Skip to main content area Skip to institutional navigation Skip to sub-navigation

College-wide Policies

Network Connection Policy

The college provides a secure network for its education and administrative needs and services. Absent standards, our campus community could experience exposure to damages resulting from hardware that has not been appropriately configured or maintained properly. These damages could include financial losses, interruption of network services, and the loss of data. This policy defines standards for connecting computers, servers, or other devices to the college’s network that have been designed to minimize exposure to these damages.

Responsible office
Information Technology Services
Responsible party
Vice president for information technology/Chief technology officer
Last revision
August 2013
Approved by
The Cabinet
Approval date
August 2013
Effective date
August 2013
Additional references
None

Scope

All financial and administrative policies involving community members across campus are within the scope of this policy. If there is variance between departmental expectations and the common approach described through college policy, the college will look to the campus community to support the spirit and the objectives of college policy.

Policy

The president of the college delegates administration of the college’s Network Connection Policy to the chief technology officer.

Appropriate connection methods

Devices may be connected to the college’s network at appropriate connectivity points including voice/data jacks, through an approved wireless network access point, via a VPN or through DSL, cable modems, and traditional modems over phone lines.  Generally, it is not recommended to make modifications or extensions to the network. If necessary, consult Information Technology Services before making modifications or extensions.

Network registration

Those using the college’s network may be required to authenticate when connecting a device to it. Information Technology Services maintains a database of machine identification, network addresses and owners. This information is used to contact the registered user of the equipment in the event his/her computer is compromised.

Protection of the network

Information Technology Services uses multiple methods to protect the college’s network. These include monitoring for external attacks, scanning the network for anomalies, and proactively blocking harmful traffic. By connecting to the college’s network, users acknowledge that network traffic to and from their computers may be scanned.

Although the network is routinely scanned for vulnerabilities, at times more extensive procedures may be required to address potential security exposures or to contain actual security exposures. Identification of devices exhibiting certain behaviors may prompt Information Technology Services to initiate more extensive procedures. These behaviors  include, but are not limited to:

  • Using substantial network resources
  • Showing a pattern of network traffic that is disruptive
  • Exhibits a pattern associated with scans or attacks

By connecting to the college’s network, users acknowledge that if a device exhibits these or other behaviors that Information Technology Services  believes to be a risk, the device will be removed from the network. 

Procedures

None