This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
license_violation_procedures [2020/10/15 22:03] jmulvaney [Report account to OIT] |
license_violation_procedures [2025/08/20 17:42] (current) 172.24.102.139 [Lift block on IP] |
||
---|---|---|---|
Line 1: | Line 1: | ||
======License Violation Procedures====== | ======License Violation Procedures====== | ||
- | Violations are reported by vendors to us via eleres. The IP address and timestamp of violation are often noted. Sometimes a special string is sent by the vendor to the proxy server so you can find the offending time/IP/account in the proxy logs. The vendor will let you know what it is in their communication. | + | Violations are reported by vendors to us via email or to DBHelp. The IP address and timestamp of violation are often noted. Sometimes a vendor includes their logs containing the information. |
- | Our proxy server address is 128.119.168.112. | + | Our proxy server address is 128.119.201.53. This is the external IP address. |
- | - Identify the compromised account. | + | - Identify the compromised or offending account. |
- | - Temporarily block the IP. | + | - Temporarily block the IP address or user. |
- | - Report account to [[mailto: abuse@oit.umass.edu|abuse@oit.umass.edu]] | + | - Report account to [[mailto: abuse@umass.edu|abuse@umass.edu]] |
- Respond to vendor letting them know you have blocked and reported the account. | - Respond to vendor letting them know you have blocked and reported the account. | ||
- OIT will respond telling you they have reset the account's password. Once you have received this notification lift the block on the account. | - OIT will respond telling you they have reset the account's password. Once you have received this notification lift the block on the account. | ||
Line 30: | Line 30: | ||
- If using Putty, you can right click on header to copy screen to Clipboard | - If using Putty, you can right click on header to copy screen to Clipboard | ||
- Alternatively use psftp to ftp the entire logfile to your PC | - Alternatively use psftp to ftp the entire logfile to your PC | ||
+ | - Note that server logs are retained for one week, so we cannot identify misuse farther back than that. | ||
====Temporarily block IP==== | ====Temporarily block IP==== | ||
Line 52: | Line 53: | ||
====Report account to OIT==== | ====Report account to OIT==== | ||
- | ==EXAMPLE email reporting violations to abuse@oit.umass.edu with the subject line "Library proxy abuse." == | + | ==EXAMPLE email reporting violations to abuse@umass.edu with the subject line "Library proxy abuse." == |
We have identified a suspected abuse of a UMass NetID (below) going through the library proxy server. **Give some information about the IP addresses**. Can you please force a reset of their password? | We have identified a suspected abuse of a UMass NetID (below) going through the library proxy server. **Give some information about the IP addresses**. Can you please force a reset of their password? | ||
Line 61: | Line 62: | ||
We have identified the offending user id and placed a deny request in our proxy. Our University IT is forcing a reset of their password. Please lift any blocks against our IP address. | We have identified the offending user id and placed a deny request in our proxy. Our University IT is forcing a reset of their password. Please lift any blocks against our IP address. | ||
+ | |||
+ | ==NOTE: IT needs the following information to identify an on-campus user (when the traffic is coming from an on-campus IP address & not through the proxy server):== | ||
+ | You will need to ask the vendor for this information, as some vendors do not include all of it in the logs they send. | ||
+ | * The dates, times the incident took place, and the timezone of this date & time information. | ||
+ | * The campus IP address the mis-use was coming from. | ||
+ | * The vendor's IP address and network port of the service that is being mis-used. | ||
====Lift block on IP==== | ====Lift block on IP==== | ||
- | Using a FTP client (preferably WinSCP- Put in a SysHelp Ticket to have it installed on your machine) access the Proxy Server. | + | Using a FTP client (preferably WinSCP, put in a SysHelp Ticket to have it installed on your machine) access the EZProxy server. |
- | * The Username and Password can be obtained from Scott, Kat, or Jack. | + | * The Username and Password can be obtained from Jaime or Margaret. |
* Once logged in, Identify the user.txt file in the main directory. | * Once logged in, Identify the user.txt file in the main directory. | ||
* There are a couple old files and backups that are not used anymore. Make sure you select the correct one. | * There are a couple old files and backups that are not used anymore. Make sure you select the correct one. | ||
Line 83: | Line 90: | ||
{{:oit_abuse_workflow.jpg|}} | {{:oit_abuse_workflow.jpg|}} | ||
n.b. "label" in the above refers to the email subject line | n.b. "label" in the above refers to the email subject line | ||
+ | |||
+ | |||
+ | ===== Boilerplate for message to patrons about Text & Data Mining violations ===== | ||
+ | |||
+ | Hi [name], | ||
+ | |||
+ | The vendor has suspended our connection to this resource due to excessive use and suspected text & data mining activity. Our license terms with the vendor unfortunately do not allow for text and data mining, and the pattern of your recent use of the database suggests this kind of activity. Please do not perform text and data mining research with [database]. | ||
+ | |||
+ | We are working with the vendor and campus IT to resolve the issue. If you would like to explore ways to use the Libraries' resources to accomplish your research goals within the bounds of our contractual obligations with our resource vendors, please [[https://www.library.umass.edu/about-the-libraries/liaisons/|contact your department's liaison librarian]]. And please let me know if there is anything else I can assist you with. | ||
+ | |||
+ | Thanks, [your name & title] | ||
+ | |||
+ | |||
+ | ===== Databases that DO and DO NOT allow Text & Data Mining ===== | ||
+ | Databases that DO NOT allow TDM: | ||
+ | * Newsbank (Access World News) | ||
+ | * APS | ||
+ | * HeinOnline -- does not allow "downloading or printing an entire issue or issues of a publication or journal within the database." | ||
+ | |||
+ | |||
+ | |||
+ | Resources that DO allow TDM: (For sure, based on CORAL) | ||
+ | * Adam Matthew | ||
+ | * Accessible Archives | ||
+ | * Annual Reviews | ||
+ | * BioOne | ||
+ | * Brill Reference | ||
+ | * CABI | ||
+ | * China/Asia On Demand | ||
+ | * Duke eJournals | ||
+ | * History Makers | ||
+ | * Institute of Physical (eBooks & Journals) | ||
+ | * IP.com | ||
+ | * Microform Academic Publishers (single title resource) | ||
+ | * Oxford eJournals | ||
+ | * ProQuest | ||
+ | * Royal Society eJournals | ||
+ | * Sage eJournals | ||
+ | * SpringerNature eJournals |