This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
license_violation_procedures [2022/04/12 15:26] jaimetaylor |
license_violation_procedures [2025/08/20 17:42] (current) 172.24.102.139 [Lift block on IP] |
||
---|---|---|---|
Line 1: | Line 1: | ||
======License Violation Procedures====== | ======License Violation Procedures====== | ||
- | Violations are reported by vendors to us via eleres. The IP address and timestamp of violation are often noted. Sometimes a special string is sent by the vendor to the proxy server so you can find the offending time/IP/account in the proxy logs. The vendor will let you know what it is in their communication. | + | Violations are reported by vendors to us via email or to DBHelp. The IP address and timestamp of violation are often noted. Sometimes a vendor includes their logs containing the information. |
- | Our proxy server address is 128.119.168.112. | + | Our proxy server address is 128.119.201.53. This is the external IP address. |
- | - Identify the compromised account. | + | - Identify the compromised or offending account. |
- | - Temporarily block the IP. | + | - Temporarily block the IP address or user. |
- Report account to [[mailto: abuse@umass.edu|abuse@umass.edu]] | - Report account to [[mailto: abuse@umass.edu|abuse@umass.edu]] | ||
- Respond to vendor letting them know you have blocked and reported the account. | - Respond to vendor letting them know you have blocked and reported the account. | ||
Line 30: | Line 30: | ||
- If using Putty, you can right click on header to copy screen to Clipboard | - If using Putty, you can right click on header to copy screen to Clipboard | ||
- Alternatively use psftp to ftp the entire logfile to your PC | - Alternatively use psftp to ftp the entire logfile to your PC | ||
+ | - Note that server logs are retained for one week, so we cannot identify misuse farther back than that. | ||
====Temporarily block IP==== | ====Temporarily block IP==== | ||
Line 61: | Line 62: | ||
We have identified the offending user id and placed a deny request in our proxy. Our University IT is forcing a reset of their password. Please lift any blocks against our IP address. | We have identified the offending user id and placed a deny request in our proxy. Our University IT is forcing a reset of their password. Please lift any blocks against our IP address. | ||
+ | |||
+ | ==NOTE: IT needs the following information to identify an on-campus user (when the traffic is coming from an on-campus IP address & not through the proxy server):== | ||
+ | You will need to ask the vendor for this information, as some vendors do not include all of it in the logs they send. | ||
+ | * The dates, times the incident took place, and the timezone of this date & time information. | ||
+ | * The campus IP address the mis-use was coming from. | ||
+ | * The vendor's IP address and network port of the service that is being mis-used. | ||
====Lift block on IP==== | ====Lift block on IP==== | ||
- | Using a FTP client (preferably WinSCP- Put in a SysHelp Ticket to have it installed on your machine) access the Proxy Server. | + | Using a FTP client (preferably WinSCP, put in a SysHelp Ticket to have it installed on your machine) access the EZProxy server. |
- | * The Username and Password can be obtained from Scott, Kat, or Jack. | + | * The Username and Password can be obtained from Jaime or Margaret. |
* Once logged in, Identify the user.txt file in the main directory. | * Once logged in, Identify the user.txt file in the main directory. | ||
* There are a couple old files and backups that are not used anymore. Make sure you select the correct one. | * There are a couple old files and backups that are not used anymore. Make sure you select the correct one. | ||
Line 98: | Line 105: | ||
===== Databases that DO and DO NOT allow Text & Data Mining ===== | ===== Databases that DO and DO NOT allow Text & Data Mining ===== | ||
Databases that DO NOT allow TDM: | Databases that DO NOT allow TDM: | ||
- | *Newsbank (Access World News)’ | + | * Newsbank (Access World News) |
+ | * APS | ||
+ | * HeinOnline -- does not allow "downloading or printing an entire issue or issues of a publication or journal within the database." | ||
- | Resources that DO allow TDM: (For sure, based on CORAL) | ||
- | *Adam Matthew | ||
- | *Accessible Archives | ||
- | *Annual Reviews | ||
- | *BioOne | ||
- | *Brill Reference | ||
- | *CABI | ||
- | *China/Asia On Demand | ||
- | *Institute of Physical (eBooks & Journals) | ||
- | *IP.com | ||
- | *ProQuest | ||
- | *Microform Academic Publishers (single title resource) | ||
- | *Duke eJournals | ||
- | *Oxford eJournals | ||
- | *Sage eJournals | ||
- | *Royal Society eJournals | ||
- | *SpringerNature eJournals | ||
- | *History Makers | ||
+ | Resources that DO allow TDM: (For sure, based on CORAL) | ||
+ | * Adam Matthew | ||
+ | * Accessible Archives | ||
+ | * Annual Reviews | ||
+ | * BioOne | ||
+ | * Brill Reference | ||
+ | * CABI | ||
+ | * China/Asia On Demand | ||
+ | * Duke eJournals | ||
+ | * History Makers | ||
+ | * Institute of Physical (eBooks & Journals) | ||
+ | * IP.com | ||
+ | * Microform Academic Publishers (single title resource) | ||
+ | * Oxford eJournals | ||
+ | * ProQuest | ||
+ | * Royal Society eJournals | ||
+ | * Sage eJournals | ||
+ | * SpringerNature eJournals |