Educause Security Discussion mailing list archives

Re: Securing common access computers


From: Patrick Goggins <pgoggins () CARROLLU EDU>
Date: Wed, 24 Mar 2010 11:45:50 -0500

The only place we have laptops in that particular configuration is within the library. The laptops and power cords are 
treated like library books in which each student goes through the checkout and return process with the library. All 
equipment has mag strips to trigger the alarm for the library if they attempt to leave with it and cameras are in place 
in the event there is a discrepancy between the person who checked out the laptop and the person who took the laptop. 
All users must provide their own login credentials to be able to use the systems. Users are restrict execute anything 
they want as long as it does not require elevated permissions or violate the AUP.

Patrick Goggins
Network Administrator
Carroll University

From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Witmer, 
Robert
Sent: Wednesday, March 24, 2010 11:09 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Securing common access computers

Even though we require every student to have a laptop computer, historically our organization has provided personal 
computers in common areas around main campus/remote campuses for students to access specialized software, print papers, 
access email or their student accounts, etc.   I'm wondering how other organizations are securing their common access 
computers located in pc labs, library, etc.  Specifically, from a hardware point of view, does someone inventory every 
device for hardware key loggers/recording devices?  Do you require users to log into the machine for accountability?  
Do you restrict users from executing programs other than those you've loaded on the pc?

Thanks,
Bob


Please consider the environment before printing this e-mail.

Current thread: