authorized to use its network and can limit the nature of use. WBMEI IT staff may make the same determination on segments of the JHU/JHMI network under WBMEI IT administration, if necessary. The WBMEI and JHU/JHMI networks are shared resources. Excessive use of these resources for purposes not directly related to the mission of the WBMEI or JHU/JHMI may result in suspension or discontinuation of the privilege to use these resources.

Policies and Procedures

  • Systems and Network Security
    • Physical security — cable locks, locking office doors, etc. — is the first line of defense against damage or theft of computing equipment and services. Users are responsible for the physical security of personal computers, WBMEI-, BME-, or University-owned equipment that is assigned to them. WBMEI IT staff will secure WBMEI- or BME-owned equipment only. The physical security of personal equipment is the sole responsibility of the owner. The WBMEI, Department of Biomedical Engineering, and University are not responsible for damage to, loss or theft of personal computing equipment.
    • If you connect your personal computer to the JHU/JHMI network, you are responsible for the security of your computer, the data on your computer and all resources accessible from your computer; not only because your resources and data may be at risk, but your unsecured computer may pose a risk to other computers, systems, and data on the JHU/JHMI network.
    • Any computer may be removed from the WBMEI and/or JHU/JHMI network(s) at any time without warning if, in the sole judgment of WBMEI IT staff and/or JHU Network Security, that computer poses a threat to any other WBMEI or JHU/JHMI systems or services. Any misuse of your computer through failure to properly safeguard your computer, or the resources on your computer, may result in your computer being denied access to the JHU/JHMI network at the discretion of JHU Network Security, and/or WBMEI IT staff.

      Examples of neglect include, but are not limited to, failure to:
      • Use a strong password
      • Limit access to your equipment
      • Use anti-virus software with up-to-date definitions
      • Keep your operating system up-to-date (including all necessary patches)
      • Keep application software up-to-date (including all necessary patches)
      • Turn off or delete unneeded software features or systems (such as web, mail, or remote-access services)
    • Peer-to-peer file-sharing software, while not strictly prohibited, is not encouraged since it seems the primary use of this software is to traffic in unlawful reproductions of copyrighted material. Any system using excessive bandwidth, or that is the source or destination of a large amount of traffic will be investigated and, if necessary, removed from the network until the condition is corrected.
    • Johns Hopkins University provides access to Symantec Anti-Virus Servers, and Microsoft Software Update Servers to help users manage anti-virus definitions and Microsoft operating systems patches and updates.

  • Confidential, Proprietary, Copyrighted and/or Licensed Material
    • WBMEI information systems users may have access to information that is confidential, proprietary, or protected by copyright or license. Users agree to actively protect such information from disclosure.
    • Unauthorized use of copyrighted or licensed material is a violation of Federal law and JHU/JHMI regulations. Any individual who reproduces copyrighted material in excess of fair use on any WBMEI system may be at risk for penalties of violating these laws and regulations.

  • Systems Maintenance
    • Regular systems maintenance is critical to ensure WBMEI core information systems are running properly. Any necessary scheduled maintenance will take place at the discretion of the Manager of Network and Computing Services, allowing for sufficient notice to affected staff, faculty and students.

  • Backups
    • WBMEI core information systems are backed up daily.
    • Labs and individual users are solely responsible for backing up lab and user systems.

  • IP addresses
    • All computers and networked devices will require an IP address to access most networked resources.
    • IP addresses are resources that belong to the Johns Hopkins University and the Johns Hopkins Medical Institutions. If a device with an incorrectly assigned IP address interferes with other systems, the offending device may be removed from the network with no notice.
    • Static IP addresses are reserved for host-class systems and for networked devices such as printers. A host-class system is defined as a system that provides a service or resource to a lab, center or department — i.e. mail, web, storage servers — that is professionally managed by a systems administrator. A systems administrator is one who, as a primary job function, manages computer systems on behalf another.
    • Dynamic IP address assignment is handled by the University's JHARS (Johns Hopkins Address Registration Service) system. This system requires you to have a valid JHED LID and a properly configured JHED entry. You simply plug your computer into an active Ethernet jack and point your web browser at any website and you will be presented with a short registration form. Upon completion of the form and a reboot, you should have a dynamically assigned address. Note that both JHARS and JHED are JH Enterprise Services and you will be directed to the JH Enterprise Help Desk to resolve problems with those services.
    • Static IP address assignment at the School of Medicine is also handled by the JHARS system. For a static IP address at Clark Hall on the Homewood Campus, please contact the BME Manager of Network and Computer Services directly.

  • Wireless networking
    • Johns Hopkins Enterprise Services manages the JH Enterprise wireless network, which has access points throughout WBMEI space at Clark Hall and BME space at the School of Medicine. The JH Enterprise wireless network is the only authorized wireless network provider. Any other wireless access points are unauthorized and subject to removal without notice. Wireless network setup differs by campus.
    • Once your wireless network adapter is configured for your location, you will be able to acquire a dynamic IP address as detailed above.

Physical security — cable locks, locking office doors, etc. — is the first line of defense against damage or theft of computing equipment and services. Users are responsible for the physical security of personal computers,