In-Room Connections

Internet access is available in every corner of the world nowadays, and UC Berkeley is no exception! Of course, for the protection of our guests and the University, we do have a few parameters regarding Internet access. Please take a moment to read the following information and be sure to contact your conference coordinator with any questions!


Ethernet Connections
Ethernet Availability in Meeting Spaces
Wireless Availability
Additional Services
Requirements
Minimum Security Requirements

Ethernet Connections

Complimentary Internet connections in sleeping rooms and meeting spaces are available for all conference guests. To keep security risks at their lowest, all computers should meet UC Berkeley's minimum security requirements. Computers that do not meet the minimum security requirements may have their Internet connection disabled without notice. To activate Ethernet connections for your conference, please take the following steps:

  • Notify your conference coordinator at least 3 weeks in advance if you would like Internet access in your guest sleeping rooms and/or meeting rooms.
  • Choose a general login username and password for In-Room Connection registration. These will be used by all conference guests needing Internet access.
  • Once your account is created and confirmed by your conference coordinator, please send computer registration instructions to your conference guests and staff. They should register their computers for Internet access before their arrival.

Computer Registration Instructions
To register computer(s) for Internet access, please follow the steps below:

  • Visit http://rescomp.berkeley.edu/conferences and log in using your chosen login username and password.
  • Review your conference information. If anything is incorrect, contact your conference coordinator or email the IT helpdesk at rssp-helpdesk@berkeley.edu.
  • Be sure each individual's name, email, phone number (optional) and ethernet card address has been entered.
  • Make sure computers are properly configured to receive an IP address through Dynamic Host Configuration Protocol (DHCP)
  • Guests must bring their own Ethernet cable (we recommend one at least 25ft long).

Not completing the steps outlined above can result in a delay of Internet access for your guests. Check with your conference coordinator if you have questions regarding the Internet registration process.

Additional Services

For those meeting spaces that do not have wireless Internet available, wireless routers can be installed for a $50.00 fee per router. Please speak with your conference coordinator for more information.

Having trouble connecting? Our IT staff is happy to provide limited technical support free of charge for the first 30 minutes. After which, the standard rate of $75.00/hour will apply.

Because additional services will be posted to the Master Bill (not to the individual conference guests) all charges must be approved by the Conference Organizer before IT will extend the service.

Requirements

Conference hosts are responsible for all network traffic originating from machines that have registered on our network. Conference participants must abide by Residential Computing's Appropriate Use Policies. Conference participants should not attempt any modification of the University's network hardware. Requests for technical support should be made through the conference coordinator.

Minimum Security Requirements

In order to protect the network and to ensure efficient and reliable Internet service for all users, the University of California, Berkeley enforces the following minimum security requirements for any device connecting to our network to use the Internet. Any device, such as your laptop, that does not meet the minimum security standards may have its Internet access turned off and blocked from the Internet without notification. The minimum security standards are as follows:

  • Install anti-virus software that updates with regular virus definitions
    The first security requirement is to have anti-virus software. Anti-virus software detects and eliminates malicious codes on your computer. It protects your documents and media by keeping viruses from spreading between your computer and others. We (UCB Conference Services) recommend the following anti-virus solutions:
  • Set strong passwords for your computer.
    Many administrator and regular user accounts on computers have blank passwords by default, giving hackers an easy way to compromise machines. Setting a strong password for these accounts closes this common security hole.

  • Have a personal firewall installed and running at all times.
    It is a requirement that your computer have firewall software. A personal firewall protects your computer from potentially harmful network traffic. It prevents spammers and hackers from exploiting security holes on your computer. The built-in Windows and Mac firewalls are generally sufficient assuming you have anti-virus software.

  • Install the latest critical updates and enable automatic updates to get the latest software patches for your computer.
    Enable and run automatic updates for your operating system (ex. Windows or Mac OS X) to install the most latest critical updates for your computer. This will protect your computer from the newest security vulnerabilities as they are discovered.