1. Examples of inappropriate use include sending unsolicited email to large numbers of people to promote products or services, and engaging in unauthorized peer-to-peer file sharing. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: unauthorized is unclear. Traffic Description: peer-to-peer is unclear. Traffic Description: file sharing is unclear. Traffic Amount: large numbers of is unclear. Location is missing Action: inappropriate is unclear.
2. The use of peer-to-peer file sharing applications on Campbell University computing resources is strictly prohibited. policy source
This policy needs improvement! Traffic Description: peer-to-peer is unclear. Traffic Description: file sharing is unclear. Traffic Description: applications is unclear. Location: computing resources is unclear. Action: prohibited is clear.
3. Use of peer-to-peer file sharing software through which files are made available to other users, are prohibited unless authorized by the IS&T Department. policy source
This policy needs improvement! Traffic Description: peer-to-peer is unclear. Traffic Description: file sharing is unclear. Traffic Description: software is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear.
4. Examples of inappropriate use include engaging in unauthorized peer-to-peer file sharing, participating in bandwidth-consuming activities that are not academic or instructional in nature;or sending marketing or spam email messages that are not consistent with the University’s mission. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: peer-to-peer is unclear. Traffic Description: file sharing is unclear. Traffic Amount: bandwidth-consuming activities is clear. Location: nature;or is clear. Action: inappropriate is unclear. Other: that is clear. Other: not is clear. Other: that is clear. Other: not is clear.
5. Do not install or use Peer-to-Peer file sharing software; policy source
This policy needs improvement! Traffic Description: Peer-to-Peer is unclear. Traffic Description: file sharing is unclear. Traffic Description: software is unclear. Location is missing Action: Do not is clear.
6. BitTorrent software (or other file sharing software) used to download and share movies, music, and other copyrighted media is strictly forbidden unless it is used for Rowan business or academic purposes. policy source
This policy needs improvement! Traffic Description: BitTorrent is clear. Traffic Description: software is unclear. Traffic Description: file sharing is unclear. Traffic Description: software is unclear. Traffic Description: copyrighted media is unclear. Traffic Direction: indicated by BitTorrent. Location is missing Action: forbidden is clear. Policy Exception: unless is clear.
7. While peer-to-peer (P2P) file-sharing utilities (e.g., BitTorrent) are not illegal and are not banned by the University, it is illegal to download or share copyrighted material that has not been approved for such distribution and such downloading of copyrighted material is a violation of this and other University policies. policy source
This policy needs improvement! Traffic Description: peer-to-peer is unclear. Traffic Description: P2P is unclear. Traffic Description: file-sharing is unclear. Traffic Description: copyrighted material is unclear. Traffic Description: copyrighted material is unclear. Location: BitTorrent) is clear. Action: downloading is clear. Action: violation of is clear. Other: not is clear. Other: not is clear. Other: that is clear. Other: not is clear. Other: approved is unclear. Other: this is clear.
8. Users must not tie up the University Network with game playing or personal uses, or use hardware or software that results in overloading the University Network or outside Internet resources or services, by sending numerous Internet transactions, establishing numerous Internet connections or by any other method. This includes, without limitation, any peer-to-peer system such as bit-torrent or similar programs. policy source
This policy needs improvement! Traffic Description: tie up is unclear. Traffic Description: game playing is unclear. Traffic Description: personal uses is unclear. Traffic Description: software is unclear. Traffic Description: overloading is unclear. Traffic Description: services is unclear. Traffic Description: peer-to-peer is unclear. Traffic Description: bit-torrent is clear. Traffic Description: programs is unclear. Traffic Amount: numerous is unclear. Traffic Amount: numerous is unclear. Traffic Direction: indicated by bit-torrent. Location: University Network is clear. Location: University Network is clear. Action: must not is clear. Other: that is clear. Other: outside Internet is clear. Other: any other is clear. Other: This is clear. Other: without limitation is unclear.
9. At no time is it acceptable to load or use peer-to-peer file sharing applications for the purpose of downloading music, video, or any other copyrighted media type. policy source
This policy needs improvement! Traffic Description: peer-to-peer is unclear. Traffic Description: file sharing is unclear. Traffic Description: applications is unclear. Traffic Description: copyrighted media is unclear. Location is missing Action is missing. Other: any other is clear.
10. The use of campus computer resources, including ResNet, to share or distribute copyrighted material to others without the permission of the copyright holder is prohibited. This includes, but is not limited to, using peer-to-peer applications to share these files. policy source
This policy needs improvement! Traffic Description: copyrighted material is unclear. Traffic Description: peer-to-peer is unclear. Traffic Description: applications is unclear. Location: computer resources is unclear. Action: prohibited is clear. Policy Exception: without is clear. Other: This is clear. Other: these is clear.
11. Peer to peer recreational use affecting the university’s primary instructional mission or impeding office operations is unacceptable. policy source
This policy needs improvement! Traffic Description: Peer to peer is unclear. Traffic Description: recreational is unclear. Location is missing Action: unacceptable is unclear. Other: affecting is unclear.
12. P2P File sharing software such as limeware, Imesh and alike is Strictly Prohibited by Oakwood University. policy source
This policy needs improvement! Traffic Description: P2P is unclear. Traffic Description: File sharing is unclear. Traffic Description: software is unclear. Location is missing Action: limeware is unclear. Action: Prohibited is clear.
13. Computers found to be distributing copyrighted materials, or accessing peer-to-peer networks will result in, but not limited to, a 60-minute ban from the network. policy source
This policy needs improvement! Traffic Description: copyrighted materials is unclear. Traffic Description: peer-to-peer is unclear. Location: networks is clear. Location: network is clear. Action: ban from is clear. Action Duration: minute is clear.
14. Violations include, but are not limited to: Use of peer-to-peer software illegally to transfer or share material. policy source
This policy needs improvement! Traffic Description: peer-to-peer is unclear. Traffic Description: software is unclear. Location is missing Action: Violations is clear.
15. Use of P2P file sharing software may result in loss of network and Internet privileges. policy source
This policy needs improvement! Traffic Description: P2P is unclear. Traffic Description: file sharing is unclear. Traffic Description: software is unclear. Location: network is clear. Action is missing.
16. P2P applications are not allowed on the University of Memphis network. policy source
This policy needs improvement! Traffic Description: P2P is unclear. Traffic Description: applications is unclear. Location: network is clear. Action: not allowed is clear.
17. The use of P2P file sharing applications on the AUM network without the prior authorization of the CIO is strictly prohibited. policy source
This policy needs improvement! Traffic Description: P2P is unclear. Traffic Description: file sharing is unclear. Traffic Description: applications is unclear. Location: AUM network is clear. Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: prior authorization is clear.
18. Peer-to-Peer applications are restricted on the HMS network, the HMS wireless network and the HMS VPN. policy source
This policy needs improvement! Traffic Description: Peer-to-Peer is unclear. Traffic Description: applications is unclear. Location: network is clear. Location: wireless network is clear. Location: VPN is clear. Action: restricted is unclear.
19. Peer-to-Peer (P2P) file sharing of copyrighted material is prohibited on the campus network at the University of Nevada, Reno. Use of P2P software is discouraged and may be throttled or blocked if it becomes detrimental to the proper functioning of the network. policy source
This policy needs improvement! Traffic Description: Peer-to-Peer is unclear. Traffic Description: P2P is unclear. Traffic Description: file sharing is unclear. Traffic Description: copyrighted material is unclear. Traffic Description: P2P is unclear. Traffic Description: software is unclear. Location: campus network is clear. Location: network is clear. Action: prohibited is clear. Action: discouraged is unclear. Action: may be is clear. Action: blocked is clear.
20. Peer-to-Peer (P2P) networking and file sharing is not allowed on the Saint Leo University network or systems under any circumstances. policy source
This policy needs improvement! Traffic Description: Peer-to-Peer is unclear. Traffic Description: P2P is unclear. Traffic Description: file sharing is unclear. Location: networking is clear. Location: University network is clear. Action: not allowed is clear.
21. The following activities are strictly prohibited: Port scanning or security scanning unless these duties are within the scope of an employee’s normal job responsibilities and with proper authorization. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: proper authorization is clear. Other: these is clear. Other: normal job is unclear.
22. CIS will take action to contain devices that exhibit the behaviors indicated below, and allow normal traffic and central services to resume: exhibiting a pattern of malicious network traffic associated with scanning or attacking others, exhibiting behavior consistent with host compromise. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: normal traffic is unclear. Traffic Description: central services is unclear. Traffic Description: network traffic is clear. Traffic Description: scanning is unclear. Traffic Description: host compromise is unclear. Location is missing Action: action is unclear. Action: allow is clear. Action: malicious is unclear. Other: that is clear.
23. Port scanning or security scanning is prohibited without prior ITS approval. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Location is missing Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: approval is clear.
24. Examples of misuse include, but are not limited to, the following: Attempting to monitor or tamper with another entity’s electronic communications, including scans and probes of the residences and other networks. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location: networks is clear. Action: misuse is clear. Other: tamper is unclear.
25. The unauthorized scanning of the Drexel Network is also prohibited. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: scanning is unclear. Location: Network is clear. Action: prohibited is clear.
26. Students should not attempt to exploit, test, or probe for suspected security holes on Harvard computers or networks, but instead should report them to HUIT. policy source
This policy needs improvement! Traffic Description: security holes is unclear. Traffic Description: HUIT is clear. Traffic Direction: indicated by HUIT. Location: networks is clear. Action: should not is clear. Other: exploit is unclear. Other: test is unclear. Other: probe is unclear.
27. Students may not scan the Harvard network or computers that they do not own or officially administer. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location: network is clear. Action: may not is clear. Action: do not is clear. Other: that is clear. Other: they is clear.
28. Specific Prohibitions on Use of Information Systems: Probe by any means the security mechanisms of any resource on the Liberty network, or on any other network through a connection to the Liberty network. policy source
This policy needs improvement! Traffic Description: security mechanisms is unclear. Location: Information Systems is unclear. Location: network is clear. Location: network is clear. Location: network is clear. Action: Prohibitions is clear. Other: Probe is unclear. Other: any other is clear.
29. In addition to all of the requirements of this Policy, it is specifically prohibited to use Northeastern University information systems to: Probe by any means the security mechanisms of any resource on the Northeastern network, or on any other network through a connection to the Northeastern network. policy source
This policy needs improvement! Traffic Description: security mechanisms is unclear. Location: information systems is unclear. Location: network is clear. Location: network is clear. Location: network is clear. Action: prohibited is clear. Other: this is clear. Other: Probe is unclear. Other: any other is clear.
30. Inappropriate or malicious use of IT systems includes: Conducting any port scanning, network sniffing, packet capturing, security scanning, vulnerability scanning, or any other type of network monitoring without approval. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: network sniffing is unclear. Traffic Description: packet capturing is unclear. Traffic Description: security scanning is unclear. Traffic Description: vulnerability scanning is unclear. Traffic Description: network monitoring is unclear. Location: IT systems is unclear. Action: Inappropriate is unclear. Action: malicious is unclear. Policy Exception: without is clear. Policy Exception: approval is clear. Other: any other is clear.
31. Port scanning or security scanning is expressly prohibited unless prior notification to InfoSec (Information Security) is made. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: prior notification is clear.
32. For example, SHSU users must not run password cracking programs, packet sniffers, or port scanners or any other non-approved programs on SHSU information technology services. policy source
This policy needs improvement! Traffic Description: SHSU is clear. Traffic Description: password cracking is unclear. Traffic Description: programs is unclear. Traffic Description: packet sniffers is unclear. Traffic Description: port scanners is clear. Traffic Description: non-approved is unclear. Traffic Description: programs is unclear. Traffic Direction: indicated by SHSU. Location: information technology services is unclear. Action: must not is clear. Other: run is clear. Other: any other is clear.
33. Examples of unlawful acts, system or network security violations include but are not limited to the following: any attempt to probe, damage, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location: network is clear. Location: network is clear. Action: network security violations is clear. Policy Exception: without is clear. Policy Exception: authorization of is clear. Other: probe is unclear. Other: test is unclear. Other: breach is unclear. Other: the owner of is clear.
34. "RezNet" users are prohibited from probing or data collection on "RezNet". policy source
This policy needs improvement! Traffic Description: probing is unclear. Location is missing Action: prohibited from is clear.
35. Users are not permitted to conduct unauthorized scanning of University information technology resources. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: scanning is unclear. Location: information technology resources is unclear. Action: not permitted to is clear.
36. The following activities and behaviors are prohibited: Unauthorized scanning of networks for security vulnerabilities. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: scanning is unclear. Traffic Description: security vulnerabilities is unclear. Location: networks is clear. Action: prohibited is clear.
37. Examples of system or network security violations include, without limitation, the following: unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach or circumvent the security or authentication measures without express authorization of the owner of the system or network. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Location: networks is clear. Location: network is clear. Location: network is clear. Action: network security violations is clear. Policy Exception: without is clear. Policy Exception: authorization of is clear. Other: without limitation is unclear. Other: probe is unclear. Other: test is unclear. Other: breach is unclear. Other: circumvent is unclear. Other: the owner of is clear.
38. The following uses are prohibited: Network scanning, probing or sniffing. policy source
This policy needs improvement! Traffic Description: Network scanning is unclear. Traffic Description: probing is unclear. Traffic Description: sniffing is unclear. Location is missing Action: prohibited is clear.
39. Some examples of policy violations: Probing and/or exploiting security holes in other systems either on or off campus. policy source
This policy needs improvement! Traffic Description: Probing is unclear. Traffic Description: security holes is unclear. Traffic Direction: either is clear. Location: on or is clear. Location: off campus is clear. Action: policy violations is clear.
40. Scanning machines on the Internet and on the network for security vulnerabilities by "port scanning" and other means is not allowed. policy source
This policy needs improvement! Traffic Description: security vulnerabilities is unclear. Traffic Description: port scanning is clear. Location: the Internet is clear. Location: network is clear. Action: not allowed is clear.
41. Scanning for computers on any network using port scanners or network probing software including packet sniffers, is prohibited. policy source
This policy needs improvement! Traffic Description: Scanning is unclear. Traffic Description: port scanners is clear. Traffic Description: probing is unclear. Traffic Description: software is unclear. Traffic Description: packet sniffers is unclear. Location: network is clear. Location: network is clear. Action: prohibited is clear.
42. Unacceptable activities include, but are not limited to: Probing, scanning or other activities done to learn about devices connected to the University’s network, whether such activity is innocent or malicious in nature. policy source
This policy needs improvement! Traffic Description: Probing is unclear. Traffic Description: scanning is unclear. Traffic Description: devices is unclear. Location: network is clear. Action: Unacceptable is unclear. Action: malicious is unclear. Policy Exception: whether is clear.
43. Unacceptable uses that are prohibited include, but are not limited to the following: Unauthorized scanning of networks or computers for security vulnerabilities. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: scanning is unclear. Traffic Description: security vulnerabilities is unclear. Location: networks is clear. Action: Unacceptable is unclear. Action: prohibited is clear. Other: that is clear.
44. Port scanning or security scanning is expressly prohibited unless prior notification to Information Technology Security is made. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Location: Information Technology Security is unclear. Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: prior notification is clear.
45. Unauthorized access to University networking equipment (firewalls, routers, switches, etc.) is prohibited. This includes port scanning or connection attempts using applications such as SSH/SNMP, or otherwise attempting to interact with University network equipment. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: University networking equipment ( is unclear. Traffic Description: routers is clear. Traffic Description: switches is clear. Traffic Description: port scanning is clear. Traffic Description: applications is unclear. Traffic Description: SSH is clear. Traffic Description: SNMP is clear. Traffic Description: otherwise is clear. Traffic Direction: indicated by SSH. Traffic Direction: indicated by SNMP. Location: firewalls is clear. Location: University network is clear. Action: prohibited is clear. Other: This is clear.
46. Because port scanning creates substantial risk of interference with network operations, it goes against the CWRU Acceptable Use Policy (AUP), and is specified as a Banned Protocol. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: creates is clear. Traffic Description: interference is clear. Traffic Amount: substantial is unclear. Location: network is clear. Action: against is clear. Action: specified is unclear.
47. Using port scanners or using network probing software, including packet-sniffing software, is strictly prohibited. policy source
This policy needs improvement! Traffic Description: port scanners is clear. Traffic Description: probing is unclear. Traffic Description: software is unclear. Traffic Description: packet is clear. Traffic Description: sniffing is unclear. Traffic Description: software is unclear. Location: network is clear. Action: prohibited is clear.
48. Examples of activity that is prohibited by this policy include, but are not limited to: running port scanning software, packet sniffers. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: software is unclear. Traffic Description: packet sniffers is unclear. Location is missing Action: prohibited is clear. Other: that is clear. Other: this is clear. Other: running is clear.
49. Port scanning or sniffing, exploitation of security holes, execution of hacking tools or use of another person's user and password credentials are all grounds for termination of access and may result in disciplinary action and/or civil penalties and/or criminal charges. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: sniffing is unclear. Traffic Description: security holes is unclear. Traffic Description: charges is unclear. Location is missing Action: disciplinary action is unclear.
50. Users may not attempt to gain unauthorized access to other systems, networks and services external to the University via the University’s Internet or other network connections. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: services is unclear. Traffic Direction: external is clear. Location: networks is clear. Location: network is clear. Action: may not is clear.
51. Please note that unauthorized scanning to or from Caltech systems is not permitted. It is a violation of our acceptable use policy. policy source
This policy needs improvement! Traffic Description: Please is unclear. Traffic Description: unauthorized is unclear. Traffic Description: scanning is unclear. Traffic Direction: from is clear. Location: policy is clear. Action: not permitted is clear. Action: violation of is clear. Other: that is clear.
52. Port scanning has legitimate uses in managing networks, but unauthorized port scanning is strictly prohibited. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: unauthorized is unclear. Traffic Description: port scanning is clear. Location: networks is clear. Action: prohibited is clear.
53. Port scanning or security scanning is expressly prohibited unless prior notification to the Queens IT Services Department is made. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Traffic Description: Services is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: prior notification is clear.
54. Port scanning and/or other network scanning is prohibited. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: network scanning is unclear. Location is missing Action: prohibited is clear.
55. Port scanning or security scanning is expressly prohibited unless prior approval is obtained from the Campus Information Technology Services office. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Traffic Direction: from is clear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: approval is clear.
56. The following activities are strictly prohibited, with no exceptions: For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. policy source
This policy needs improvement! Traffic Description: disruption is unclear. Traffic Description: network sniffing is unclear. Traffic Description: pinged floods is clear. Traffic Description: packet spoofing is unclear. Traffic Description: service is unclear. Location is missing Action: prohibited is clear. Policy Exception: with no exceptions is clear. Other: this is clear.
57. The use of TCP or UDP port scanners to scan remote networks without the express written consent of the network administrator is prohibited. policy source
This policy needs improvement! Traffic Description: port scanners is clear. Location: networks is clear. Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: consent of is clear.
58. The user may not use the University's network and/or systems to: Perform any of the following: port scanning, security scanning, network sniffing, keystroke logging. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: security scanning is unclear. Traffic Description: network sniffing is unclear. Location: network is clear. Action: may not is clear.
59. Users must not: Use a port scanning tool targeting either Anderson University's network or any other external network, unless this activity is a part of the user's normal job functions. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Direction: either is clear. Traffic Direction: external is clear. Location: network is clear. Location: network is clear. Action: must not is clear. Policy Exception: unless is clear. Other: any other is clear. Other: this is clear. Other: normal job is unclear.
60. Port scanning or security scanning is expressly prohibited, unless this activity is a part of the employee's normal job/duty. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Other: this is clear. Other: normal job is unclear.
61. The use of port scanning or network administration software by anyone other than authorized network administrators is prohibited. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: software is unclear. Location: network is clear. Action: prohibited is clear. Other: other than is clear. Other: authorized is unclear.
62. Port scanning, security scanning, or vulnerability testing is expressly prohibited unless prior notification to Linfield University ITS is made and approved. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: security scanning is unclear. Traffic Description: vulnerability testing is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Policy Exception: prior notification is clear. Other: approved is unclear.
63. Running a network analysis or testing tool (e.g., port scanning software) is prohibited unless cleared in advance by IT staff. policy source
This policy needs improvement! Traffic Description: port scanning is clear. Traffic Description: software is unclear. Location: network is clear. Action: prohibited is clear. Policy Exception: unless is clear. Other: Running is clear. Other: testing is unclear.
64. The following activities are strictly prohibited on university information technology facilities: Port scanning or vulnerability scanning. policy source
This policy needs improvement! Traffic Description: Port scanning is clear. Traffic Description: vulnerability scanning is unclear. Location: information technology facilities is unclear. Action: prohibited is clear.
65. For example, users must not run password cracking programs, packet sniffers, port scanners, or any other non-approved programs on Texas Tech University Information Resources. policy source
This policy needs improvement! Traffic Description: password cracking is unclear. Traffic Description: programs is unclear. Traffic Description: packet sniffers is unclear. Traffic Description: port scanners is clear. Traffic Description: non-approved is unclear. Traffic Description: programs is unclear. Location is missing Action: must not is clear. Other: run is clear. Other: any other is clear.
66. The following activities are strictly prohibited, with no exceptions: Executing any form of network monitoring which will intercept data not intended for the employee's host, unless this activity is a part of the employee's normal job/duty and with proper authorization. policy source
This policy needs improvement! Traffic Description: network monitoring is unclear. Location is missing Action: prohibited is clear. Policy Exception: with no exceptions is clear. Policy Exception: unless is clear. Policy Exception: proper authorization is clear. Other: intercept data is unclear. Other: not is clear. Other: this is clear. Other: normal job is unclear.
67. The following are examples of misuse of computing resources: Tampering with the university computer network or building wiring or installing any type of electronic equipment or software that could be used to capture or change information intended for someone else. policy source
This policy needs improvement! Traffic Description: software is unclear. Location: computing resources is unclear. Action: misuse is clear. Other: Tampering is unclear. Other: that is clear.
68. Executing any form of network monitoring which will intercept data not intended for the student or employee is forbidden. policy source
This policy needs improvement! Traffic Description: network monitoring is unclear. Location is missing Action: forbidden is clear. Other: intercept data is unclear. Other: not is clear.
69. The use of packet sniffers, password capture applications, keystroke loggers and any other tools that perform such similar behavior or any form of network wiretapping on Computing Resources is prohibited. policy source
This policy needs improvement! Traffic Description: packet sniffers is unclear. Traffic Description: applications is unclear. Traffic Description: keystroke loggers is unclear. Location: network is clear. Location: Computing Resources is unclear. Action: prohibited is clear. Other: any other is clear. Other: that is clear.
70. Attempts to monitor, analyze, or tamper with network data packets that are not explicitly addressed to your computer are prohibited. policy source
This policy needs improvement! Traffic Description: data packets is clear. Traffic Direction: addressed to is clear. Location: network is clear. Action: prohibited is clear. Other: tamper is unclear. Other: that is clear. Other: not is clear.
71. Examples of prohibited uses include, but are not limited to, the following: Monitoring or attempting to monitor another user's data communications. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: prohibited is clear.
72. Don't try to intercept or otherwise monitor any network communications not explicitly intended for you. These include logins, e-mail, user-to-user dialog, and any other network traffic not explicitly intended for you. policy source
This policy needs improvement! Traffic Description: otherwise monitor is unclear. Traffic Description: network traffic is clear. Location is missing Action: Don't is clear. Other: not is clear. Other: These is clear. Other: any other is clear. Other: not is clear.
73. Users may not attempt to intercept, monitor, forge, alter or disrupt another user’s communications or information. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: may not is clear. Other: disrupt is unclear.
74. The following activities are strictly prohibited: Executing any form of network monitoring which will intercept data not intended for the student or employee's host, unless this activity is a part of the employee's normal job/duty. policy source
This policy needs improvement! Traffic Description: network monitoring is unclear. Location is missing Action: prohibited is clear. Policy Exception: unless is clear. Other: intercept data is unclear. Other: not is clear. Other: this is clear. Other: normal job is unclear.
75. Users of Pepperdine University computer and network resources must not: Hinder, monitor or intercept another user's network traffic. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Location: network resources is unclear. Action: must not is clear.
76. Examples of unlawful acts, system or network security violations include but are not limited to the following: Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: traffic is clear. Location: network is clear. Location: network is clear. Action: network security violations is clear. Policy Exception: without is clear. Policy Exception: authorization of is clear. Other: the owner of is clear.
77. Inappropriate Access of User Information: Intercepting or monitoring, or attempting to intercept or monitor, network communications or other communications not intended for that user's access without prior authorization. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: Inappropriate is unclear. Policy Exception: without is clear. Policy Exception: prior authorization is clear. Other: not is clear. Other: that is clear.
78. Uses that interfere with the proper functioning of the University's information technology resources are prohibited. Such inappropriate uses would include but are not limited to insertions of viruses into computer systems, tapping a network or running a "sniffer" program. policy source
This policy needs improvement! Traffic Description: interfere with is unclear. Traffic Description: tapping is unclear. Traffic Description: sniffer is unclear. Traffic Description: program is unclear. Location: information technology resources is unclear. Location: network is clear. Action: prohibited is clear. Action: inappropriate is unclear. Other: that is clear. Other: running is clear.
79. Users WILL NOT Eavesdrop on or intercept other Users’ transmissions. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: WILL NOT is clear.
80. Examples of violations include, but are not limited to: intercepting, monitoring, or retrieving any network communication without authorization. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: violations is clear. Policy Exception: without authorization is clear.
81. Unacceptable uses include, but are not limited to: Disruption to or performing unauthorized monitoring of electronic communications. policy source
This policy needs improvement! Traffic Description: Disruption is unclear. Traffic Description: unauthorized is unclear. Location is missing Action: Unacceptable is unclear.
82. The following activities and behaviors are prohibited: The interception or attempted interception of communications by parties not explicitly intended to receive them. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location is missing Action: prohibited is clear. Other: not is clear.
83. Examples of system or network security violations include, without limitation, the following: Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: traffic is clear. Location: network is clear. Location: network is clear. Action: network security violations is clear. Policy Exception: without is clear. Policy Exception: authorization of is clear. Other: without limitation is unclear. Other: the owner of is clear.
84. Unacceptable uses include, but are not limited to, the following: Intercepting or altering network packets. policy source
This policy needs improvement! Traffic Description: network packets is clear. Location is missing Action: Unacceptable is unclear.
85. The unauthorized use of IAS's information technology resources is prohibited and, in some cases, may be a violation of a local, state, federal or international laws and regulations. Inappropriate use of IAS's information technology resources includes, but is not limited to, the following: Using network sniffer applications on IAS's computer network. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: sniffer is unclear. Traffic Description: applications is unclear. Location: information technology resources is unclear. Location: information technology resources is unclear. Location: network is clear. Location: network is clear. Action: prohibited is clear. Action: may be is clear. Action: violation of is clear. Action: Inappropriate is unclear.
86. Unacceptable activities include, but are not limited to: Packet and content sniffing. policy source
This policy needs improvement! Traffic Description: Packet is clear. Traffic Description: sniffing is unclear. Location is missing Action: Unacceptable is unclear.
87. Users may not run sniffers or any other software or hardware designed to intercept packets or to disrupt the security or operation of the campus network. policy source
This policy needs improvement! Traffic Description: sniffers is unclear. Traffic Description: software is unclear. Location: campus network is clear. Action: may not is clear. Other: run is clear. Other: any other is clear. Other: intercept packets is unclear. Other: disrupt the security is unclear.
88. Network administration tools are not allowed without the consent of ITS. This includes, but is not limited to: Network monitors, Sniffers. policy source
This policy needs improvement! Traffic Description: Network monitors is unclear. Traffic Description: Sniffers is unclear. Location: Network is clear. Action: not allowed is clear. Policy Exception: without is clear. Policy Exception: consent of is clear. Other: This is clear.
89. Some activities deemed inappropriate include, but are not limited to: Engaging in network packet sniffing or snooping. policy source
This policy needs improvement! Traffic Description: packet sniffing is unclear. Location: network is clear. Action: inappropriate is unclear.
90. The following list, while not exhaustive, contains examples of what TCU deems to be improper use: Attempts to monitor, analyze, or tamper with network data packets. policy source
This policy needs improvement! Traffic Description: data packets is clear. Location: network is clear. Action: improper is unclear. Other: not is clear. Other: tamper is unclear.
91. The University Network must not be deliberately used by a User for activities having, or likely to have, any of the following characteristics: denying access to the University Network and its services to other users. policy source
This policy needs improvement! Traffic Description: services is unclear. Location: University Network is clear. Location: University Network is clear. Action: must not is clear. Other: used by is clear.
92. CIS will take action to contain devices that exhibit the behaviors indicated below, and allow normal traffic and central services to resume: exhibiting a pattern of network traffic that disrupts centrally provided services. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: normal traffic is unclear. Traffic Description: central services is unclear. Traffic Description: network traffic is clear. Traffic Description: centrally provided services is unclear. Location is missing Action: action is unclear. Action: allow is clear. Other: that is clear. Other: that is clear. Other: disrupts is unclear.
93. Users must not intentionally disrupt the campus electronic communication systems or obstruct the work of other users by interfering with the accounts of others or knowingly consuming inordinately large amounts of system resources or in any other way. policy source
This policy needs improvement! Traffic Amount: large amounts of is unclear. Location: system resources is unclear. Action: must not is clear. Other: disrupt is unclear.
94. Users are prohibited from accessing or using IT Resources to: Engage in wasteful use of IT Resources or which unfairly monopolizes them to the exclusion of others. policy source
This policy needs improvement! Traffic Description: wasteful use of is unclear. Location: IT Resources is unclear. Location: IT Resources is unclear. Action: prohibited from is clear. Action: unfairly is unclear.
95. Any use of the GSU network that consumes so many resources as to noticeably degrade services to others will be reviewed by the administrator of the department where the problem is occurring and Information Technology Services (ITS). policy source
This policy needs improvement! Traffic Description: noticeably is unclear. Traffic Amount: so many is unclear. Location: network is clear. Action is missing. Other: that is clear. Other: degrade services is unclear.
96. No individual or group may degrade or attempt to degrade the performance of ISU Information Technology Resources and Systems. policy source
This policy needs improvement! Traffic Description: ISU is clear. Traffic Direction: indicated by ISU. Location: Information Technology Resources is unclear. Action is missing. Other: degrade the is unclear.
97. Users may not use information systems irresponsibly, wastefully, or in a manner that adversely affects the work or equipment of others at Northeastern or on the Internet. policy source
This policy needs improvement! Traffic Description: adversely is unclear. Location: information systems is unclear. Location: the Internet is clear. Action: may not is clear. Other: that is clear. Other: affects is unclear.
98. In order to allow normal traffic and central services to resume, IT will take action to contain devices that exhibit the behaviors indicated below: exhibiting a pattern of network traffic that disrupts centrally provided services. policy source
This policy needs improvement! Traffic Description: normal traffic is unclear. Traffic Description: central services is unclear. Traffic Description: devices is unclear. Traffic Description: network traffic is clear. Traffic Description: centrally provided services is unclear. Location is missing Action: allow is clear. Action: action is unclear. Other: that is clear. Other: that is clear. Other: disrupts is unclear.
99. Any networked devices or services that are detected and verified to degrade the quality of service on the network will result in termination of network service of that device until the cause of the problem is corrected. policy source
This policy needs improvement! Traffic Description: networked devices is unclear. Traffic Description: services is unclear. Traffic Description: service is unclear. Traffic Description: service is unclear. Traffic Description: device is unclear. Location: network is clear. Location: network is clear. Action: cause is clear. Other: that is clear. Other: degrade the is unclear. Other: that is clear.
100. Activities that interfere with the operation of the network are prohibited. These include but are not limited to the propagation of computer worms, network sweeps, network probing, viruses or Trojan horses. policy source
This policy needs improvement! Traffic Description: interfere with is unclear. Traffic Description: probing is unclear. Location: network is clear. Location: network is clear. Location: network is clear. Action: prohibited is clear. Other: that is clear. Other: These is clear.
101. Under no circumstances may faculty, students, staff, or others use University information technology in ways that are illegal, that threaten the University's tax-exempt or other status, or that interfere with reasonable use by other members of the University community. policy source
This policy needs improvement! Traffic Description: interfere with is unclear. Traffic Description: reasonable use is unclear. Location: information technology is unclear. Action is missing. Other: that is clear. Other: that is clear. Other: that is clear.
102. Students wishing to configure their machines as servers, have fixed IP addresses, or run other operating system software than the conventional Microsoft Windows or Macintosh network client systems must first consult with ITS staff. Incorrectly configured machines can cause serious disruptions of the campus network. policy source
This policy needs improvement! Traffic Description: configure is clear. Traffic Description: servers is unclear. Traffic Description: IP addresses is clear. Traffic Description: software is unclear. Traffic Description: configured is clear. Location: network is clear. Location: campus network is clear. Action: must is clear. Other: their is clear. Other: run is clear. Other: cause serious is unclear.
103. A client machine may also be disconnected if the client's activity adversely affects the network's performance or is considered a security risk to protected data or the College. policy source
This policy needs improvement! Traffic Description: client's is unclear. Traffic Description: adversely is unclear. Location: network is clear. Action: protected data is unclear. Other: affects is unclear.
104. Residents shall not use ResNet in a manner that intentionally or negligently disrupts normal network use and service. Such disruption includes, but is not limited to, intentionally or negligently propagating computer viruses, sending offensive messages, knowingly causing system crashes, denying reasonable use of UNLV Housing and Residential Life network and computer resources to others, violating others’ personal privacy, and accessing without the proper authority protected and/or private network resources. policy source
This policy needs improvement! Traffic Description: service is unclear. Traffic Description: disruption is unclear. Traffic Description: reasonable use of is unclear. Traffic Description: personal is unclear. Location: network is clear. Location: causing system crashes is unclear. Location: Housing and Residential Life network is clear. Location: computer resources is unclear. Location: private network resources is clear. Action: shall not is clear. Action: protected is unclear. Policy Exception: without is clear. Policy Exception: proper authority is clear. Other: that is clear. Other: disrupts is unclear.
105. "RezNet" users are prohibited from provisioning network services on their privately owned computers, including but not limited to HTTP, Peer-to-peer apps, Chat, DHCP, DNS, FTP, IRC, NNTP, POP3, SMTP, Telnet, WINS, etc. policy source
This policy needs improvement! Traffic Description: privately owned is unclear. Traffic Description: HTTP is clear. Traffic Description: Peer-to-peer is unclear. Traffic Description: Chat is unclear. Traffic Description: DHCP is clear. Traffic Description: DNS is clear. Traffic Description: FTP is clear. Traffic Description: IRC is clear. Traffic Description: NNTP is clear. Traffic Description: POP3 is clear. Traffic Description: SMTP is clear. Traffic Description: Telnet is clear. Traffic Description: WINS is unclear. Traffic Direction: indicated by HTTP. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DNS. Traffic Direction: indicated by FTP. Traffic Direction: indicated by IRC. Traffic Direction: indicated by NNTP. Traffic Direction: indicated by POP3. Traffic Direction: indicated by SMTP. Traffic Direction: indicated by Telnet. Location is missing Action: prohibited from is clear. Other: provisioning network services is unclear. Other: their is clear.
106. You are not allowed to offer alternate methods of access to UF’s IT resources, including by means such as modems and virtual private networks (VPNs) or network infrastructure services such as Domain Name System (DNS) and Dynamic Host Control Protocol (DHCP). policy source
This policy needs improvement! Traffic Description: modems is clear. Traffic Description: VPNs is clear. Traffic Description: services is unclear. Traffic Description: Domain is unclear. Traffic Description: DNS is clear. Traffic Description: DHCP is clear. Traffic Direction: indicated by DNS. Traffic Direction: indicated by DHCP. Location: IT resources is unclear. Location: virtual private networks is clear. Location: network is clear. Action: not allowed to is clear.
107. Using the university network to provide any service that is visible off campus without prior UNIT approval, is prohibited. This applies to services such as, but not limited to, HTTP (Web), SSH, FTP, IRC, email, private VPN, etc. policy source
This policy needs improvement! Traffic Description: service is unclear. Traffic Description: services is unclear. Traffic Description: HTTP is clear. Traffic Description: SSH is clear. Traffic Description: FTP is clear. Traffic Description: IRC is clear. Traffic Description: private is unclear. Traffic Direction: indicated by HTTP. Traffic Direction: indicated by SSH. Traffic Direction: indicated by FTP. Traffic Direction: indicated by IRC. Location: university network is clear. Location: visible off campus is clear. Location: VPN is clear. Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: approval is clear. Other: that is clear. Other: This is clear.
108. Using the university network to provide any service that is visible off campus is prohibited. This applies to services such as, but not limited to, HTTP (Web), FTP, IRC, peer-to-peer (p2p) multimedia sharing, game servers and email. policy source
This policy needs improvement! Traffic Description: service is unclear. Traffic Description: services is unclear. Traffic Description: HTTP is clear. Traffic Description: FTP is clear. Traffic Description: IRC is clear. Traffic Description: peer-to-peer is unclear. Traffic Description: p2p is unclear. Traffic Description: game servers is unclear. Traffic Direction: indicated by HTTP. Traffic Direction: indicated by FTP. Traffic Direction: indicated by IRC. Location: university network is clear. Location: visible off campus is clear. Action: prohibited is clear. Other: that is clear. Other: This is clear.
109. Baylor University does not allow network users to run unauthorized SMTP, DHCP, DNS, or directory services on any networks. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: SMTP is clear. Traffic Description: DHCP is clear. Traffic Description: DNS is clear. Traffic Description: directory services is unclear. Traffic Direction: indicated by SMTP. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DNS. Location: network is clear. Location: networks is clear. Action: not allow is clear. Other: run is clear.
110. Establishing a server or providing a service that over-utilizes the shared bandwidth is prohibited. FTP, Web servers, e-mail servers, and Peer-to-peer are examples of server programs. policy source
This policy needs improvement! Traffic Description: server is unclear. Traffic Description: service is unclear. Traffic Description: FTP is clear. Traffic Description: Web servers is unclear. Traffic Description: servers is unclear. Traffic Description: Peer-to-peer is unclear. Traffic Description: server is unclear. Traffic Description: programs is unclear. Traffic Amount: shared bandwidth is clear. Traffic Direction: indicated by FTP. Location is missing Action: prohibited is clear. Other: that is clear.
111. Devices connecting to the University’s data network must use the central Dynamic Host Control Protocol server. policy source
This policy needs improvement! Traffic Description: Devices is unclear. Traffic Description: server is unclear. Location: data network is clear. Action: must is clear.
112. Devices connecting to the University’s data network must use the central Domain Name Service (DNS). policy source
This policy needs improvement! Traffic Description: Devices is unclear. Traffic Description: Domain is unclear. Traffic Description: Service is unclear. Traffic Description: DNS is clear. Traffic Direction: indicated by DNS. Location: data network is clear. Action: must is clear.
113. Also, providing server services for DHCP/BOOTP, NAT, NTP, FTP, IRC and NFS is prohibited. policy source
This policy needs improvement! Traffic Description: server services is unclear. Traffic Description: DHCP is clear. Traffic Description: BOOTP is clear. Traffic Description: NTP is clear. Traffic Description: FTP is clear. Traffic Description: IRC is clear. Traffic Description: NFS is clear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by BOOTP. Traffic Direction: indicated by NTP. Traffic Direction: indicated by FTP. Traffic Direction: indicated by IRC. Traffic Direction: indicated by NFS. Location is missing Action: prohibited is clear.
114. In no case shall the following types of servers (except those maintained by CIT for the express purposes delineated) be connected to the network: DNS, DHCP, BOOTP, or any other server that manages network addresses. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Description: DNS is clear. Traffic Description: DHCP is clear. Traffic Description: BOOTP is clear. Traffic Description: server is unclear. Traffic Description: network addresses is clear. Traffic Direction: indicated by DNS. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by BOOTP. Location: network is clear. Action: shall is clear. Other: those is clear. Other: any other is clear. Other: that is clear.
115. To ensure network stability and security, it is prohibited for any user or IT support person to run a local DHCP server (on a computer, printer, etc.) Devices that are (mis)configured to distribute IP address will be blocked from the network. policy source
This policy needs improvement! Traffic Description: DHCP is clear. Traffic Description: server is unclear. Traffic Description: printer is clear. Traffic Description: Devices is unclear. Traffic Description: IP address is clear. Traffic Direction: indicated by DHCP. Traffic Direction: from is clear. Location: network is clear. Location: network is clear. Action: prohibited is clear. Action: blocked is clear. Other: run is clear. Other: that is clear.
116. All machines connected to the university network must be registered with an ACCC operated or approved domain name server. Machines found connected that are not properly registered will be considered security threats and will have their network access blocked. policy source
This policy needs improvement! Traffic Description: registered is clear. Traffic Description: domain is unclear. Traffic Description: server is unclear. Traffic Amount: not properly registered will is clear. Location: university network is clear. Action: must be is clear. Action: blocked is clear. Other: approved is unclear. Other: their is clear.
117. UNLV Housing and Residential Life network connections are provided for client use only. Servers are not permitted. Servers include any device that offers services over the network or that allows incoming network connections. policy source
This policy needs improvement! Traffic Description: client use is unclear. Traffic Description: Servers is unclear. Traffic Description: Servers is unclear. Traffic Description: device is unclear. Traffic Description: services is unclear. Traffic Direction: incoming is clear. Location: Housing and Residential Life network is clear. Location: network is clear. Location: network is clear. Action: not permitted is clear. Action: allows is clear. Other: that is clear. Other: that is clear.
118. The following examples of types of devices would require approval: Services that answer broadcast messages, such as DHCP and BOOTP. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: Services is unclear. Traffic Description: DHCP is clear. Traffic Description: BOOTP is clear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by BOOTP. Location is missing Action: require is clear. Policy Exception: approval is clear. Other: that is clear.
119. Unacceptable Activities: Running unauthorized servers or daemons, i.e., SMTP, DNS, DHCP, etc., on the network. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: servers is unclear. Traffic Description: SMTP is clear. Traffic Description: DNS is clear. Traffic Description: DHCP is clear. Traffic Direction: indicated by SMTP. Traffic Direction: indicated by DNS. Traffic Direction: indicated by DHCP. Location: network is clear. Action: Unacceptable is unclear. Other: Running is clear.
120. Non-university owned and operated FTP servers are not permitted. policy source
This policy needs improvement! Traffic Description: FTP is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by FTP. Location is missing Action: not permitted is clear.
121. All services on the firewalls that are not needed will be disabled, including other network access, user shells and applications. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: applications is unclear. Location: firewalls is clear. Action: not needed is clear. Action: disabled is clear. Other: that is clear.
122. All IllinoisNet traffic shall be identifiable as to its source and anonymous traffic is disallowed for security reasons. policy source
This policy needs improvement! Traffic Description: traffic is clear. Traffic Description: anonymous traffic is unclear. Location is missing Action: shall be is clear. Action: disallowed is clear.
123. All UMSL network traffic to and from the Internet must go through the firewall. Any network traffic going around the firewall must be accounted for and explicitly allowed by the Computer Security Incident Response Team (CSIRT). policy source
This policy is well written! Traffic Description: network traffic is clear. Traffic Description: network traffic is clear. Traffic Direction: from is clear. Location: the Internet is clear. Location: firewall is clear. Location: firewall is clear. Action: must is clear. Action: must be is clear. Action: allowed is clear.
124. Inbound Internet traffic will only be allowed using protocols, addresses and ports approved by DoIT. Other inbound traffic will be blocked at the network perimeter. policy source
This policy is well written! Traffic Description: traffic is clear. Traffic Description: addresses is clear. Traffic Description: traffic is clear. Traffic Direction: Inbound is clear. Traffic Direction: inbound is clear. Location: network perimeter is clear. Action: be allowed is clear. Action: blocked is clear. Other: approved is unclear.
125. Systems must be protected by a firewall which allows only those incoming connections necessary to fulfill the business requirements of that system. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Traffic Direction: incoming is clear. Location: firewall is clear. Action: must be is clear. Action: protected by is unclear. Action: allows is clear. Other: those is clear. Other: that is clear.
126. Perimeter Firewalls will allow access to the following for outbound and inbound network traffic: Outbound: Allow ALL network traffic to hosts and services outside of the perimeter. Inbound: Only secure applications and specific services which support the Georgia Southern University mission will be allowed access from the perimeter. All in-bound real-time external connections to University internal data center networks must pass through a firewall. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: network traffic is clear. Traffic Description: services is unclear. Traffic Description: applications is unclear. Traffic Description: services is unclear. Traffic Direction: outbound is clear. Traffic Direction: inbound is clear. Traffic Direction: Outbound is clear. Traffic Direction: Inbound is clear. Traffic Direction: from is clear. Traffic Direction: external is clear. Traffic Direction: internal is clear. Location: Perimeter Firewalls is clear. Location: the perimeter is clear. Location: the perimeter is clear. Location: data center networks is clear. Location: firewall is clear. Action: allow is clear. Action: be allowed is clear. Action: must is clear. Other: outside of is clear.
127. The perimeter firewall permits the following outbound and inbound network traffic: Outbound – Allow all internet traffic to hosts and services outside of the campus with the exception of known security vulnerabilities, servers that generate email messages with a non-campus destination, or other exceptions. Inbound – Users may only access defined services that support the university mission. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: traffic is clear. Traffic Description: services is unclear. Traffic Description: security vulnerabilities is unclear. Traffic Description: servers is unclear. Traffic Description: services is unclear. Traffic Direction: outbound is clear. Traffic Direction: inbound is clear. Traffic Direction: Outbound is clear. Traffic Direction: Inbound is clear. Location: The perimeter firewall is clear. Action: Allow is clear. Policy Exception: exception is clear. Policy Exception: exceptions is clear. Other: outside of is clear. Other: that is clear. Other: that is clear.
128. All external and wireless connections to University networks must pass through a network firewall. In addition, all network connections entering a high security network must pass through a network firewall. Any change to an external connection or to the configuration of the firewall must be adequately tested and documented according to the ITS Network Firewall Standard. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Traffic Direction: external is clear. Traffic Direction: external is clear. Location: University networks is clear. Location: network firewall is clear. Location: network is clear. Location: security network is clear. Location: network firewall is clear. Location: firewall is clear. Action: must is clear. Action: must is clear. Action: must be is clear. Other: tested is unclear.
129. The University’s perimeter firewall permits the following outbound and inbound Internet traffic: Outbound – All internet traffic to hosts and services outside of Millersville University’s networks except those specifically identified and blocked as malicious sites. Inbound – Internet traffic that supports the mission of the University and is in accordance with defined policies. policy source
This policy needs improvement! Traffic Description: traffic is clear. Traffic Description: traffic is clear. Traffic Description: services is unclear. Traffic Description: traffic is clear. Traffic Direction: outbound is clear. Traffic Direction: inbound is clear. Traffic Direction: Outbound is clear. Traffic Direction: Inbound is clear. Location: perimeter firewall is clear. Location: networks is clear. Action: blocked is clear. Action: malicious is unclear. Other: outside of is clear. Other: those is clear. Other: that is clear.
130. The following type of network traffic should always be blocked: Inbound traffic from a non-authenticated source system with a destination address of the firewall system itself. Inbound or Outbound network traffic containing a source or destination address of 127.0.0.1 (localhost). Inbound or Outbound network traffic containing a source or destination address of 0.0.0.0. Inbound traffic containing IP Source Routing information. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: traffic is clear. Traffic Description: non-authenticated is unclear. Traffic Description: destination address is clear. Traffic Description: network traffic is clear. Traffic Description: destination address is clear. Traffic Description: network traffic is clear. Traffic Description: destination address is clear. Traffic Description: traffic is clear. Traffic Description: IP is clear. Traffic Direction: Inbound is clear. Traffic Direction: from is clear. Traffic Direction: Inbound is clear. Traffic Direction: Outbound is clear. Traffic Direction: Inbound is clear. Traffic Direction: Outbound is clear. Traffic Direction: Inbound is clear. Location: firewall is clear. Action: blocked is clear.
131. CIS will take action to contain devices that exhibit the behaviors indicated below, and allow normal traffic and central services to resume: imposing an exceptional load on a campus service. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: normal traffic is unclear. Traffic Description: central services is unclear. Traffic Description: campus service is unclear. Location is missing Action: action is unclear. Action: allow is clear. Action: exceptional is clear. Other: that is clear.
132. Information Services operates and maintains computers, network systems and servers, and is expected to maintain an acceptable level of performance and must assure that frivolous, excessive, or inappropriate use of the resources by one person or a few people does not degrade performance for others. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Amount: excessive is unclear. Location: network systems is unclear. Location: the resources is clear. Action: expected to is clear. Action: must is clear. Action: inappropriate is unclear. Other: that is clear. Other: not is clear. Other: degrade performance is unclear.
133. Behaviors that inhibit or have the potential to inhibit the ability of others to utilize shared computing resources are considered policy violations. Such behaviors include but are not limited to: Exceeding limits for resource usage (e.g. disk space, bandwidth, CPU time). policy source
This policy needs improvement! Traffic Amount: Exceeding limits is clear. Traffic Amount: bandwidth is clear. Location: shared computing resources is unclear. Action: policy violations is clear. Other: that is clear.
134. Copying or transmitting excessive amounts of data is forbidden. policy source
This policy needs improvement! Traffic Amount: excessive is unclear. Location is missing Action: forbidden is clear. Other: transmitting is unclear.
135. Excessive or sustained bandwidth consumption may burden the network and such usage may be restricted. policy source
This policy needs improvement! Traffic Amount: Excessive is unclear. Traffic Amount: bandwidth is clear. Location: network is clear. Action: may burden is clear. Action: may be is clear. Action: restricted is unclear.
136. The following activities are prohibited without the expressed written consent of Fordham IT: Using traffic-intensive applications that may cause problems within the network or diluting the level of service to other users. policy source
This policy needs improvement! Traffic Description: traffic is clear. Traffic Description: applications is unclear. Traffic Description: service is unclear. Location: network is clear. Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: consent of is clear. Other: that is clear. Other: cause problems is unclear.
137. Applications that require large amounts of bandwidth, or are sensitive to changes in signal quality and strength may not be appropriate for wireless access. policy source
This policy needs improvement! Traffic Description: Applications is unclear. Traffic Description: wireless access. is clear. Traffic Amount: large amounts of is unclear. Traffic Amount: bandwidth is clear. Location is missing Action: require is clear. Action: may not is clear. Other: that is clear.
138. Providing services or running applications that consume excessive bandwidth or impede others' use of the Harvard network is prohibited without authorization. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: applications is unclear. Traffic Amount: excessive is unclear. Traffic Amount: bandwidth is clear. Location: network is clear. Action: prohibited is clear. Policy Exception: without authorization is clear. Other: running is clear. Other: that is clear.
139. Extensive use of new applications that require very large amounts of bandwidth on the campus backbone must be discussed with Technology Services beforehand, so that appropriate planning can take place. policy source
This policy needs improvement! Traffic Description: applications is unclear. Traffic Amount: large amounts of is unclear. Traffic Amount: bandwidth is clear. Location: the campus is clear. Action: require is clear. Action: must be is clear. Other: that is clear. Other: that is clear.
140. Large-scale distribution of digital files can cause excessive network loading. The University reserves the right to automatically manage and restrict excessive use of network bandwidth. policy source
This policy needs improvement! Traffic Amount: excessive is unclear. Traffic Amount: network bandwidth is clear. Location is missing Action: digital is clear. Other: cause excessive network loading is unclear.
141. Examples of inappropriate use include participating in bandwidth-consuming activities that are not academic or instructional in nature. policy source
This policy needs improvement! Traffic Amount: bandwidth-consuming activities is clear. Location is missing Action: inappropriate is unclear. Other: that is clear. Other: not is clear.
142. Any person operating a network-intensive application or a defective computer that overloads University networks will be notified and steps will be taken to protect the overall University network. policy source
This policy needs improvement! Traffic Description: application is unclear. Traffic Description: overloads is unclear. Location: network is clear. Location: University networks is clear. Location: University network is clear. Action: notified is unclear. Action: steps is unclear. Action: protect is unclear. Other: that is clear.
143. Excessive or improper use of network resources that inhibits or interferes with use by others is prohibited and will be cause for action by CIT, which may include restricting, limiting, or disabling network access. policy source
This policy needs improvement! Traffic Description: interferes with is unclear. Traffic Amount: Excessive is unclear. Location: network resources is unclear. Action: improper is unclear. Action: prohibited is clear. Action: cause is clear. Action: action is unclear. Action: restricting is unclear. Action: limiting is unclear. Action: disabling is clear. Other: that is clear.
144. Excessive use of network resources which inhibits or interferes with the use of the network by others is not permitted. policy source
This policy needs improvement! Traffic Description: interferes with is unclear. Traffic Amount: Excessive is unclear. Location: network resources is unclear. Location: network is clear. Action: not permitted is clear.
145. In making acceptable use of resources, individuals covered by this policy must not: Waste shared computing or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings. policy source
This policy needs improvement! Traffic Description: program is unclear. Traffic Amount: excessive is unclear. Traffic Amount: mass is unclear. Location: shared computing is unclear. Location: network resources is unclear. Action: must not is clear. Other: this is clear.
146. Although there is no set bandwidth, disk space, CPU time, or other limit applicable to all uses of university computing resources, the university may require users of those resources to limit or refrain from specific uses in accordance with this standard. policy source
This policy needs improvement! Traffic Amount: bandwidth is clear. Location: computing resources is unclear. Action: limit is unclear. Action: require is clear. Action: limit is unclear. Action: refrain from is clear. Other: there is clear. Other: those is clear. Other: this is clear.
147. Prohibited Uses of University Computer Resources: Unauthorized use (for example, modifying the network) or excessive personal use (for example, use that overburdens a network, results in substantial use of system capacity, or otherwise subjects the institution to increased costs or risks). policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: personal use is unclear. Traffic Description: overburdens is unclear. Traffic Description: otherwise subjects is unclear. Traffic Amount: excessive is unclear. Traffic Amount: substantial is unclear. Location: network is clear. Location: network is clear. Action: Prohibited is clear. Other: modifying is unclear. Other: that is clear.
148. Examples of inappropriate uses of Seton Hall University computer facilities include, but are not limited to: Activities that damage or disrupt hardware or communications, such as irresponsible or destructive use of equipment, the use of unauthorized network equipment, including the use of wireless equipment that operates above the 900-Megahertz range, virus creation and propagation, wasting system resources and overloading networks with excessive data. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: overloading is unclear. Traffic Amount: excessive is unclear. Location: facilities is unclear. Location: network is clear. Location: system resources is unclear. Location: networks is clear. Action: inappropriate is unclear. Action: irresponsible is unclear. Other: that is clear. Other: disrupt is unclear. Other: that is clear.
149. All users of University computing resources must: Respect the limited capacity of the University's computer resources, and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location: computing resources is unclear. Location: computer resources is unclear. Action: must: is clear. Action: limited is unclear. Action: limit is unclear. Action: interfere is unclear. Policy Exception: unreasonably is clear. Other: not is clear. Other: those is clear.
150. You agree not to obstruct any others' work by using unnecessarily large amounts of network resources (such as bandwidth and storage space) or deliberately act in a manner that will cause harm to the network. policy source
This policy needs improvement! Traffic Description: unnecessarily is unclear. Traffic Amount: large amounts of is unclear. Traffic Amount: bandwidth is clear. Location: network resources is unclear. Location: network is clear. Action: agree not to is clear. Other: any others is clear. Other: that is clear. Other: cause harm to is unclear.
151. Any deliberate wasteful use of resources is irresponsible; it encroaches on other’s use of facilities and deprives them of resources. Printing of large unnecessary listing and the playing of games solely for entertainment are examples of such abuse. policy source
This policy needs improvement! Traffic Description: wasteful use of is unclear. Traffic Description: games is unclear. Location: facilities is unclear. Action: irresponsible is unclear. Action: unnecessary is unclear. Action: abuse is clear.
152. Avoid excessive personal use. Some uses will be plainly excessive in all environments, but the extent to which other uses become excessive may vary. policy source
This policy needs improvement! Traffic Description: personal use is unclear. Traffic Amount: excessive is unclear. Traffic Amount: excessive is unclear. Traffic Amount: excessive is unclear. Location is missing Action: Avoid is clear.
153. Examples of specific violations include, but are not limited to: Excessive use of information technology resources, especially when it impedes the mission-related activities of other users, or adversely affects system availability or performance; policy source
This policy needs improvement! Traffic Description: adversely is unclear. Traffic Amount: Excessive is unclear. Location: information technology resources is unclear. Action: violations is clear. Other: affects is unclear.
154. Excessive use of the network is prohibited and subject to restrictions. Excessive use is defined as using an amount of network resources that inhibits other people's computers from being able to use the network. policy source
This policy needs improvement! Traffic Amount: Excessive is unclear. Traffic Amount: Excessive is unclear. Traffic Direction: from is clear. Location: network is clear. Location: network resources is unclear. Location: network is clear. Action: prohibited is clear. Other: that is clear.
155. Users are not permitted to: Engage in excessive use of system information technology, including but not limited to network capacity. policy source
This policy needs improvement! Traffic Amount: excessive is unclear. Location: network is clear. Action: not permitted to is clear.
156. Prohibited Uses of University Computer Resources: Unauthorized or excessive personal use. Use may be excessive if it overburdens a network, results in substantial use of system capacity, or otherwise subjects the institution to increased costs or risks. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: personal use is unclear. Traffic Description: overburdens is unclear. Traffic Description: otherwise subjects is unclear. Traffic Amount: excessive is unclear. Traffic Amount: excessive is unclear. Traffic Amount: substantial is unclear. Location: network is clear. Action: Prohibited is clear. Action: may be is clear.
157. Users WILL NOT Use without authorization any device or application that consumes a disproportionate amount of network bandwidth. policy source
This policy needs improvement! Traffic Description: device is unclear. Traffic Description: application is unclear. Traffic Amount: disproportionate amount of is unclear. Traffic Amount: network bandwidth is clear. Location is missing Action: WILL NOT is clear. Policy Exception: without authorization is clear. Other: that is clear.
158. We ask that you be careful how you use computing resources, especially shared finite resources (e.g., dial-in modem time, disk space, or Internet bandwidth), where selfish behavior on the part of a few can prevent many others from doing their work. policy source
This policy needs improvement! Traffic Amount: bandwidth is clear. Traffic Direction: from is clear. Location: computing resources is unclear. Location: shared finite resources is unclear. Action is missing. Other: that is clear. Other: their is clear.
159. You will not generate excessive network traffic in so much that it interferes with another user's ability to utilize the network. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: interferes with is unclear. Traffic Amount: excessive is unclear. Location: network is clear. Action: will not is clear. Other: that is clear.
160. If your bandwidth usage is excessive to the point of causing network degradation, your Internet connection may be temporarily disabled while we work with you to investigate the cause of the problem. policy source
This policy needs improvement! Traffic Amount: bandwidth usage is clear. Traffic Amount: excessive is unclear. Traffic Amount: causing network degradation is clear. Location is missing Action: may be is clear. Action: disabled is clear. Action: cause is clear.
161. Generating excessive network traffic, including spamming, certain file-sharing applications and denial-of-service, is prohibited. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: file-sharing is unclear. Traffic Description: applications is unclear. Traffic Description: service is unclear. Traffic Amount: excessive is unclear. Location is missing Action: prohibited is clear.
162. Colby College ITS policies prohibit disruptive or abusive behavior on the network, which includes but is not limited to such actions as: Interfering or tampering with network or computer operation on the network, such as misconfiguration and oversubscription of services or bandwidth policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Amount: bandwidth is clear. Location: network is clear. Location: network is clear. Location: network is clear. Action: disruptive is unclear. Action: abusive is unclear. Action: actions is unclear. Other: tampering is unclear.
163. The running of programs, services, systems, processes or servers by a single user, or group of users, that may substantially degrade network performance or accessibility will not be allowed. policy source
This policy needs improvement! Traffic Description: programs is unclear. Traffic Description: services is unclear. Traffic Description: servers is unclear. Traffic Description: substantially is unclear. Location: network is clear. Action: will not is clear. Other: running of is clear. Other: that is clear. Other: degrade is unclear.
164. Providing services or running applications which consume excessive bandwidth on the HMS Network without authorization is prohibited. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: applications is unclear. Traffic Amount: excessive is unclear. Traffic Amount: bandwidth is clear. Location: Network is clear. Action: prohibited is clear. Policy Exception: without authorization is clear. Other: running is clear.
165. Computing equipment found to be generating unacceptable amounts of traffic, emitting protocol fragments with an intent to deny services to other network users, or generate substantially sequential access to a range of ports or network addresses shall be automatically disconnected from the network. policy source
This policy needs improvement! Traffic Description: traffic is clear. Traffic Description: deny services is unclear. Traffic Description: substantially is unclear. Traffic Description: network addresses is clear. Traffic Direction: from is clear. Location: Computing equipment is unclear. Location: network is clear. Location: network is clear. Action: unacceptable is unclear. Action: shall be is clear.
166. If high bandwidth applications for recreational use of our network are identified, they will be restricted or blocked. policy source
This policy needs improvement! Traffic Description: applications is unclear. Traffic Description: recreational is unclear. Traffic Amount: high bandwidth is clear. Location: network is clear. Action: restricted is unclear. Action: blocked is clear. Other: they is clear.
167. Due to potential jamming and interference issues, critical systems must not be attached to the wireless network. policy source
This policy needs improvement! Traffic Description is missing. Traffic Amount is missing. Location: critical systems is unclear. Location: wireless network is clear. Action: must not is clear.
168. In order to allow normal traffic and central services to resume, IT will take action to contain devices that exhibit the behaviors indicated below: imposing an exceptional load on a campus service. policy source
This policy needs improvement! Traffic Description: normal traffic is unclear. Traffic Description: central services is unclear. Traffic Description: devices is unclear. Traffic Description: campus service is unclear. Location is missing Action: allow is clear. Action: action is unclear. Action: exceptional is clear. Other: that is clear.
169. Activities considered to be in conflict with this policy include, but are not limited to, the following: Overloading computers or networks with excessive data. policy source
This policy needs improvement! Traffic Description: Overloading is unclear. Traffic Amount: excessive is unclear. Location: networks is clear. Action: in conflict with is clear. Other: this is clear.
170. User should not engage in activities that consume excessive amounts of network bandwidth. policy source
This policy needs improvement! Traffic Amount: excessive is unclear. Traffic Amount: network bandwidth is clear. Location is missing Action: should not is clear. Other: that is clear.
171. Using a computer connected to the Student ResNet to provide services that result in large amounts of inbound/outbound traffic is prohibited. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: traffic is clear. Traffic Amount: large amounts of is unclear. Traffic Direction: inbound is clear. Traffic Direction: outbound is clear. Location is missing Action: prohibited is clear. Other: that is clear.
172. The following are examples of activities that do result in high bandwidth use and should be limited or eliminated: Computers that act as Web servers and distribute large data files, usually video, music and games. policy source
This policy needs improvement! Traffic Description: Web servers is unclear. Traffic Description: games is unclear. Traffic Amount: high bandwidth use is clear. Location is missing Action: limited is unclear. Action: eliminated is unclear. Other: that is clear. Other: that is clear. Other: act as is unclear.
173. The following examples of types of devices would require approval: High bandwidth devices (averaging more than 1 GB/day for a week). policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: devices is unclear. Traffic Amount: High bandwidth is clear. Location is missing Action: require is clear. Action Duration: day is clear. Action Duration: week is clear. Policy Exception: approval is clear. Other: more than is clear.
174. Unacceptable Activities: Unreasonably slowing down the University Computer Systems or Computer Networks through the excessive use of system resources (network bandwidth, disk space, CPU time, and printer queues). policy source
This policy needs improvement! Traffic Description: Unreasonably is unclear. Traffic Description: printer is clear. Traffic Amount: excessive is unclear. Traffic Amount: network bandwidth is clear. Location: Networks is clear. Location: system resources is unclear. Action: Unacceptable is unclear.
175. Users shall not use applications that utilize an unusually high portion of the network bandwidth. policy source
This policy needs improvement! Traffic Description: applications is unclear. Traffic Description: unusually is unclear. Traffic Amount: high portion of is unclear. Traffic Amount: network bandwidth is clear. Location is missing Action: shall not is clear. Other: that is clear.
176. Examples of misuse include, but are not limited to, the following: Using an unauthorized IP address or statically assigned address without approval. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: IP address is clear. Traffic Description: address is clear. Location is missing Action: misuse is clear. Policy Exception: without is clear. Policy Exception: approval is clear.
177. Only officially assigned Internet Protocol (IP) numbers may be used for equipment connected to the University's data network. policy source
This policy needs improvement! Traffic Description: Internet Protocol is clear. Traffic Description: IP is clear. Location: network is clear. Action: may be is clear.
178. Using a network address other than the one assigned by HUIT is prohibited. policy source
This policy needs improvement! Traffic Description: network address is clear. Location is missing Action: prohibited is clear. Other: other than is clear.
179. Examples of unacceptable use: Assigning of addresses not specifically granted by IT. policy source
This policy needs improvement! Traffic Description: addresses is clear. Location is missing Action: unacceptable is unclear. Other: not is clear.
180. Using other than the assigned IP address can disrupt normal network operation for others, so users and owners of such devices are expected to refrain from supplying some other IP address for use in any network transaction. policy source
This policy needs improvement! Traffic Description: IP address is clear. Traffic Description: devices is unclear. Traffic Description: IP address is clear. Location: network is clear. Action: expected to is clear. Action: refrain from is clear. Other: other than is clear. Other: disrupt is unclear.
181. The following are violations that will result in suspension of network access and disciplinary action: Any attempt to bypass the DHCP system or use any IP address that has not been assigned by the DHCP server. policy source
This policy needs improvement! Traffic Description: DHCP is clear. Traffic Description: IP address is clear. Traffic Description: DHCP is clear. Traffic Description: server is unclear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DHCP. Location is missing Action: violations is clear. Action: suspension is clear. Action: disciplinary action is unclear. Other: that is clear. Other: bypass is unclear. Other: that is clear. Other: not is clear.
182. It is required that you use DHCP for IP address assignment. You will not use any IP address except that which has been automatically assigned to you via DHCP. policy source
This policy needs improvement! Traffic Description: DHCP is clear. Traffic Description: IP address is clear. Traffic Description: IP address is clear. Traffic Description: DHCP is clear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DHCP. Location is missing Action: required is clear. Action: will not is clear. Policy Exception: except that is clear. Other: that is clear.
183. The following uses are prohibited: Using unauthorized IP addresses. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: IP addresses is clear. Location is missing Action: prohibited is clear.
184. Some examples of policy violations: Using unauthorized IP addresses. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: IP addresses is clear. Location is missing Action: policy violations is clear.
185. The residential network is a shared resource. Thus, network use or applications which inhibit or interfere with the use of the network by others are not permitted. (For example, using an IP address not registered to you, or applications which use an unusually high portion of the bandwidth for extended periods of time, thus inhibiting the use of the network by others, are not permitted). policy source
This policy needs improvement! Traffic Description: applications is unclear. Traffic Description: interfere with is unclear. Traffic Description: IP address is clear. Traffic Description: registered is clear. Traffic Description: applications is unclear. Traffic Description: unusually is unclear. Traffic Amount: high portion of is unclear. Traffic Amount: bandwidth is clear. Location: The residential network is clear. Location: shared resource is unclear. Location: network is clear. Location: network is clear. Location: network is clear. Action: not permitted is clear. Action: not permitted is clear. Other: not is clear. Other: extended is unclear.
186. All Network enabled devices connected to the University Network (other than Network enabled devices connected to the CUIMC Network) must use (a) the DHCP to configure Network IP addresses and (b) the DNS protocol for Server information. policy source
This policy needs improvement! Traffic Description: Network enabled devices connected to is unclear. Traffic Description: Network enabled devices connected to is unclear. Traffic Description: DHCP is clear. Traffic Description: configure is clear. Traffic Description: IP addresses is clear. Traffic Description: DNS is clear. Traffic Description: Server is unclear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DNS. Location: University Network is clear. Location: Network is clear. Location: Network is clear. Action: must is clear. Other: other than is clear.
187. Alterations of any kind to the assigned IP address or related settings, including using an unauthorized IP address, is prohibited. policy source
This policy needs improvement! Traffic Description: IP address is clear. Traffic Description: unauthorized is unclear. Traffic Description: IP address is clear. Location is missing Action: prohibited is clear.
188. Using a network address other than the one assigned by HMS IT is prohibited. policy source
This policy needs improvement! Traffic Description: network address is clear. Action: prohibited is clear. Other: other than is clear.
189. Users may not, under any circumstances, arbitrarily assign a University IP address (130.68.x.x) or domain name (*.montclair.edu) to a device without prior authorization from IT. policy source
This policy needs improvement! Traffic Description: assign is clear. Traffic Description: IP address is clear. Traffic Description: domain is unclear. Traffic Description: device is unclear. Traffic Direction: from is clear. Location is missing Action: may not is clear. Policy Exception: without is clear. Policy Exception: prior authorization is clear.
190. You may not configure your computer with any address other than one provided by Oakwood University. policy source
This policy needs improvement! Traffic Description: configure is clear. Traffic Description: address is clear. Location is missing Action: may not is clear. Other: other than is clear.
191. "Borrowing" an IP address (or a network connection) from one system to be used on another is prohibited. policy source
This policy needs improvement! Traffic Description: IP address is clear. Traffic Direction: from is clear. Location: network is clear. Action: prohibited is clear.
192. All IP addresses used on the University of Florida network must be registered with Infrastructure and Communication Technology (ICT). policy source
This policy needs improvement! Traffic Description: IP addresses is clear. Traffic Description: registered is clear. Location: network is clear. Action: must be is clear.
193. By default, IP addresses are automatically assigned by Dynamic Host Configuration Protocol (DHCP). The use of a hard-coded or non-approved IP address is prohibited. policy source
This policy needs improvement! Traffic Description: IP addresses is clear. Traffic Description: DHCP is clear. Traffic Description: hard-coded is unclear. Traffic Description: non-approved is unclear. Traffic Description: IP address is clear. Traffic Direction: indicated by DHCP. Location is missing Action: prohibited is clear.
194. Every network interface configured with one or more IPv4 addresses, including addresses from the non-globally routable ranges, must have corresponding entries for all of these IPv4 addresses in the Assignments database. policy source
This policy needs improvement! Traffic Description: configured is clear. Traffic Description: IPv4 addresses is clear. Traffic Description: addresses is clear. Traffic Description: IPv4 addresses is clear. Traffic Description: Assignments database is clear. Traffic Direction: from is clear. Location: network is clear. Action: must is clear. Other: these is clear.
195. Network-connected devices that have static IP configurations must not use IP addresses already registered in the Assignments database for other devices. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: static is unclear. Traffic Description: IP configurations is clear. Traffic Description: IP addresses is clear. Traffic Description: registered is clear. Traffic Description: Assignments database is clear. Traffic Description: devices is unclear. Location is missing Action: must not is clear. Other: that is clear.
196. IP addresses registered in the Assignments database for IP address assignment via DHCP must not be used as part of a static configuration by any device. policy source
This policy needs improvement! Traffic Description: IP addresses is clear. Traffic Description: registered is clear. Traffic Description: Assignments database is clear. Traffic Description: IP address is clear. Traffic Description: DHCP is clear. Traffic Description: static is unclear. Traffic Description: device is unclear. Traffic Direction: indicated by DHCP. Location is missing Action: must not is clear.
197. The following list, while not exhaustive, contains examples of what TCU deems to be improper use: Manually assigning an IP address to a network device or otherwise using an IP address that is not assigned to you. policy source
This policy needs improvement! Traffic Description: IP address is clear. Traffic Description: device is unclear. Traffic Description: IP address is clear. Location: network is clear. Action: improper is unclear. Other: not is clear. Other: that is clear. Other: not is clear.
198. System users must not use any other network address (e.g., IP address) for a Computer or Network Resource than has been properly assigned by an authorized system or network administrator. policy source
This policy is well written! Traffic Description: network address is clear. Traffic Description: IP address is clear. Traffic Description: properly is unclear. Location is missing Action: must not is clear. Other: any other is clear. Other: authorized is unclear.
199. Only authorised users of the University computer systems are entitled to use bath hostnames and IP addresses on the network. policy source
This policy needs improvement! Traffic Description: IP addresses is clear. Location: network is clear. Action is missing.
200. IP addresses shall not be assigned from within the University of Michigan IP address space for individuals or organizations who are not directly affiliated with the University of Michigan. policy source
This policy needs improvement! Traffic Description: IP addresses is clear. Traffic Description: IP address is clear. Traffic Direction: from is clear. Action: shall not is clear. Other: not is clear.
201. The University does not support the use of personal wireless printers on the campus network. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: wireless printers is clear. Location: campus network is clear. Action is missing. Other: not is clear.
202. Any wireless device that is found to interfere with the proper operation of Chapman's wireless network is prohibited. This can include some portable telephones that operate in the 2.4 GHz or 5 GHz frequency bands. policy source
This policy needs improvement! Traffic Description: wireless device is unclear. Traffic Description: interfere with is unclear. Location: wireless network is clear. Action: prohibited is clear. Other: that is clear. Other: This is clear. Other: that is clear.
203. Examples of misuse include, but are not limited to, the following: Hosting or operating a wireless access point that is connected to the University’s network in your unit or common area of your residence. policy source
This policy needs improvement! Traffic Description: wireless access point is clear. Location: network is clear. Location: residence is clear. Action: misuse is clear. Other: that is clear.
204. Due to the security risks posed to the network by these devices, students are not permitted to connect wireless printers to the Harvard network. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: wireless printers is clear. Location: network is clear. Location: network is clear. Action: not permitted to is clear. Other: these is clear.
205. Examples of prohibited uses include, but are not limited to, the following: Installing unauthorized wireless access points. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: wireless access points is clear. Location is missing Action: prohibited is clear.
206. The following uses of LLS IT Facilities are prohibited: Attaching wireless access points to the network. policy source
This policy needs improvement! Traffic Description: wireless access points is clear. Location: IT Facilities is unclear. Location: network is clear. Action: prohibited is clear.
207. Wireless access points may not be installed by individuals in campus academic, administrative, or service buildings, including buildings rented or owned by the University off campus, without authorization from the responsible department. policy source
This policy needs improvement! Traffic Description: Wireless access points is clear. Traffic Description: service is unclear. Traffic Direction: from is clear. Location: off campus is clear. Action: may not is clear. Policy Exception: without authorization is clear. Other: owned by is clear.
208. You must not use Rhodes computing and/or network resources in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system. This includes attempts to set up wireless connectivity within research laboratories in order to avoid process of requesting and budgeting for network points. policy source
This policy needs improvement! Traffic Description: programs is unclear. Traffic Description: software is unclear. Traffic Description: software is unclear. Location: network resources is unclear. Location: network is clear. Location: network is clear. Action: must not is clear. Action: expected to is clear. Action: avoid is clear. Other: that is clear. Other: disrupt is unclear. Other: that is clear. Other: disrupt is unclear. Other: degrade performance is unclear. Other: This is clear.
209. The following are violations that will result in suspension of network access and disciplinary action: Unapproved attachment of wireless access points in Texas A&M residence halls. policy source
This policy needs improvement! Traffic Description: Unapproved is unclear. Traffic Description: wireless access points is clear. Location: residence halls is clear. Action: violations is clear. Action: suspension is clear. Action: disciplinary action is unclear. Other: that is clear.
210. Unauthorized Wireless Access Points (APs not installed, maintained and managed by the UIT Division) are prohibited at WWU. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Location is missing Action: prohibited is clear. Other: not is clear.
211. Operation and use of private networks not explicitly authorized by Information Services include, but not limited to, the use of independent wireless access points, peer-to-peer networks, use of client devices as private servers, etc. and are prohibited. policy source
This policy needs improvement! Traffic Description: wireless access points is clear. Traffic Description: peer-to-peer is unclear. Traffic Description: devices is unclear. Traffic Description: private servers is unclear. Location: private networks is clear. Location: networks is clear. Action: independent is unclear. Action: prohibited is clear. Other: not is clear.
212. Wireless access points which are built into purchased equipment will be disabled before such equipment may be used within range of the College’s wireless network. policy source
This policy needs improvement! Traffic Description: Wireless access points is clear. Location: wireless network is clear. Action: disabled is clear. Action: may be is clear.
213. Users are not permitted to set up or operate their own wireless systems on the Oakwood University campus. policy source
This policy needs improvement! Traffic Description: wireless systems is unclear. Location: University campus is clear. Action: not permitted to is clear. Other: their own is clear.
214. You may not modify, extend, or bridge your network connection. Use of personal wireless routers are not permitted in residence halls. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: wireless routers is clear. Location: network is clear. Location: residence halls is clear. Action: may not is clear. Action: not permitted is clear. Other: modify is unclear. Other: extend is unclear.
215. Do not purchase or install your own access. It is also prohibited to use "Internet Connection Sharing" software to make a computer behave like a wireless access point. policy source
This policy needs improvement! Traffic Description: software is unclear. Traffic Description: wireless access point is clear. Location is missing Action: Do not is clear. Action: prohibited is clear. Other: behave like is unclear.
216. All wireless access points must be registered and pre-approved by OTS before being placed into service. policy source
This policy needs improvement! Traffic Description: wireless access points is clear. Traffic Description: registered is clear. Traffic Description: service is unclear. Location is missing Action: must be is clear. Other: approved is unclear.
217. All wireless access points must be secured from unauthorized use. Appropriate forms of authentication and authorization will vary depending on the wireless medium. policy source
This policy needs improvement! Traffic Description: wireless access points is clear. Traffic Description: unauthorized is unclear. Traffic Amount: secured from is clear. Location is missing Action: must be is clear. Action: forms of is clear.
218. For example, using a wireless access point, wireless repeater, or a very long cable to provide network connectivity to an adjacent building, another floor, or another room is not acceptable. policy source
This policy needs improvement! Traffic Description: wireless access point is clear. Location is missing Action is missing. Other: not is clear.
219. Use of external modems or wireless access points are not permitted to connect to the Saint Leo University network unless approved by UTS. policy source
This policy needs improvement! Traffic Description: modems is clear. Traffic Description: wireless access points is clear. Traffic Direction: external is clear. Location: University network is clear. Action: not permitted to is clear. Policy Exception: unless is clear. Other: approved is unclear.
220. The addition of new wireless access points on the University network must be coordinated and approved by ITS. policy source
This policy needs improvement! Traffic Description: wireless access points is clear. Location: University network is clear. Action: must be is clear. Other: approved is unclear.
221. Prohibited uses include, but are not limited to, development of programs, data processing or computations for commercial use, preparation and presentation of advertising material and the running of a Server connected to the University Network. policy source
This policy needs improvement! Traffic Description: programs is unclear. Traffic Description: Server is unclear. Location: University Network is clear. Action: Prohibited is clear. Other: development of is clear. Other: running of is clear.
222. The student may not set up a server without authorization of the university. policy source
This policy needs improvement! Traffic Description: server is unclear. Location is missing Action: may not is clear. Policy Exception: without authorization is clear.
223. The hosting of web servers or other Internet services which perform commercial activity is also prohibited. policy source
This policy needs improvement! Traffic Description: web servers is unclear. Traffic Description: Internet services is unclear. Location is missing Action: prohibited is clear.
224. The following activities are prohibited without the expressed written consent of Fordham IT: Setting up any type of information server such as web, email, game, print, FTP, etc. policy source
This policy needs improvement! Traffic Description: information server is unclear. Traffic Description: FTP is clear. Traffic Direction: indicated by FTP. Location is missing Action: prohibited is clear. Policy Exception: without is clear. Policy Exception: consent of is clear.
225. It is prohibited to create secondary physical networks, using devices including bridges, routers, or wireless access points, connected to the Harvard network without authorization. policy source
This policy needs improvement! Traffic Description: create is clear. Traffic Description: devices is unclear. Traffic Description: bridges is clear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Location: network is clear. Action: prohibited is clear. Action: secondary physical is unclear. Policy Exception: without authorization is clear.
226. Examples of unaccetable use: The operation of any non-educational server or service offering or transferring data in a public manner onto the Internet. This includes but is not limited to HTTP, FTP, mail/news, programs such as Gnutella or Napster (in server modes), etc. policy source
This policy needs improvement! Traffic Description: educational server is unclear. Traffic Description: service is unclear. Traffic Description: HTTP is clear. Traffic Description: FTP is clear. Traffic Description: programs is unclear. Traffic Description: server is unclear. Traffic Direction: indicated by HTTP. Traffic Direction: indicated by FTP. Location: the Internet is clear. Location: news is clear. Action: unaccetable is unclear. Other: This is clear.
227. Personal, private or departmental switches, routers, wireless access points or DHCP-serving devices may not be connected to centrally-managed administrative network segments, except only as may be agreed to in writing between the device owner and Information Technology Services. policy source
This policy needs improvement! Traffic Description: Personal is unclear. Traffic Description: private is unclear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Traffic Description: DHCP is clear. Traffic Description: devices is unclear. Traffic Description: device is unclear. Traffic Direction: indicated by DHCP. Location: departmental is clear. Location: administrative network segments is clear. Action: may not is clear. Action: may be is clear.
228. The following uses of LLS IT Facilities are prohibited: Setting up or maintaining private servers on campus without explicit written permission from ITD. policy source
This policy needs improvement! Traffic Description: private servers is unclear. Traffic Direction: from is clear. Location: IT Facilities is unclear. Location: on campus is clear. Action: prohibited is clear. Policy Exception: without is clear.
229. Users are prohibited from installing or using network devices that are not owned by MSMU. This includes personal wireless access points, servers, hubs, switches, or any other networking equipment. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: MSMU is clear. Traffic Description: personal is unclear. Traffic Description: wireless access points is clear. Traffic Description: servers is unclear. Traffic Description: hubs is clear. Traffic Description: switches is clear. Traffic Direction: indicated by MSMU. Location: network is clear. Location: networking is clear. Action: prohibited from is clear. Other: that is clear. Other: not is clear. Other: This is clear. Other: any other is clear.
230. Connection of personal or privately-owned routers and/or wireless access points to the ResNet wired networks is prohibited. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: privately-owned is unclear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Location: networks is clear. Action: prohibited is clear.
231. Users may not connect to remote resources such as printer, file systems, or any other remote resource, regardless of location on or off the Northeastern network, unless the administrator of the remote resource has first granted permission to do so. policy source
This policy needs improvement! Traffic Description: printer is clear. Traffic Description: file systems is unclear. Location: remote resources is unclear. Location: network is clear. Action: may not is clear. Policy Exception: unless is clear. Other: any other is clear.
232. In no case shall the following types of servers be connected to the network: DNS, DHCP, BOOTP, or any other server that manages network addresses. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Description: DNS is clear. Traffic Description: DHCP is clear. Traffic Description: BOOTP is clear. Traffic Description: server is unclear. Traffic Description: network addresses is clear. Traffic Direction: indicated by DNS. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by BOOTP. Location: network is clear. Action: shall is clear. Other: any other is clear. Other: that is clear.
233. Users are prohibited from installing personal routers (wired or wireless) to the network. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: routers is clear. Location: network is clear. Action: prohibited from is clear.
234. Prohibited in all halls are portable heaters, air conditioners, large amplifiers (public address system, oversize stereo, acoustic or electric musical instrument and percussion instruments), wireless routers, and halogen/lava lamps. policy source
This policy needs improvement! Traffic Description: address is clear. Traffic Description: acoustic is unclear. Traffic Description: wireless routers is clear. Location: halls is clear. Action: Prohibited is clear.
235. The following activities are strictly prohibited: Introducing honeypots, honeynets, or similar technology on Park University network. policy source
This policy needs improvement! Traffic Description: honeypots is clear. Traffic Description: honeynets is clear. Location: University network is clear. Action: prohibited is clear.
236. You may not operate Dynamic Host Configuration Protocol (DHCP) or Bootstrap Protocol (BootP) servers on the campus networks without authorization. policy source
This policy is well written! Traffic Description: DHCP is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by DHCP. Location: campus networks is clear. Action: may not is clear. Policy Exception: without authorization is clear.
237. List of Prohibited Network Devices: routers, wireless access points, proxy servers, DSL, modems, gateways or hardware firewalls (software firewalls are allowed). policy source
This policy needs improvement! Traffic Description: Network Devices is unclear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Traffic Description: servers is unclear. Traffic Description: DSL is clear. Traffic Description: modems is clear. Traffic Description: gateways is clear. Location: hardware firewalls is clear. Location: software firewalls is clear. Action: Prohibited is clear. Action: allowed is clear.
238. Game station systems are permitted but must be registered. Such devices are prohibited from acting as a network routing device or network server for any purpose. policy source
This policy needs improvement! Traffic Description: registered is clear. Traffic Description: devices is unclear. Traffic Description: routing device is unclear. Traffic Description: network server is unclear. Location: network is clear. Action: must be is clear. Action: prohibited from is clear. Other: acting as is unclear.
239. Personally owned servers and other devices are only permitted if they utilize a reasonably small portion of network resources. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Description: devices is unclear. Location: network resources is unclear. Action is missing. Other: they is clear.
240. Users WILL NOT Connect devices (such as switches, routers, hubs, computer systems, and wireless access points) to the network without prior approval from the Campus IT organization. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: hubs is clear. Traffic Description: wireless access points is clear. Location: network is clear. Action: WILL NOT is clear. Policy Exception: without is clear. Policy Exception: approval from is clear.
241. Servers (FTP, WWW, IRC, etc) are not permitted on the USF open-use network. policy source
This policy is well written! Traffic Description: Servers is unclear. Traffic Description: FTP is clear. Traffic Description: IRC is clear. Traffic Direction: indicated by FTP. Traffic Direction: indicated by IRC. Location: network is clear. Action: not permitted is clear.
242. The use of personal routers (wireless or wired) and/or DHCP servers outside of a contained lab environment is strictly prohibited. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: routers is clear. Traffic Description: DHCP is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by DHCP. Location is missing Action: prohibited is clear. Other: outside of is clear.
243. The use of personal routers (wireless or wired) and/or DHCP servers is strictly prohibited. policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: routers is clear. Traffic Description: DHCP is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by DHCP. Location is missing Action: prohibited is clear.
244. No units and users may: Connect personal network switches, routers, or wireless access points to the network except where authorized by the Office of Information Technology policy source
This policy needs improvement! Traffic Description: personal is unclear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Location: network is clear. Action is missing.
245. Unauthorized networking equipment (such as routers and wireless access points, etc.) is prohibited from use on the network. Network services and wiring may not be modified or extended beyond their intended use policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: networking equipment is unclear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Traffic Description: Network services is unclear. Location: network is clear. Action: prohibited from is clear. Action: may not is clear. Other: modified is unclear. Other: extended is unclear. Other: their is clear.
246. Users are not prevented from setting up their own computers as servers. However, a service which is inappropriate or degrades network availability will be shut down. Further, the server's owner is responsible for all content. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Description: service is unclear. Traffic Description: server is unclear. Traffic Direction: from is clear. Location: network is clear. Action: inappropriate is unclear. Action: shut down is clear. Other: not is clear. Other: their own is clear. Other: degrades is unclear.
247. This abuse includes, but is not limited to, the following: Unauthorized Servers: The establishment of a background process that services incoming requests from anonymous users for purposes of gaming, chatting or browsing the Web is prohibited. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: Servers is unclear. Traffic Description: services is unclear. Traffic Description: requests is clear. Traffic Description: gaming is unclear. Traffic Description: chatting is unclear. Traffic Direction: incoming is clear. Traffic Direction: from is clear. Location is missing Action: abuse is clear. Action: prohibited is clear. Other: This is clear. Other: that is clear.
248. The establishment of unauthorized servers is prohibited, such as, but not limited to, a background process that services incoming requests from anonymous users for purposes of gaming, chatting, or browsing the Web. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: servers is unclear. Traffic Description: services is unclear. Traffic Description: requests is clear. Traffic Description: gaming is unclear. Traffic Direction: incoming is clear. Traffic Direction: from is clear. Location is missing Action: prohibited is clear. Other: that is clear. Other: chatting is unclear.
249. Users are prohibited from connecting to any device such as a hub, router, switch, or wireless access point to the provided Ethernet jacks in the room to extend connectivity. For example, a user may not use a hub in their room or office to allow them to connect more than two devices to the network at a time. policy source
This policy needs improvement! Traffic Description: device is unclear. Traffic Description: hub is clear. Traffic Description: router is clear. Traffic Description: switch is clear. Traffic Description: wireless access point is clear. Traffic Description: Ethernet jacks is clear. Traffic Description: hub is clear. Traffic Description: devices is unclear. Location: network is clear. Action: prohibited from is clear. Action: may not is clear. Action: allow is clear. Other: extend is unclear. Other: their is clear. Other: more than is clear.
250. Users may not advertise routing information on the HMS Network or act as gateways to external or private networks. policy source
This policy needs improvement! Traffic Description: gateways is clear. Traffic Direction: external is clear. Location: Network is clear. Location: private networks is clear. Action: may not is clear. Other: advertise routing information is unclear. Other: act as is unclear.
251. Only Information Technology Services (ITS), Health Information and Technology, or their authorized designees may: attach networking equipment (including, but not limited to: routers, switches, wireless access points, Dynamic Host Configuration Protocol/Domain Name System servers, etc.) to the University network or modify University network infrastructure. policy source
This policy needs improvement! Traffic Description: networking equipment is unclear. Traffic Description: routers is clear. Traffic Description: switches is clear. Traffic Description: wireless access points is clear. Traffic Description: Domain is unclear. Traffic Description: servers is unclear. Location: University network is clear. Location: University network infrastructure is clear. Action is missing. Other: their is clear. Other: authorized is unclear. Other: modify is unclear.
252. The use of network hubs, routers, wireless access points, or other devices designed to share your network connection with multiple computers or devices is expressly prohibited. policy source
This policy needs improvement! Traffic Description: hubs is clear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Traffic Description: devices is unclear. Traffic Description: devices is unclear. Location: network is clear. Location: network is clear. Action: prohibited is clear.
253. Network fan-out devices, such as “hubs,” or “switches” to allow students to connect more than one computer/device to a single network jack, are prohibited without permission from ITS. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: hubs is clear. Traffic Description: switches is clear. Traffic Description: device is unclear. Traffic Direction: from is clear. Location: Network is clear. Location: network is clear. Action: allow is clear. Action: prohibited is clear. Policy Exception: without is clear. Other: more than is clear.
254. Hubs, switches, routers and wireless devices should never be connected to the University data network without prior approval from Network and Communication Services. policy source
This policy needs improvement! Traffic Description: Hubs is clear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: wireless devices is unclear. Traffic Description: Services is unclear. Location: never is unclear. Location: University data network is clear. Location: Network is clear. Action is missing. Policy Exception: without is clear. Policy Exception: approval from is clear.
255. You may not connect any device that provides network-to-network connection services. Some examples are: Hubs Switches Routers Bridges Firewalls Virtual Private Networks (VPNs) Wireless access points Wireless access points are put into the same category as hubs or bridges. Therefore they must not be connected to the University's campus network without prior consultation and approval from Information Technology. policy source
This policy needs improvement! Traffic Description: device is unclear. Traffic Description: services is unclear. Traffic Description: Switches is clear. Traffic Description: Routers is clear. Traffic Description: Private is unclear. Traffic Description: VPNs is clear. Traffic Description: Wireless access points is clear. Traffic Description: Wireless access points is clear. Traffic Description: hubs is clear. Traffic Description: bridges is clear. Location: network is clear. Location: network is clear. Location: Firewalls is clear. Location: Networks is clear. Location: campus network is clear. Action: may not is clear. Action: must not is clear. Policy Exception: without is clear. Policy Exception: approval from is clear. Other: that is clear. Other: they is clear.
256. You must not connect any devices such as switches, hubs, wireless access points, routers, Xbox or any other game oriented device to the network without the express written permission of the Oakwood University. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: switches is clear. Traffic Description: hubs is clear. Traffic Description: wireless access points is clear. Traffic Description: routers is clear. Traffic Description: game oriented is unclear. Traffic Description: device is unclear. Location: network is clear. Action: must not is clear. Policy Exception: without is clear. Other: any other is clear.
257. No user can connect servers of any type, hubs, or network printers. policy source
This policy needs improvement! Traffic Description: servers is unclear. Traffic Description: hubs is clear. Traffic Description: network printers is clear. Location is missing Action is missing.
258. It is against TDS policy for a user or IT support person to connect a network connectivity device (hub, switch, router or wireless access point) to "share" a single jack among multiple computers* policy source
This policy needs improvement! Traffic Description: device is unclear. Traffic Description: hub is clear. Traffic Description: switch is clear. Traffic Description: router is clear. Traffic Description: wireless access point is clear. Location is missing Action: against is clear.
259. Users may not extend or modify the network in any way by installing devices such as repeaters, bridges, switches, routers, gateways, wireless access points, or permanent hubs. policy source
This policy needs improvement! Traffic Description: devices is unclear. Traffic Description: bridges is clear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: gateways is clear. Traffic Description: wireless access points is clear. Traffic Description: permanent is unclear. Traffic Description: hubs is clear. Location: network is clear. Action: may not is clear. Other: extend is unclear. Other: modify is unclear.
260. Network users may not attempt to defeat or circumvent any network specification. Examples of this are extending the network with unauthorized switch/router/firewall and the use of non-standard electronics and wiring. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: switch is clear. Traffic Description: router is clear. Location: network is clear. Location: network is clear. Location: firewall is clear. Action: may not is clear. Other: defeat is unclear. Other: circumvent is unclear. Other: this is clear. Other: extending is unclear.
261. Users who add unapproved network devices may have their network access disabled in order to ensure that the device does not inhibit the proper function of the network at large. policy source
This policy needs improvement! Traffic Description: unapproved is unclear. Traffic Description: network devices is unclear. Traffic Description: device is unclear. Location: network is clear. Action: disabled is clear. Other: their is clear. Other: that is clear. Other: not is clear.
262. The following activities are nonexclusive examples of those that are not permitted and that may lead to suspension or revocation of use privileges and other penalties or discipline: the unauthorized physical or virtual extension or re-configuration of any portion of the campus network by such means as routers (wired or wireless), wireless access points, network wiring, or other methods. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Location: campus network is clear. Location: network is clear. Action: not permitted is clear. Action: suspension is clear. Action: revocation is clear. Other: nonexclusive is unclear. Other: those is clear. Other: that is clear. Other: that is clear.
263. In order to maintain reliable network connectivity, no other department may deploy wireless routers, switches, bridges, and/or DHCP (Dynamic Host Configuration Protocol) services on campus without prior review and approval of SUIT. policy source
This policy needs improvement! Traffic Description: wireless routers is clear. Traffic Description: switches is clear. Traffic Description: bridges is clear. Traffic Description: DHCP is clear. Traffic Description: services is unclear. Traffic Direction: indicated by DHCP. Location: on campus is clear. Action is missing. Policy Exception: without is clear. Policy Exception: approval of is clear. Other: reliable is unclear.
264. Some activities deemed inappropriate include, but are not limited to: Attaching unauthorized network devices, including but not limited to wireless routers, gateways DHCP or DNS servers; or a computer set up to act like such a device. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: network devices is unclear. Traffic Description: wireless routers is clear. Traffic Description: gateways is clear. Traffic Description: DHCP is clear. Traffic Description: DNS is clear. Traffic Description: servers is unclear. Traffic Description: device is unclear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DNS. Location is missing Action: inappropriate is unclear.
265. The following list, while not exhaustive, contains examples of what TCU deems to be improper use: Using unauthorized network devices, such as routers, firewalls, and wireless access points. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: network devices is unclear. Traffic Description: routers is clear. Traffic Description: wireless access points is clear. Location: firewalls is clear. Action: improper is unclear. Other: not is clear.
266. Network hubs, switches, routers and Wi-Fi access points may not be connected to office and lab network jacks, unless approved by OTS. When these devices are detected attached to a network jack, the jack will be deactivated remotely without warning. policy source
This policy needs improvement! Traffic Description: hubs is clear. Traffic Description: switches is clear. Traffic Description: routers is clear. Traffic Description: Wi-Fi access points is clear. Traffic Description: devices is unclear. Location: network is clear. Location: network is clear. Action: may not is clear. Policy Exception: unless is clear. Policy Exception: without is clear. Other: approved is unclear. Other: these is clear.
267. Wireless switches and routers of any kind are not permitted, even if not connected to the campus network. policy source
This policy needs improvement! Traffic Description: switches is clear. Traffic Description: routers is clear. Location: campus network is clear. Action: not permitted is clear. Other: not is clear.
268. Some activities deemed inappropriate include, but are not limited to: Attaching unauthorized network devices, including but not limited to wireless routers, gateways DHCP or DNS servers. policy source
This policy needs improvement! Traffic Description: unauthorized is unclear. Traffic Description: network devices is unclear. Traffic Description: wireless routers is clear. Traffic Description: gateways is clear. Traffic Description: DHCP is clear. Traffic Description: DNS is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by DHCP. Traffic Direction: indicated by DNS. Location is missing Action: inappropriate is unclear.
269. Hubs, switches, wireless access points, routers, and other similar network equipment that constitutes network infrastructure are not permitted. policy source
This policy needs improvement! Traffic Description: Hubs is clear. Traffic Description: switches is clear. Traffic Description: wireless access points is clear. Traffic Description: routers is clear. Location: network is clear. Location: network is clear. Action: not permitted is clear. Other: that is clear.
270. Due to limited network resources, the use of CAMPBELL network facilities for playing graphics-based interactive games is prohibited. policy source
This policy needs improvement! Traffic Description: games is unclear. Traffic Amount: network facilities for playing is clear. Location: network resources is unclear. Action: limited is unclear. Action: prohibited is clear.
271. Individual users may be required to halt or curtail non-priority use of IT resources, such as recreational activities and non-academic, non-business services. policy source
This policy needs improvement! Traffic Description: recreational is unclear. Traffic Description: services is unclear. Location: IT resources is unclear. Action: may be is clear. Action: required to is clear.
272. Non-game network traffic has priority at all times. Games that interfere with non-game traffic, even if run within network bandwidth limitations, are prohibited from the Oakwood University network policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: Games is unclear. Traffic Description: interfere with is unclear. Traffic Description: non-game traffic is unclear. Traffic Amount: network bandwidth limitations is clear. Location: University network is clear. Action: prohibited from is clear. Other: that is clear. Other: run is clear.
273. Unacceptable Activities: Recreational game-playing and/or audio/video file sharing that interferes with instructional or work-related use of university-owned computers. policy source
This policy needs improvement! Traffic Description: game-playing is unclear. Traffic Description: file sharing is unclear. Traffic Description: interferes with is unclear. Location is missing Action: Unacceptable is unclear. Other: that is clear.
274. Games that interfere with non-game traffic, even if run within network bandwidth limitations, are prohibited from the Oakwood University network. policy source
This policy needs improvement! Traffic Description: Games is unclear. Traffic Description: interfere with is unclear. Traffic Description: non-game traffic is unclear. Traffic Amount: network bandwidth limitations is clear. Location: University network is clear. Action: prohibited from is clear. Other: that is clear. Other: run is clear.
275. We recommend that you watch for secure web pages ("https", and a padlock-icon) whenever you transmit sensitive information. Instead of "telnet", consider "ssh" to log onto remote servers. policy source
This policy needs improvement! Traffic Description: recommend is unclear. Traffic Description: telnet is clear. Traffic Description: ssh is clear. Traffic Description: servers is unclear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ssh. Location is missing Action is missing. Other: that is clear. Other: transmit is clear. Other: Instead of is clear.
276. Whenever possible, sensitive data should be transferred in encrypted form, e.g., using SSL (Secure Socket Layer) or SSH (Secure Shell). policy source
This policy needs improvement! Traffic Description: SSH is clear. Traffic Direction: indicated by SSH. Location is missing Action is missing.
277. Any protocol or network traffic that has been shown to support an illegal process, or that supports an application posing unacceptable risk to the University, will be blocked by University firewall policy and applications using such protocols may not work properly. policy source
This policy needs improvement! Traffic Description: network traffic is clear. Traffic Description: application is unclear. Traffic Description: applications is unclear. Location: firewall is clear. Action: unacceptable is unclear. Action: blocked is clear. Action: may not is clear. Other: that is clear. Other: that is clear.
278. Applications which transmit sensitive information over the network in clear text, such as telnet and ftp, are prohibited and will be blocked. Exceptions must be accounted for and explicitly allowed by the CSIRT. Secure free replacements to telnet and ftp are SSH and SFTP. policy source
This policy is well written! Traffic Description: Applications is unclear. Traffic Description: telnet is clear. Traffic Description: ftp is clear. Traffic Description: telnet is clear. Traffic Description: ftp is clear. Traffic Description: SSH is clear. Traffic Description: SFTP is clear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ftp. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ftp. Traffic Direction: indicated by SSH. Traffic Direction: indicated by SFTP. Location: network is clear. Action: prohibited is clear. Action: blocked is clear. Action: must be is clear. Action: allowed is clear. Other: transmit is clear.
279. Users of telnet, rlogin, ftp, and other connectivity programs may not realize that their password and data is transmitted across the network unencrypted and can be intercepted by hackers.Use of these "clear text" protocols is therefore strongly discouraged. policy source
This policy needs improvement! Traffic Description: telnet is clear. Traffic Description: rlogin is clear. Traffic Description: ftp is clear. Traffic Description: programs is unclear. Traffic Description: unencrypted is unclear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by rlogin. Traffic Direction: indicated by ftp. Location: network is clear. Action: may not is clear. Action: discouraged is unclear. Other: that is clear. Other: their is clear. Other: intercepted by hackers is unclear. Other: these is clear.
280. Telnet and FTP are both considered "insecure protocols" and will not be approved as firewall exceptions. policy source
This policy needs improvement! Traffic Description: Telnet is clear. Traffic Description: FTP is clear. Traffic Description: insecure protocols is unclear. Traffic Direction: indicated by Telnet. Traffic Direction: indicated by FTP. Location: firewall is clear. Action: will not is clear. Policy Exception: exceptions is clear. Other: approved is unclear.
281. No insecure ports, protocols or services, such as FTP, Telnet, or HTTP are to be used for communicating with the SDE without documented business justification for their use. policy source
This policy needs improvement! Traffic Description: insecure is unclear. Traffic Description: services is unclear. Traffic Description: FTP is clear. Traffic Description: Telnet is clear. Traffic Description: HTTP is clear. Traffic Direction: indicated by FTP. Traffic Direction: indicated by Telnet. Traffic Direction: indicated by HTTP. Location is missing Action is missing. Policy Exception: without is clear. Other: their is clear.
282. The use of telnet is ordinarily unneccessary and not recommended (with possible exceptions such as connecting to legacy Departmental devices where all network traffic remains within the Department). Users should instead use ssh. policy source
This policy needs improvement! Traffic Description: telnet is clear. Traffic Description: Departmental devices where all is unclear. Traffic Description: network traffic is clear. Traffic Description: ssh is clear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ssh. Location is missing Action: not recommended is unclear. Policy Exception: exceptions is clear.
283. Enterprise Network Firewalls, which are required to protect file servers and workstations in University Departments, allow secure protocols on port 22. They block ports that use insecure protocols, including ports 21 and 25. Insecure protocols include rlogin (remote login), TELNET, rcp (remote copy), and ftp (file transfer). policy source
This policy needs improvement! Traffic Description: file servers is unclear. Traffic Description: port 22 is clear. Traffic Description: insecure protocols is unclear. Traffic Description: Insecure protocols is unclear. Traffic Description: rlogin is clear. Traffic Description: TELNET is clear. Traffic Description: rcp is clear. Traffic Description: ftp is clear. Traffic Direction: indicated by rlogin. Traffic Direction: indicated by TELNET. Traffic Direction: indicated by rcp. Traffic Direction: indicated by ftp. Location: Network Firewalls is clear. Action: required to is clear. Action: protect is unclear. Action: allow is clear. Other: They is clear. Other: that is clear.
284. All insecure protocols (protocols that provide no encryption and pass traffic in clear text) may not be allowed through the campus firewall. Example insecure services include telnet, ftp, imap, and pop. policy source
This policy is well written! Traffic Description: insecure protocols is unclear. Traffic Description: traffic is clear. Traffic Description: insecure services is unclear. Traffic Description: telnet is clear. Traffic Description: ftp is clear. Traffic Description: imap is clear. Traffic Description: pop is clear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ftp. Traffic Direction: indicated by imap. Traffic Direction: indicated by pop. Location: campus firewall is clear. Action: may not is clear. Other: that is clear.
285. Disable or remove insecure services, protocols, or ports that are not necessary. Examples of insecure services, protocols, or ports include but are not limited to FTP, Telnet, POP3, IMAP, and SNMP. policy source
This policy needs improvement! Traffic Description: insecure services is unclear. Traffic Description: insecure services is unclear. Traffic Description: FTP is clear. Traffic Description: Telnet is clear. Traffic Description: POP3 is clear. Traffic Description: SNMP is clear. Traffic Direction: indicated by FTP. Traffic Direction: indicated by Telnet. Traffic Direction: indicated by POP3. Traffic Direction: indicated by SNMP. Location is missing Action is missing. Other: that is clear.
286. Wherever possible, security protocols including IMAPS, FTPS, HTTPS, etc. shall be used. policy source
This policy needs improvement! Traffic Description: IMAPS is clear. Traffic Description: FTPS is clear. Traffic Description: HTTPS is clear. Traffic Direction: indicated by IMAPS. Traffic Direction: indicated by FTPS. Traffic Direction: indicated by HTTPS. Location is missing Action: shall be is clear.
287. Telnet: Some MFDs provide telnet management interfaces, which are also used by some older management tools. If possible, disable this insecure protocol. policy source
This policy needs improvement! Traffic Description: Telnet is clear. Traffic Description: telnet is clear. Traffic Description: insecure is unclear. Traffic Direction: indicated by Telnet. Traffic Direction: indicated by telnet. Location is missing Action: interfaces is clear. Other: used by is clear. Other: this is clear.
288. Exceptions for inherently insecure protocols such as telnet (port 23) or ftp (port 21) will not be granted. policy source
This policy needs improvement! Traffic Description: insecure protocols is unclear. Traffic Description: telnet is clear. Traffic Description: ftp is clear. Traffic Direction: indicated by telnet. Traffic Direction: indicated by ftp. Location is missing Action: will not is clear. Policy Exception: Exceptions for is clear.
289. The Telnet service should be disabled, and marked as a manual service. policy source
This policy needs improvement! Traffic Description: Telnet is clear. Traffic Description: service is unclear. Traffic Description: manual service is unclear. Traffic Direction: indicated by Telnet. Location is missing Action: disabled is clear.
290. Secure (encrypted) protocol alternatives are deployed in place of insecure protocols (i.e., ssh instead of telnet, sftp in place of ftp). policy source
This policy needs improvement! Traffic Description: insecure protocols is unclear. Traffic Description: ssh is clear. Traffic Description: telnet is clear. Traffic Description: sftp is clear. Traffic Description: ftp is clear. Traffic Direction: indicated by ssh. Traffic Direction: indicated by telnet. Traffic Direction: indicated by sftp. Traffic Direction: indicated by ftp. Location is missing Action is missing. Other: instead of is clear.
291. The SFTP file transfer protocol must be used; FTP transfers are not supported. policy source
This policy needs improvement! Traffic Description: SFTP is clear. Traffic Description: FTP is clear. Traffic Direction: indicated by SFTP. Traffic Direction: indicated by FTP. Location is missing Action: must be is clear. Action: not supported is unclear.
292. Clear text communications protocols for server administration shall be disabled (encrypt all non-console administrative access). policy source
This policy needs improvement! Traffic Description: server is unclear. Location is missing Action: shall be is clear. Action: disabled is clear.
293. Disable or uninstall any unneeded services. If you do not use services such as ftp, telnet, snmp, http, etc. then they should be disabled. policy source
This policy needs improvement! Traffic Description: services is unclear. Traffic Description: services is unclear. Traffic Description: ftp is clear. Traffic Description: telnet is clear. Traffic Description: http is clear. Traffic Direction: indicated by ftp. Traffic Direction: indicated by telnet. Location is missing Action: do not is clear. Action: disabled is clear. Other: they is clear.
294. This Procedure prohibits Untrusted Network access to Appalachian State University Trusted Networks via unsecured Clear Text Access mechanisms such as Telnet, FTP and regular HTTP web logins. policy source
This policy needs improvement! Traffic Description: Telnet is clear. Traffic Description: FTP is clear. Traffic Description: HTTP is clear. Traffic Direction: indicated by Telnet. Traffic Direction: indicated by FTP. Traffic Direction: indicated by HTTP. Location: Networks is clear. Action is missing. Other: This is clear.
295. Users may not use Drexel University's assigned Internet number space for their own domain without the prior express permission of IT. policy source
This policy needs improvement! Traffic Description: domain is unclear. Location: prior express is clear. Action: may not is clear. Policy Exception: without is clear. Other: their own is clear.
296. Students are not permitted to register external domain names (i.e., any domain outside of harvard.edu) that reference systems on the Harvard network without authorization. policy source
This policy needs improvement! Traffic Description: register is clear. Traffic Description: external domain names is unclear. Traffic Description: domain is unclear. Location: network is clear. Action: not permitted to is clear. Policy Exception: without authorization is clear. Other: outside of is clear. Other: that is clear.
297. Unauthorized registration of a domain to a Baylor IP address is prohibited. This includes, but is not limited to, direct DNS resolution and DNS aliasing. policy source
This policy needs improvement! Traffic Description: Unauthorized is unclear. Traffic Description: registration of is clear. Traffic Description: domain is unclear. Traffic Description: IP address is clear. Traffic Description: DNS resolution is unclear. Traffic Description: DNS aliasing is unclear. Location is missing Action: prohibited is clear. Other: This is clear.
298. The registration of commercial hostnames to a SUNY Delhi Wireless IP address is strictly prohibited. policy source
This policy needs improvement! Traffic Description: registration of is clear. Traffic Description: commercial hostnames is unclear. Traffic Description: IP address is clear. Location is missing Action: prohibited is clear.
299. Users are not permitted to register external domain names (i.e., any domain outside of harvard.edu) that reference systems on the HMS Network. policy source
This policy needs improvement! Traffic Description: register is clear. Traffic Description: external domain names is unclear. Traffic Description: domain is unclear. Location: Network is clear. Action: not permitted to is clear. Other: outside of is clear. Other: that is clear.
300. Use of hard-coded or non-approved IP number is prohibited. policy source
This policy needs improvement! Traffic Description: hard-coded is unclear. Traffic Description: non-approved is unclear. Traffic Description: IP is clear. Location is missing Action: prohibited is clear.