秘密研究所

秘密研究所 Logo     
Policy No: 2051
Responsible Office: Computer Services Center
Last Review Date: 02/10/2022
Next Required Review: 02/10/2027
Policy No: 2051
Responsible Office: Computer Services Center
Last Review Date: 02/10/2022
Next Required Review: 02/10/2027

Network Connection


1. Purpose

The University networks support a wide variety of devices and services of critical importance to the operations of the University. In addition to providing University constituents access to electronic mail, Internet, and file and print services, the networks also support telephony, environmental control monitoring, security monitoring, and other essential University services.

The connection by individuals of equipment which is not appropriately designed and configured for the university network can disrupt network services and create avenues for security breaches.

The Computer Services Center is charged with the design and operation of the University networks.

2. Applicability

This policy applies to all faculty, staff, students, and guests using the 秘密研究所 network. The policy applies to university owned and personal devices that connect to the university network.

3. Definitions

CSC: 秘密研究所 Computer Services Center.

4. Policy Guidelines

4.1  Permitted devices

With the exception of the Permitted Devices enumerated below, no device may be connected to the University network, and no wireless connection devices may be activated within University building spaces, without prior written approval from CSC. Users are not to configure static IP addresses on such devices except as provided by CSC. Various technical support groups within the University, including the Health Systems Information Services group and departmental IT technical staff provide essential support to the operations of the University. They may assist end users with acquiring permission, but they are not authorized by CSC to grant any approval of network connections as described in this document.

4.1.1  Personal computers and smartphones may be attached directly to network wall connections or joined to the University wireless network. This is the case whether the device is owned by the University, a University constituent, or vendor performing work for the University. CSC reserves the right to access and configure any device directly connected to the University wired network.             

4.1.2  Bluetooth devices connected to personal computers, such as keyboard, mouse, etc. (Permission to use does not constitute a guarantee of support for these devices from CSC). 

4.1.3  Networked printers may be directly connected to the University network, but individuals are advised to contact CSC for assistance to ensure correct configuration for operation on the University network.

4.1.4  Application servers may be directly connected to the University network. CSC will provide consultative services for departments considering acquiring servers.

4.2  Prohibited Devices and Actions

All other devices require the written approval from CSC before connection. You are advised to consult with the Computer Services Center before acquiring such equipment, as approval may not be granted.

4.2.1  Switches, routers, hubs, splitters, or any other device which is inserted between the network connection and an approved device.

4.2.2  Moving or connecting University provided networked (VOIP) telephones to different network jacks, except under the explicit instruction of CSC.

4.2.3  Connection of any wireless access point or wireless router to the University network, or the installation and operation of any independent 802.11 service within University buildings.

4.2.4  The use of personal computers or other devices to provide downstream network connections to other devices, whether wired or 802.11 wireless.

4.2.5  Configuring network services or server functions on a personal computer, such as DHCP or bridging/routing services, which would disrupt network connectivity for other users.

5. Procedures

Not Applicable.

6. Enforcement

CSC staff will remove any non-approved equipment or equipment causing disruptions of network services. If such equipment is determined by CSC to pose an intrinsic risk to the University network, CSC may arrange for the disposal of this equipment. If the equipment is not University owned, CSC will consult with the Vice President of the academic or administrative unit of the employee as to the proper disposition of the equipment.

7. Related Documents

The Computer Services Center web site can be found at /departments/csc/