Network Monitoring Policy

All TCDN/CUDN users must be aware of the following:

  1. Files kept on public machines are not regarded as private.
  2. The TCDN/CUDN is regularly monitored to for the purpose of maintaing the network and investigating problems. This data may also be recorded for the purposes of accounting and/or statistical analysis, whether for the production of historical reports or for load prediction relating to the network.
  3. The Trinity IT Office has the right to perform regular monitoring, scanning, and probing to detect problems and to take remedial action as a result. The criteria for taking remedial action will be based on any one or more of the following:
    • The result of regular monitoring of the volume of network traffic and other factors that may have an impact on network performance and reliability.
    • As requested by the University Information Service or the Chair of the Trinity College IT Committee.
    • Receiving a complaint from an individual or organisation.
    • The result of scanning the Trinity servers for viruses and other malware.
    • The result of scanning the Trinity servers for software that may pose a security risk to the network and/or other network users.
    • The result of authorised network vulnerability scans
  4. Action(s) taken as a result of monitoring, scanning, and probing could be any one or more of the following:
    • Gaining physical access to the equipment.
    • Disabling the network connection associated with the equipment.
    • Disabling the user’s network account(s)
    • Notifying the user of a problem and requesting certain actions to be taken within a stated period of time.
    • Further analysis of the source of network traffic to determine the nature of the suspected problem (e.g. high volume of network traffic being caused by file sharing programs and associated copyright infringement).
    • Deleting, removing, and cleaning of files on the Trinity servers.
    • Sharing network information with the College network technology suppliers
  5. The Trinity IT Officers are held responsible for the following:
    • Respecting the privacy and security of any information not intended for public dissemination that becomes known to them by any means, deliberate or accidental.
    • Ensuring that information gathered only includes what is necessary for the purposes stated.
    • Accessing users’ files and examining network traffic only if necessary in pursuit of their role as System Administrators. They must endeavour to avoid explicitly examining the contents of users’ files without proper authorisation.
    • Ensuring that information is only held for as long as it is necessary for the purposes stated.
    • Upholding strict confidentiality of personal information that they may come across while performing their duties (e.g. restoring files from back-up tape, providing user requested – hands-on support, etc.).

If a user believes that the Trinity IT Department is behaving unreasonably in the exercise of the rights listed in this document, they may report this to the Chairman of the IT Committee or the Junior Bursar.