Information, Technology & Consulting

Knowledge Base Search

KB - Search Helper Text

Use the search box to look for specific articles, or use the topic filters to display results that are relevant to a particular subject. Use the "clear filters" button to reset all search terms and filters.

Use the search box to query for articles in the Knowledge Base, or use the categories on the left to narrow down what results you are interested in.

The search found 29 results in 0.017 seconds.

Search results

    Guide to Ethical and Legal Use of Software

    Details

    Communications Assistance for Law Enforcement Act (CALEA)

    Details

    The Communications Assistance for Law Enforcement Act (CALEA) was enacted in 1994 "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes." It required telecommunications carriers to be able to carry out wiretaps when presented with a subpoena from a law enforcement agency. When it was passed, it applied only to telephone calls and the interception of fax services, specifically exempting online services such as email.

    Acceptable Use Policy

    Details

    Users of Dartmouth College IT resources agree to NOT:

    Copying Software

    Details

    Although the following was written quite some time ago, the underlining theme is even more hard-hitting today. The statements below not only apply to software, but in today's electronic world, serious penalties for copyright infringement carry over to music, movies, television shows and even electronic images.

    Consider the points made and take the necessary measures to adjust your use of software, electronic music, DVDs, images, movies, TV shows, etc.

    Top 10 Reasons for Illegally Copying Software (And Why None of Them Is Good Enough).

    Implications of a Dartmouth Account

    Details

    KeyServer Mission and Purpose

    Details

    Information Security Representatives (ISR) by Department

    Details

    The following individuals have been designated as the ISR for their department:

    Information, Technology & Consulting
    Steve Nyman

    Dartmouth Environmental Health and Safety
    Molly Rhoad

    Dartmouth Medical School
    Brian Dellinger
    Mark Carey

    Human Resources
    Linda Langley

    Network Policies

    Details

    Wireless Access Points

    Junk Email (Spam) Policy

    Details

    "Spam" is Internet slang for junk email. Some advertisers use spam email as a way of sending their marketing materials to large numbers of recipients without having to pay printing and mailing costs.

    Obtaining a Dartmouth account

    Details

    Members of the Dartmouth community must have an account to access many of the available technology resources.

    For faculty, students and staff, as soon as you become affiliated with Dartmouth, an account is automatically created for you in our identity management system (name directory). When your account is created, your NetID is automatically emailed to your personal email address. Your Dartmouth account allows you access to many resources, such as email, Library resources, and site-licensed software.

Pages

Close
Information, Technology & Consulting