Standard
Users must:
- Register the system they own and use, and provide accurate registration information. For ‘Guest’ and other temporary networks, full registration information may not be required; however, these networks will have compensating controls to prevent abuse.
- Understand the impact their network use may have on other users sharing the network. Users may use less than 75 gigabytes of external Internet traffic per day and less than 150 gigabytes of external Internet traffic in a 7-day period.
Users must not:
- Run a private business, advertisements, or other ‘For-Profit’ activity on the WPI network.
- Resell or otherwise provide WPI network resources to anyone outside the WPI community without university approval.
- Disrupt normal network operations for other users.
- Run unapproved network equipment as indicated in the following ‘Prohibited Equipment’ list.
- Circumvent security or exploit security vulnerabilities except for valid research that has been previously approved by WPI IT Security.
- Use network packet capture tools in a ‘Promiscuous’ or ‘Active’ mode or otherwise engage in any network wiretapping of other users’ traffic.
- Register devices that are not directly owned or managed by the registrant, or register devices for those outside the WPI community.
- Bridge WPI network services to any other network without approval of WPI’s Network Operations group.
- Distribute or use WPI configurations or credentials for use by others.
- Imitate WPI network infrastructure.
- Use the WPI network for illegal activities according to Federal, State, local laws and regulations, and WPI policies.
Prohibited Equipment
Equipment Type |
Reason |
---|---|
Unapproved DHCP Servers |
Providing unauthorized addresses commonly disrupts other network users. |
Consumer devices providing IP Masquerading and NAT |
IP Masquerading and NAT provide unauthorized network bridging, unregistered network access, and increase the likelihood of service failures. |
Unapproved Routers |
Routers provide unauthorized network bridging, unregistered network access, cause network configuration problems, and increase the likelihood of service failures. |
Unapproved Wireless Access Points (WAPs) and devices |
WAPs provide unauthorized network bridging, unregistered network access, create interference, and increase the likelihood of service failures. |
Exceptions:
Exceptions to the Network Usage Standard are granted on a case-by-case basis. If an exception is requested, Information Security will work with the requestor to help determine the best course of action to minimize or eliminate any such conflict. Exceptions for academic coursework or research need to be requested by a Faculty member prior to assigning the coursework.
Questions, Concerns, or Requests for Exceptions
Please email any questions to itsecurity@wpi.edu.
Revisions
In order to stay current with the changing policy environment, this standard is reviewed annually. Changes are made when necessary.