Below are the various University, Penn Law, and ITS policies that govern our activities when using networks and services. If you have any questions regarding these policies, please contact us at email@example.com.
Network Drive Backups
Our network drives (G, U, and others) are backed up hourly and the backups are retained for 5 weeks. Please note that we will not be able to restore files that have been deleted once 5 weeks has passed.
U Drive Quota
All faculty and staff will have access to their U drive when they log into lab, classroom, or office PCs in the Law School. Clinical students will have access to their U drive when they login to clinic lab machines. The U drive quota is 10 GB. Please do not store personal music, pictures, or videos on the U Drive.
Audio & Video Recording Data Retention Schedule
Only the past 2 years of audio & video recordings will be kept online. Every January, ITS archives the oldest year’s worth of data so there is only 2 years of course data online. For example, in January 2015, ITS will archive recordings from Spring 2012 and Fall 2012, leaving data from Spring 2013 to Fall 2014 online.
Once archived, please email firstname.lastname@example.org to retrieve the data for review or deletion. Because the data is stored offline, it may take up to 48 hours to retrieve data from the archive.
Students’ Use of Personal Electronic Resources in Classrooms
The use of personal computers, mobile phones, and similar personal electronic resources in classrooms should be limited to activity directly related to course content and note-taking as directed or permitted by the instructor. Use of electronic resources for other purposes (e.g., browsing the Internet, playing games, using e-mail services, watching movies or listening to music, etc.) is inappropriate to the classroom and may provide a significant and unwanted distraction to those near the student using these devices. (From the Student Digest of Policies and Procedures)
Remote Computing Responsibilities
Staff and Faculty who connect to Penn Law servers or access data remotely have special responsibilities. Anyone who uses a remote system to access sensitive data or to access their office computer via Remote Desktop must certify their system (Windows and Mac). We recommend all home computers that connect to Law School servers be certified and have encrypted hard drives.
Please make sure you follow the best practices for remote computing.
- Don’t use email to transport sensitive data.
- Don’t store sensitive data on your personal or any remote device, including USB Keys or PDAs.
- All Penn data should be stored on the server because it is backed-up and monitored for security.
- Any locally stored data should use encrypted hard drives.
- Use your department’s SharePoint Only site to access data remotely.
- Use strong, complex passwords and password-protected screensaver.
- Don’t save passwords.
- Logoff of password protected websites and close all open browser windows when you’re done.
- Avoid the use of free wireless access points, kiosk computers, or computer workstations in public places (e.g., Internet cafes). Never use them to login to Remote Desktop or to access systems which contain sensitive data.
File Sharing Responsibilities
- Share sensitive data only via G: drive, SharePoint or SecureShare.
- Share non-sensitive data via SendFile or Penn+Box.
- Contact ITSHelp if you need to share sensitive data with external, non-PennKey recipients.
Law School Policies
Course Recordings & Copyright Policy
Course materials posted to Canvas are for the sole use of students enrolled in that class and cannot be copied, re-posted, shared, or otherwise used for any other purpose.
Course instructors will have access to basic information regarding student activity in Canvas. This includes whether you are currently logged in and from what IP address as well as the last date/time you logged in.
Please also read: The Fine Print
- Acceptable Use Policy
- University Computing Policies
- Penn Privacy Policies
- Protecting Confidential Data
- Cloud Computing Services Policy
- Computer Security Policy
- General University Policies