Summary
This article contains NGU's Network AUP, explaining what activities are permitted on NGU networks, guidelines on switches and routers, network services, and more.
Body
The NGU network must not be used for any activity that does not support the mission and purposes of North Greenville University. If a particular usage is not in the best interest of the University, or if it does not support the University’s mission and purposes, then it must not be performed.
- Deliberate disruption of NGU technology resources is expressly prohibited, including any action intended to disrupt system services, user accounts, network performance, Internet access or any other technology resources.
- Students must not make any unauthorized copies of copyrighted materials, (software, media, etc.). Software provided by NGU is purchased under software licensing agreements that place legal restrictions on their use and copying.
- The NGU network must not be used for any unlawful or malicious purposes. Specifically, resources must not be used by anyone to transmit threatening, obscene, harassing, or pornographic materials, or any outcome that would interrupt the normal operations of provided services. Any attempts to penetrate remote or local service without proper authorization are forbidden.
- Students must not intentionally seek information about, browse, copy, or modify files or passwords belonging to other students. Students must not attempt to decrypt or translate encrypted material not intended for them or obtain system privileges to which they are not entitled. If a network security exposure is encountered or observed, it must be reported to Information Technology Services (ITS) immediately.
- The use of p2p (peer-to-peer) “file sharing” applications is prohibited. First, Copyright infringement is illegal and subject to federal and civil prosecution. Second, a large percentage of files being downloaded are indecent, obscene, and a violation of the University’s mission and purpose as a Christian institution. Third, the excessive traffic generated by file sharing applications is wasteful of network resources, causing significant problems for all network users.
- Students are prohibited from attaching any wired or wireless “network device” to any campus network connection that functions as a bridge or routing device. Such network devices include routers, switches, bridges, access points, and any printer or streaming device that functions as a bridge or router. With the exception of end-point wired hubs, wireless printers, or wireless streaming devices (which students may install in their rooms as needed), the installation and configuration of any network devices on the University’s network is solely the responsibility of the ITS department.
- Students may not run any network services (e.g., DHCP, DNS, WINS, FTP, NAT, etc.) via any kind of file server or web server or host any Internet-based services on a computer or laptop.
- Students may not circumvent firewall or Internet filtering functions by using tunneling or proxy server techniques.
- The University provides wireless service across campus, including all computer labs, classrooms, and residential buildings. If anyone other than an authorized employee installs an unauthorized or unregistered device on the campus network, such device will be confiscated and the offender will face applicable disciplinary sanctions.
- Students must not create or willfully disseminate computer viruses. Students must install anti-virus software on their desktops or laptops and must take adequate steps to ensure that virus signature/update files are maintained and updated regularly.
- Students must regularly (at least once a month) apply operating system patches as provided by the OS vendor (Apple, Microsoft). Assistance in applying OS patches can be obtained from the ITS Helpdesk.
- Students need to be aware that there are federal, state, and sometimes local laws that govern certain aspects of computer and telecommunications use. Students are expected to respect these laws and to observe and respect University rules and regulations.
- Any questionable use must be considered “not acceptable.” In cases where it may be necessary to request an exception to any of these policies, such requests must be submitted in advance to the ITS Department for review and possible approval.