Network Acceptable Use Policy
Policy number | 12-11 |
Responsible office | Information Technology |
Enforcement official |
Enforcement official
Sr Director Infrastructure Services
|
Classification | Board of Trustees-delegated Policy |
Category | Information Technology and Data Security |
Statement of policy
Network services and hardware may not be modified or extended beyond the area of their intended use, may not be used to retransmit internet access to anyone outside of the University community and must be used in compliance with university policy.
Summary of contents/major changes
Consolidation of ResNet Acceptable Use Policy and WMUnet Acceptable Use Policy into a single document; rescind portions of both that are no longer applicable.
-
Purpose of Policy
This policy sets forth the regulations for the use of Western 九一麻豆制片厂 University's computing network
-
Stakeholders Most Impacted by the Policy
This policy applies to anyone who utilizes university networks including university affiliates and guests.
-
Key Definitions
-
Network: a system of computers and peripherals that are able to communicate with each other
-
Network Hardware: includes, but is not limited to switches, routers, and wireless access points
-
Switch: networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
-
Router: networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
-
Wireless (Wi-Fi) Access Point : a networking hardware device that allows other Wi-Fi devices to connect to a wired network.
-
Internet: an electronic communications network that connects computer networks and organizational computer facilities around the world.
-
IP Address: the numeric address of a computer on the Internet
Full Policy Details
-
The Office of Information Technology will
-
Implement and maintain network access control and registration, to ensure that only those with an active Bronco NetID and password, those who gain access on campus through University-authorized access services such as EduRoam, or WMU Guest access users may use Western 九一麻豆制片厂 University network services.
-
Implement processes and procedures for exceptions to the policy
-
Implement processes and procedure to enforce the policy.
All users must use the network in compliance with University policy.
No units and users may:
-
Modify or extend network services or wiring beyond the area of their intended use. This applies to all network wiring, hardware, wireless access points, and jacks.
-
Connect personal network switches, routers, or wireless access points to the network except where authorized by the Office of Information Technology. See WMU Wireless Rules for Acceptable Use.
-
Use the network to retransmit Internet access to anyone outside of, or within, the University community.
-
Inhibit or interfere with the use of the network by others. (For example, using an IP address not registered to you, or using applications that use an unusually high portion of the bandwidth for extended periods, thus inhibiting the use of the network by others, are not permitted).
-
Forge or misrepresent one's identity via electronic or any other form of communication.
Communication
-
Responsibility of the Office of Information Technology
-
WMU network registrations systems will communicate and require the user to accept the Policy before access to WMU Networks is granted.
-
Web content and other channels will communicate the Policy to impacted stakeholders as appropriate.
Exceptions
Exceptions to the policy may be expressly granted by the Sr Director of Infrastructure Services through approved service request and implementation processes.
Accountability
Failure to follow this Policy and any associated procedures may subject WMU students to disciplinary conduct under the Student Code and subject WMU employees to disciplinary action, up to and including dismissal from employment by the University, consistent with applicable procedures and Collective Bargaining Agreements.
Additional consequences for non-compliance may include:
-
Termination of any network connection without notice should it be determined that network traffic generated from said connection drastically inhibits or interferes with the use of the network by others or is in violation of university policy.
-
Suspension of network services and loss of computing resource privileges.
-
Prosecution under State and Federal laws.
If a campus residence hall or apartment network connection is suspended due to violations of the above policies, and you subsequently register legitimately or rectify the problem, you may be charged a port-reactivation fee to regain access to the network. This fee is in addition to the normal semester fee.
Related Procedures and Guidelines
Additional Information
N/A
FAQs
-
How do I get connected to the internet at WMU?
-
See Get
What alternative internet options do I have besides the WMU Network?
See
Effective date of current version | October 12, 2021 |
Proposed date of next review | October 12, 2024 |
Certified by |
Chief Information Officer |
At the direction of |
Provost and Vice President of Academic Affairs |