![]() Network resources may be managed to optimize performance of some essential applications or resources and slow down other applications or resources. I understand that I am not guaranteed a network connection or a specific amount of network bandwidth. Other users who have gained access to my computer.Sharing of music or other media files and.Traffic generated by viruses and malware.I understand that I am responsible for the security of my computer and other devices connected to the network and for all activity originating from those devices, including but not limited to: Statement on Student Rights and Responsibilities.Responsible Use of Information Resources.I agree to abide by all applicable federal and state laws and university policies including: You must agree to the terms and conditions below to use the networks. Read the information below carefully as it specifies user responsibilities and responsible use standards for connecting to computer networks, including those in residence halls and JSU owned apartments. Policy Non-Complianceįailure to comply with the Wireless Access Policy may result in the suspension of wireless access privileges and possible disciplinary action. Any other electronic devices found to interfere with JSU IT installed access points are included in this category. Examples of devices in this category are non-JSU access points, wifi enabled printers and streaming media devices (Chromecast, Roku, etc.). Any device or equipment found to be interfering with access point signals may be subject to relocation or removal. The IT department reserves the right to turn off without notice any access point connected to the network that it feels puts the University's systems, data, and users at risk.Īccess point broadcast frequencies and channels shall be set and maintained by JSU IT. The IT department will periodically conduct sweeps of the wireless network to ensure there are no rogue access points present. Non-sanctioned installations of wireless equipment, or use of unauthorized equipment on campus premises, are strictly forbidden. The addition of new wireless access points within campus facilities will be managed at the sole discretion of IT. Policy and Appropriate UseĪll wireless access points on the University's network will be centrally managed by the JSU IT department. You may register these devices ( No Wi-Fi enabled printers allowed) for use on the JSU Housing network but JSU IT does not guarantee the satisfactory operation of these devices. Game consoles, media streaming devices (Roku, Chromecast, Apple TV, network enabled televisions, etc.) and printers will not be supported by JSU IT. Additionally, the Technology Support Center will provide limited connectivity support for students’ devices that are used for academic purposes, i.e. JSU IT will troubleshoot to ensure that access points are functioning properly. Rogue access points are not allowed on the JSU network. "Rogue" access points are devices that are installed without the knowledge or permission of the Jacksonville State University IT Department. These access points are small devices that connect directly to the local area network (LAN). In order to provide wireless access to authorized users, Information Technology (IT) installs access points in and around the campus. The 802.11 protocols are the most common standards for wireless network connectivity (i.e. Jacksonville State University uses the 802.11n and 802.11ac protocols as its wireless network standards, transmitting in the 2.4 GHz and 5 GHz radio frequency spectrums. Access to Jacksonville State University’s networks is provided in support of students’ academic and research activities, as well as reasonable and appropriate personal use. The following policy is complementary to any previously implemented policies dealing specifically with network access and remote access to the enterprise network. Unauthorized access to the wireless network is not allowed. All users employing wireless methods of accessing University technology resources must adhere to University defined processes for doing so, using University installed access points. The goal of this policy is to protect Jacksonville State University’s technology-based resources from unauthorized use and/or malicious attack that could result in loss of information, damage to resources or damage to our public image.
0 Comments
Leave a Reply. |