Network Usage Standard
WPI’s network is essential to the school’s day-to-day operations. It handles academic, administrative, and research processes, as well as traffic from its campus residents. It is important that proper management and use be maintained at all times for acceptable performance and functionality. This standard will help define what can and cannot be performed on the network. It explains the following information:
This standard covers every machine and user that connects to the WPI wired or wireless network.
The WPI network was created to facilitate WPI’s business and academic progress, as well as pass useful and timely information to the WPI community. Commercial activity on the WPI network is only permitted for business done on behalf of WPI or its organizations, not for the benefit of private individuals or other organizations without authorization. This business activity must be authorized by WPI.
Since the WPI network is for the use of the entire university, denying its use through the forms of excessive traffic, running prohibited network equipment, or circumventing or exploiting security vulnerabilities to disrupt normal operations is prohibited. The network must be available at all times for all members of the university.
Network bandwidth is a finite resource that is managed in a reasonable fashion. Despite being an acceptable use of network bandwidth, network-intensive research work and other such enterprises should always be cleared with WPI Network Operations before proceeding. Also, non-academic applications may be blocked or limited in use if found to be causing problems with normal day-to-day operations.
Violations of privacy through network sniffing are not allowed. Although a useful diagnostic tool, it is too easy to disrupt normal operations or violate the privacy of others using a sniffer. Classes that are believed to need sniffers should contact Information Security (email@example.com) before the class begins to work on these issues.
The University views personal network connections as a privilege and not a right for community members. The university reserves the right to suspend or eliminate personal computers from its network should they pose a business risk. Personal servers that are not owned by the university and perform a significant amount of non-academic related work are prohibited.
WPI users are required to register their systems for the WPI network and must only register machines that they own and use. Users are responsible for the activities on the machines that are registered to them, and will be held accountable for any legal or policy violations that occur. Systems for non-WPI community members (i.e. significant others, friends, family, etc) are prohibited either for full-time or casual use.
Users must register the system they own and use, and provide accurate registration information.
The following activities are prohibited:
Minor Offense: Faculty, staff, and students will be warned and this policy will be explained. Computers and resources that are mediums for the violations may be disabled until the owner has a discussion about the violation. A second minor offense counts as a major offense.
Major Offense: Faculty, staff, and students will need to speak with a member of Information Security about the violation. Astudent's network access for their personal computers will be suspended from the point the second violation is discovered to one week after the violation is explained and a notice will be sent to the Student Affairs Office. A second minor offense counts as a serious offense.
Serious Violations: Faculty, staff, and students will need to speak with a member of Information Security about the violation. Those students with repeat offenses or who exhibit malicious intent to compromise, disrupt, or circumvent security will be referred to the Dean of Students Office for resolution, which may include forwarding to the Campus Hearing Board (CHB). The student will have their network access for their personal computers suspended pending the resolution of the case. Other computing resources may be suspended if they were in involved in the student's transgressions.
Please email any concerns or comments to firstname.lastname@example.org.
In order to stay current with the changing policy environment and network architecture, this standard is reviewed yearly. Changes are made when necessary.
August 19, 2008 - IT approved the standard.
October 20, 2008 - Minor clarifications at the request of CITP
August 10, 2009 - Updating bandwidth limits, judicial review, and other minor changes.
August 20, 2010 - Updating bandwidth limits
August 22, 2013 - Updating bandwidth limitsMaintained by itweb
Last modified: Aug 22, 2013, 13:36 EDT