a myriad of illegal activities can be conducted over your network's Port 80 (HTTP), and are traceable back at least to your address space or router address, and even an individual workstation IP and MAC address.
Around the time of the release of the film Matrix II, our domain technical and business contacts received a formal 'cease and desist' order from a film industry watchdog group, about a workstation on my network downloading bootleg copies. This was traceable down to a specific IP lease in the domain space. I quickly managed to locate that workstation, which was wired into the network by a staffer. This individual had previously (or regularly) visited a pirate video site on the laptop, and had a launch routine for this site as a startup routine. The industry group had installed a sniffer on the pirated site, and ID'd the laptop as soon as he powered up on my network. This has inspired strict policies about foreign computers being introduced unnecessarily to our secure domain space. New privacy laws are quite explicit about security requirements for wireless access, especially for potential unwarranted access to stored and transmitted personal information. Chuck Eisenhardt Boston Children's Museum -----Original Message----- From: mcn-l-bounces at mcn.edu [mailto:[email protected]] On Behalf Of Rich Cherry Sent: Thursday, January 28, 2010 1:56 PM To: Museum Computer Network Listserv Subject: Re: [MCN-L] Public Wi-Fi Both of the issues raised below can be managed with technology that is transparent to the user and thus reduces barriers to the wireless actually being useful to the visitor. Rich Cherry Director Balboa Park Online Collaborative A Project of the Benbough Operating Foundation 2131 Pan American Plz San Diego, CA 92101 B: (619) 819-8331 F: (619) 819-8230 rcherry at balboaparkonline.org -----Original Message----- From: mcn-l-bounces at mcn.edu [mailto:[email protected]] On Behalf Of Frank E. Thomson Sent: Thursday, January 28, 2010 10:43 AM To: Museum Computer Network Listserv Subject: Re: [MCN-L] Public Wi-Fi In this day and age it could be very important to have a terms of use agreement that people have to accept before they can use your service. Last month we had a case here locally where a man was going to motels and using their wi-fi to download child pornography. Obviously the terms of use did not stop him, but the motels could say that they did not allow this and contact the police. Also, how much bandwidth will you allot to this, if iphone and android phone users start using your wi-fi to make calls or run apps then that decreases the bandwidth available for other visitors and possibly staff. Also how long will people be able to use your service? I think it is a great program, but would definitely recommend working with someone about an agreement. Frank Thomson, Curator Asheville Art Museum PO Box 1717 Asheville, NC 28802 828.253.3227 fthomson at ashevilleart.org www.ashevilleart.org -----Original Message----- From: mcn-l-bounces at mcn.edu [mailto:[email protected]] On Behalf Of Rich Cherry Sent: Thursday, January 28, 2010 1:41 PM To: Museum Computer Network Listserv Subject: Re: [MCN-L] Public Wi-Fi I am sure the lawyers would disagree but I think it just makes it more complicated for a user... especially if they are using a non-web based interface like an iPhone app. -----Original Message----- From: mcn-l-bounces at mcn.edu [mailto:[email protected]] On Behalf Of John Bedard Sent: Thursday, January 28, 2010 9:59 AM To: mcn LISTSERV Subject: [MCN-L] Public Wi-Fi We are about to start installing wi-fi throughout out building and will be providing it free to visitors. I see that a lot of places like coffee shops that offer free wi-fi require a person to agree to terms of use before connecting. I would be interested in knowing whether or not you have a similar requirement for public use of your wi-fi. John R. Bedard | Director of Information Systems Minneapolis Institute of Arts 2400 Third Avenue South Minneapolis, MN 55404 612-870-3268 | JBedard at artsmia.org | www.artsmia.org _______________________________________________ You are currently subscribed to mcn-l, the listserv of the Museum Computer Network (http://www.mcn.edu) To post to this list, send messages to: mcn-l at mcn.edu To unsubscribe or change mcn-l delivery options visit: http://toronto.mediatrope.com/mailman/listinfo/mcn-l The MCN-L archives can be found at: http://toronto.mediatrope.com/pipermail/mcn-l/ _______________________________________________ You are currently subscribed to mcn-l, the listserv of the Museum Computer Network (http://www.mcn.edu) To post to this list, send messages to: mcn-l at mcn.edu To unsubscribe or change mcn-l delivery options visit: http://toronto.mediatrope.com/mailman/listinfo/mcn-l The MCN-L archives can be found at: http://toronto.mediatrope.com/pipermail/mcn-l/ _______________________________________________ You are currently subscribed to mcn-l, the listserv of the Museum Computer Network (http://www.mcn.edu) To post to this list, send messages to: mcn-l at mcn.edu To unsubscribe or change mcn-l delivery options visit: http://toronto.mediatrope.com/mailman/listinfo/mcn-l The MCN-L archives can be found at: http://toronto.mediatrope.com/pipermail/mcn-l/ _______________________________________________ You are currently subscribed to mcn-l, the listserv of the Museum Computer Network (http://www.mcn.edu) To post to this list, send messages to: mcn-l at mcn.edu To unsubscribe or change mcn-l delivery options visit: http://toronto.mediatrope.com/mailman/listinfo/mcn-l The MCN-L archives can be found at: http://toronto.mediatrope.com/pipermail/mcn-l/
