The college provides a secure network for its education and administrative needs and services. Absent standards, our campus community could experience exposure to damages resulting from hardware that has not been appropriately configured or maintained properly. These damages could include financial losses, interruption of network services, and the loss of data. This policy defines standards for connecting computers, servers, or other devices to the college’s network that have been designed to minimize exposure to these damages.
All financial and administrative policies involving community members across campus are within the scope of this policy. If there is variance between departmental expectations and the common approach described through college policy, the college will look to the campus community to support the spirit and the objectives of college policy.
The president of the college delegates administration of the college’s Network Connection Policy to the chief technology officer.
Appropriate connection methods
Devices may be connected to the college’s network at appropriate connectivity points including voice/data jacks, through an approved wireless network access point, via a VPN or through DSL, cable modems, and traditional modems over phone lines. Generally, it is not recommended to make modifications or extensions to the network. If necessary, consult Information Technology Services before making modifications or extensions.
Those using the college’s network may be required to authenticate when connecting a device to it. Information Technology Services maintains a database of machine identification, network addresses and owners. This information is used to contact the registered user of the equipment in the event his/her computer is compromised.
Protection of the network
Information Technology Services uses multiple methods to protect the college’s network. These include monitoring for external attacks, scanning the network for anomalies, and proactively blocking harmful traffic. By connecting to the college’s network, users acknowledge that network traffic to and from their computers may be scanned.
Although the network is routinely scanned for vulnerabilities, at times more extensive procedures may be required to address potential security exposures or to contain actual security exposures. Identification of devices exhibiting certain behaviors may prompt Information Technology Services to initiate more extensive procedures. These behaviors include, but are not limited to:
- Using substantial network resources
- Showing a pattern of network traffic that is disruptive
- Exhibits a pattern associated with scans or attacks
By connecting to the college’s network, users acknowledge that if a device exhibits these or other behaviors that Information Technology Services believes to be a risk, the device will be removed from the network.