To assure the appropriate use and access to the university data network, to assure only authorized technology is connected to the network to insure the confidentiality, integrity, security, and authenticity of data traveling via the campus data network.
This policy applies to faculty, staff, students, contractors, consultants, temporaries, and other workers of the Penn State Mont Alto campus, including all personnel affiliated with third parties. This policy applies to all equipment that is connected to the Penn State Mont Alto data network.
A full or part-time user has the ability of using a personal computer on the university network to support research endeavors or introduce instructional technology within the classroom if the user accepts the policies within. A formal request must be submitted to the campus Director of information technology. The request must include the users’ intention for using the personally owned computer on the university network. Each request will be evaluated and either approved or denied with reason.
A staff member must submit a written request to the campus Director of Information Technology detailing the users’ intention and reason for requesting use of a personal computer on the university network. Each request will be evaluated and either approved or denied with reason.
Student owned computers are not permitted on the campus administrative network.
A campus visitor requesting access to the campus academic or administrative network will be denied. Use of the university wireless network is available as a, fee based service. A Short Term Access Account (STAA) may be issued to the user for a fee of $5.00 per month. The user must request the account from the Information Technology Services helpdesk. There is a one day waiting period before the account is activated. The visitor must present the helpdesk staff with a form of identification and sign a computer usage policy.
- The use of a surplus computer (computer / laptop) will be proposed for use prior to authorizing the use of a personally owned computer.
- The user agrees to utilize his/her personal computer inline with current and future university policies (i.e. AD-20, etc.).
- A personally owned computer may not be used in combination with the university network to:
- Host personal or non-university business related websites.
- Conduct personal business.
- Perform illegal acts of any kind violating university, local, state, or federal policy and law.
- The user agrees to purchase and maintain correct software licensing for all installed software on a personally owned computer.
- The user must install and maintain appropriate firewall and antivirus software to prevent virus infection and the creation of virus related network traffic. Failure to comply will result in a disabled network connection. If a computer becomes infected with a virus, the operating system must be removed and the system rebuilt. This process will need to be verified by a member of the Information Technology Services helpdesk.
- If a personally owned computer repeatedly becomes infected with a virus, the Internet Protocol (IP) address will be revoked and the user will forfeit the ability to use a personally owned computer on the university network.
- Each user has the ability to request a maximum of two IP addresses.
- A user requesting access to the university network for a personally owned computer must provide the network adapters hardware address (MAC address) when requesting an IP address from the Information Technology Services Department.
- A university owned Internet Protocol (IP) address will be assigned in conjunction with the hardware address provided by the user. The IP Address is authorized for use only with the hardware address reported to the Information Technology Services Department. Use of the assigned IP information with a non-registered and approved hardware address will result in the forfeit of this privilege.
- The Director of Information Technology has the right to deny a user’s request to connect a personal computer to the university network if a user creates a credible threat to the overall health and functionality of the university network.
Other policies that should also be referenced: