Network Acceptable Use Policy

Policy number 12-11
Responsible office Information Technology
Enforcement official
Enforcement official
Sr Director Infrastructure Services
Classification Board of Trustees-delegated Policy
Category Information Technology and Data Security

Statement of policy

Network services and hardware may not be modified or extended beyond the area of their intended use, may not be used to retransmit internet access to anyone outside of the University community and must be used in compliance with university policy.

Summary of contents/major changes

Consolidation of ResNet Acceptable Use Policy and WMUnet Acceptable Use Policy into a single document; rescind portions of both that are no longer applicable.

  1. Purpose of Policy

    This policy sets forth the regulations for the use of Western 麻豆传媒应用 University's computing network

  2. Stakeholders Most Impacted by the Policy

    This policy applies to anyone who utilizes university networks including university affiliates and guests.

  3. Key Definitions

    1. Network: a system of computers and peripherals that are able to communicate with each other

    2. Network Hardware:  includes, but is not limited to switches, routers, and wireless access points

    3. Switch: networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device

    4. Router:  networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

    5. Wireless (Wi-Fi) Access Point : a networking hardware device that allows other Wi-Fi devices to connect to a wired network.

    6. Internet: an electronic communications network that connects computer networks and organizational computer facilities around the world.

    7. IP Address:  the numeric address of a computer on the Internet

  4. Full Policy Details

    1. The Office of Information Technology will

      1. Implement and maintain network access control and registration, to ensure that only those with an active Bronco NetID and password, those who gain access on campus through University-authorized access services such as EduRoam, or WMU Guest access users may use Western 麻豆传媒应用 University network services.

      2. Implement processes and procedures for exceptions to the policy

      3. Implement processes and procedure to enforce the policy.

    2. All users must use the network in compliance with University policy.

    3. No units and users may:

      1. Modify or extend network services or wiring beyond the area of their intended use. This applies to all network wiring, hardware, wireless access points, and jacks.

      2. Connect personal network switches, routers, or wireless access points to the network except where authorized by the Office of Information Technology. See WMU Wireless Rules for Acceptable Use.

      3. Use the network to retransmit Internet access to anyone outside of, or within, the University community.

      4. Inhibit or interfere with the use of the network by others. (For example, using an IP address not registered to you, or using applications that use an unusually high portion of the bandwidth for extended periods, thus inhibiting the use of the network by others, are not permitted).

      5. Forge or misrepresent one's identity via electronic or any other form of communication.

    4. Communication

      1. Responsibility of the Office of Information Technology

      2. WMU network registrations systems will communicate and require the user to accept the Policy before access to WMU Networks is granted.

      3. Web content and other channels will communicate the Policy to impacted stakeholders as appropriate.

    5. Exceptions

      Exceptions to the policy may be expressly granted by the Sr Director of Infrastructure Services through approved service request and implementation processes.

  5. Accountability

    Failure to follow this Policy and any associated procedures may subject WMU students to disciplinary conduct under the Student Code and subject WMU employees to disciplinary action, up to and including dismissal from employment by the University, consistent with applicable procedures and Collective Bargaining Agreements.

    Additional consequences for non-compliance may include:

    1. Termination of any network connection without notice should it be determined that network traffic generated from said connection drastically inhibits or interferes with the use of the network by others or is in violation of university policy.

    2. Suspension of network services and loss of computing resource privileges.

    3. Prosecution under State and Federal laws.

      If a campus residence hall or apartment network connection is suspended due to violations of the above policies, and you subsequently register legitimately or rectify the problem, you may be charged a port-reactivation fee to regain access to the network. This fee is in addition to the normal semester fee.

  6. Related Procedures and Guidelines

  7. Additional Information

    N/A

  8. FAQs

    1. How do I get connected to the internet at WMU?

      1. See Get

    2. What alternative internet options do I have besides the WMU Network?

      See

References
History
Effective date of current version October 12, 2021
Proposed date of next review October 12, 2024
Authorization
Certified by

Chief Information Officer

At the direction of

Provost and Vice President of Academic Affairs