The hardware and software that constitute Trinity University’s computing network are vital to the operation of the university. Viruses, malware, computer vulnerabilities and inappropriate use of the network are a threat to these resources and can detrimentally affect the ability to accomplish the institution’s mission. Trinity University has a responsibility to maintain these resources and ensure they are used in an appropriate manner. The Network Use Policy addresses this responsibility.
The Network Use Policy applies to all users of the Trinity University computing network. Use of the Trinity computing network constitutes the user’s acceptance of this policy. The Trinity University community (hereafter described as the “University community”) includes faculty and staff members, students, alumni, guests, and contractors.
Trinity University has the responsibility to protect valuable network resources and the confidentiality of sensitive personal information from any and all threats. In keeping with this responsibility, Trinity University scans computer hardware devices connected to the Trinity computing network for key security vulnerabilities. Where sufficient cause has been found to indicate a threat to the network, a threat to the university or a violation of federal or state law, Trinity may disable the network access of the offending hardware device. Any attempt by a user to circumvent the system or process of scanning for key security vulnerabilities is a violation of this policy.
In keeping with this responsibility, Trinity University has also developed the following policies that relate to virtual private network access, bandwidth, disruptive network devices, guest access, network services, and devices connected to the Trinity computing network.
Bandwidth refers to the speed of University’s connection to the Internet and is a shared resource in the University community. It is important that members of the University community act responsibly so that this resource is available to everyone, and that the actions - intentional or not - of a few do not disrupt or impede the availability of the Internet for others. Attempts to circumvent, damage, disable or tamper with any system in order to use more bandwidth or alter how bandwidth is managed or allocated by the Information Technology Service (ITS) is a violation the Network use Policy and the Information and Technology Responsible Use Policy.
Disruptive Network Devices
Misconfigured or mismanaged network access devices sometimes mimic the actions of central network control equipment and prevent network access by other users of the network segment, often an entire residence hall. Such devices include wireless access points and home routers, among others. Wireless access points are units which, when plugged into a network, emit a radio signal permitting properly equipped computers to access the network without a cable; home routers are designed to create small networks of a few computers. The type of network access device does not matter: if any such device is found to cause network problems, or even threatens to cause such problems, it will be identified immediately. Action will be taken to notify the registered owner to remove the device.
Virtual Private Network
The purpose of this policy is to provide guidelines for Virtual Private Network (VPN) connections to access Trinity University’s internal network. Trinity University’s VPN server is designed to provide off-campus access to network resources available on the Trinity campus.
Trinity University is committed to providing members of the University community with reliable technology and stable operation conditions while appropriately addressing the University needs for system integrity and data security. By default, all Trinity Faculty/Staff members are assigned general access level rights on their individual workstations. Exceptions may be granted to Faculty/Staff members who require Administrator level access to perform job related tasks. Individuals may request administrator level access through the ITS Helpdesk (helpdesk [at] trinity.edu or x7409) and sign the Request for Administrator Access document (provided by ITS), acknowledging that they have read all applicable IT policies. Users who are granted “administrator” access on University owned computers or workstations have enhanced responsibilities governed by the following policies:
Trinity IT Services is charged with creating a central network registry service. This service maintains a current record of all devices connected to the University network through a continually updated database. This extends to wireless communications. The Trinity IT central network registry service will automatically generate a registration page when a user or systems administrator connects an information technology device to the Trinity-managed network. The user or systems administrator must complete this page before the device is operated on the network. The page requires the MAC address and the IP address (if static) and the network electronic identifier (netid) of the primary user/responsible administrative person. Network administrators are required to register all devices connected to networks under their domains for which individual users or systems administrators, for whatever reason, have not themselves registered. (The development of a guest registry system is not covered under this policy.)
Computing Lab Access
Trinity University maintains computing labs for academic, instructional, research, administrative, and public service purposes. The following guidelines ensure that the computing labs are kept functioning at an optimal level of effectiveness for all users:
Trinity University provides wireless Internet access for visitors and guests. Wireless access is available in most public areas of the campus. To access the Trinity University wireless network, select TU Guest from the list of wireless networks. A Wi-Fi certified wireless network card that is 802.11a, 802.11g, or 802.11n compatible is required to access the Trinity-Guest wireless network, a standard for most modern laptops and mobile devices. Guest wireless access allows only for standard Internet surfing (ports 80 and 443), much like that found in many coffee shops. Application connections requiring non-standard ports will not be supported. For example, email connections through a desktop application like Outlook or Thunderbird will typically not work; connect via a Internet browser instead.
Alumni, official guests of the University, parents, and prospective students may be logged on to any available public computer. Services/resources available to guest users are:
Guests must comply with the Information and Technology Resource Responsible Use Policy.
Administrator access - This level allows the user to have complete and unrestricted access to the computer. This includes the ability to install any hardware or software, edit the registry, manage the default access accounts and change file level permissions. Manipulating these may cause serious stability issues with the computer system.
General access – This level allows most administrative powers with some restrictions. Installation of software or hardware that makes changes to the underlying operating system will require the assistance of ITS. General Access Level will generally assure the highest level of stability for a computer.
Information and Technology Resources - The full set of information technology devices (telephones, personal computers, printers, servers, networking devices, etc.) involved in the processing, storage, accessing, and transmission of information owned by, controlled by, or contracted to Trinity University. Connection of these devices can be permanent, via cable, or temporary, through telephone or other communications links. The transmission medium can be physical (e.g., fiber optic cable) or wireless (e.g.. satellite, wi-fi, WimAX).
Virtual Private Network (VPN) - A method for accessing a remote network that uses encryption and tunneling to connect users securely over a public network, usually the Internet.
To ensure adherence to the Network Use Policy and to protect the integrity of University resources, the University reserves the right to monitor the network and computers attached to it.
Any attempt by a user to circumvent the system or process of scanning for key security vulnerabilities is a violation of this policy. Where sufficient cause has been found to indicate a threat to the network, a threat to the university or a violation of federal or state law, Trinity may disable the network access of the offending hardware device. Any attempt by a user to circumvent the system or process of scanning for key security vulnerabilities is a violation of this policy.
Non-standard software on university-owned devices will be removed as part of a normal repair process if necessary to restore system functionality. In the event of computer or network performance issues associated with a computer enabled with administrator level access, ITS will only restore the computer to the standard configuration for all university computers. The occurrence of repeated instances of OS integrity problems may result in the removal of administrator level access in order to prevent continued challenges in supporting the computer.
Anyone who changes a MAC address, IP address, or netid with the intention of disguising or forging his or her identity may be in violation of University policy.
Violation of policies in regard to the computers in the computer labs may result in loss of computer lab privileges and other disciplinary action as described in the various handbooks issued by the University to students, faculty, and staff.
Any behavior in violation of this policy is cause for disciplinary action. Violations will be adjudicated, as appropriate, by the CIO, the Office of the Dean of Students, the Office of Housing and Residential Life, and/or the Office of Human Resources. Sanctions as a result of violations of this policy may result in, but are not limited to, any or all of the following:
Reports of problems or violations should be made through the Campus Conduct Hotline, which is a confidential, anonymous way to alert administrators of unsafe or unethical behavior. Phone 866-943-5787 or email cch [at] eiaa.org. Further information can be found at http://www.campusconduct.com