WPI is taking measures in response to the rapidly evolving coronavirus (COVID-19) situation. Get the latest information.


WPI’s network is essential to the university’s day-to-day operations. It handles academic, administrative, and research processes, as well as traffic from its campus residents. It is important that proper management and appropriate levels of utilization be maintained at all times for acceptable performance and functionality. This standard will help define what activities are authorized on the network.


This standard covers all technology and users accessing the WPI network.


Users must:

  • Register the system they own and use, and provide accurate registration information.   For ‘Guest’ and other temporary networks, full registration information may not be required; however, these networks will have compensating controls to prevent abuse.
  • Understand the impact their network use may have on other users sharing the network. Users may use less than 75 gigabytes of external Internet traffic per day and less than 150 gigabytes of external Internet traffic in a 7-day period.

Users must not:

  • Run a private business, advertisements, or other ‘For-Profit’ activity on the WPI network.
  • Resell or otherwise provide WPI network resources to anyone outside the WPI community without university approval.
  • Disrupt normal network operations for other users.
  • Run unapproved network equipment as indicated in the following ‘Prohibited Equipment’ list.
  • Circumvent security or exploit security vulnerabilities except for valid research that has been previously approved by WPI IT Security.
  • Use network packet capture tools in a ‘Promiscuous’ or ‘Active’ mode or otherwise engage in any network wiretapping of other users’ traffic.
  • Register devices that are not directly owned or managed by the registrant, or register devices for those outside the WPI community.
  • Bridge WPI network services to any other network without approval of WPI’s Network Operations group.
  • Distribute or use WPI configurations or credentials for use by others.
  • Imitate WPI network infrastructure.
  • Use the WPI network for illegal activities according to Federal, State, local laws and regulations, and WPI policies.

Prohibited Equipment

Equipment Type


Unapproved DHCP Servers

Providing unauthorized addresses commonly disrupts other network users.

Consumer devices providing IP Masquerading and NAT

IP Masquerading and NAT provide unauthorized network bridging, unregistered network access, and increase the likelihood of service failures. 

Unapproved Routers

Routers provide unauthorized network bridging, unregistered network access, cause network configuration problems, and increase the likelihood of service failures.

Unapproved Wireless Access Points (WAPs) and devices

WAPs provide unauthorized network bridging, unregistered network access, create interference, and increase the likelihood of service failures.


Exceptions to the Network Usage Standard are granted on a case-by-case basis.  If an exception is requested, Information Security will work with the requestor to help determine the best course of action to minimize or eliminate any such conflict.  Exceptions for academic coursework or research need to be requested by a Faculty member prior to assigning the coursework.

Questions, Concerns, or Requests for Exceptions

Please email any questions to itsecurity@wpi.edu.


In order to stay current with the changing policy environment, this standard is reviewed annually. Changes are made when necessary.