Image 01 Image 02 Image 03 Image 04 Image 05 Image 06
Information Technology Services
IT header photo collage

Winthrop University Campus Network Guidelines

These guidelines apply to network ports located in faculty/staff offices and labs, Residence Halls, and other University facilities.

  1. The Winthrop University Campus Network may only be used in a manner consistent with local, state, and federal laws.  The Winthrop University Campus Network must also be used in a manner consistent with existing University policies including policies dealing with appropriate use of information technology, copyrighted material, academic conduct, and sexual harassment.  Users shall not make or use illegal copies of copyrighted materials, store such copies on university systems, or transmit them over university networks.
  2. Campus e-mail users must not release other users’ e-mail addresses in a manner that compromises privacy.  Recipients listed in the TO and CC fields of an e-mail can see each other’s address. This is inappropriate when the recipients are not already aware of that information. When sending an e-mail to multiple recipients who need to remain private, the recommended method is to use the BCC (blind courtesy copy) field or to use a private listserv.
  3. Installation of any device (other than personal mobile clients) on the Winthrop University campus that uses licensed or unlicensed frequencies that coincide with frequencies used by wireless technology equipment owned by Winthrop University must be authorized by the Division of Computing and Information Technology.  Winthrop University allows, but does NOT recommend, the installation of personal access points.  If personal access points are installed without authorization from the Division of Computing and Information Technology, the channel must be set to channel 1 or 11 only; the security level must be set to WEP or better; the SSID must not refer to Winthrop University in any manner; and the device must be configured correctly such that the device does not provide services on the campus network.
  4. Winthrop University network connections may be configured by any user only if the connection uses DHCP to obtain the IP address. The use of a static IP address without authorization from the Division of Computing and Information Technology is inappropriate, and may result in loss of network access from the offending port.
  5. Network protocols, other than TCP/IP over DHCP, may not be added to any system connected to the Winthrop University network without authorization from the Division of Computing and Information Technology.
  6. All systems on the Winthrop University network must prohibit email relays from external sources.
  7. Logical connections to off-campus network resources should be maintained only when the user is present and actively engaged in use of that resource. Logical connections to off-campus network resources should be closed when not in use.
  8. Network based printer or device administration software, such as JetAdmin, may not be used on Winthrop University's campus network without authorization from the Division of Computing and Information Technology.
  9. Any activity that may be construed as hacking, snooping, or spoofing is expressly forbidden.
  10. [Residence Halls only] Applications for a "static 10 address" may be made if required for an academic project. A "static 10 address" allows the user to maintain a static IP address so that other systems on campus can establish a network connection. Applications must include a justification for the request, and be accompanied by a signature and recommendation from a faculty member involved in the academic project, as well as approval from the Associate Vice President for Information Technology.
  11. Services must not be hosted from computers without authorization from the Division of Computing and Information Technology.  Examples include, but are not limited to, web services, externally accessible telnet and ftp services, mail services, and file-sharing services.
  12. Methods must not be employed to maintain persistent connections through the Network Address Translation (NAT) system to keep an external IP address presence.  The NAT system is in place to allow a limited number of external IP addresses to be shared by the entire campus community.  Persistent connections are unfair to other users by monopolizing the NAT system thereby preventing other users from gaining access to external IP connections.  
  13. All privately owned computers (such as student owned computers in the residence halls) must have current up-to-date antivirus software installed and active if the computer is connected to the campus network.  All computers must remain updated with their operating system (e.g. Windows Update).  All computers must remain cleaned of spyware through periodic scanning to reduce generation of unintended traffic and data transmission.
  14. All University owned computers must have the current Winthrop approved antivirus software installed.  The current approved desktop solution for antivirus on the PC and Macintosh platforms is SOPHOS.  Alternate antivirus solutions may be used with authorization from the Division of Computing and Information Technology.
  15. Methods must not be employed to misclassify network traffic in order to bypass campus firewalls or classification mechanisms.  The use of http tunneling to route non-http traffic, for example, is not permitted.

Violations of these guidelines cause disruptions in service to other users, and may result in disciplinary action.

Questions regarding these guidelines should be directed to James Hammond, Associate Vice President for Information Technology, 803-323-2148, hammondj@winthrop.edu.

CONTACT INFORMATION
Computing & Information Technology
15 Tillman Hall
Rock Hill, SC 29733
803/323-2400
803/323-2580 (fax)
helpdesk@winthrop.edu
Adobe ReaderHelp Desk SupportMathematicaBlackboard Online CoursesRegister for WU AlertWingspanWingspan Lite