SSU Wireless/Residential Network Guidelines
The SSU Wireless/Residential (Wired & Wireless) Network Guidelines are Conditions for Use to support the Network and Computer Use Policy 5.30 on accessing and using resources on the SSU network. The rules outlined in this document provide more specific Conditions for acceptable use required of a Wireless/Residential (Wired & Wireless) Network Participant. Since the SSU Wireless/Residential (Wired & Wireless) Network is an “always on connection” similar to commercial broadband, the University has a responsibility to both the Wireless/Residential (Wired & Wireless) Network users, and the greater internet community to protect them from each other. These rules are meant to help educate, inform, and help provide an environment free of computer viruses and security attacks. They are meant to help foster a friendly, safe and clean network environment for Wireless/Residential Network users. They are not optional and apply to all individuals connecting to the Wireless/Residential (Wired & Wireless) Network.
From this point forward the term “Wireless/Residential (Wired & Wireless)
Network” will be referred to as “Wireless Network” and will be considered any
wireless or wired network that is managed by UIS that is intended for
student/staff use with personally owned computers and other approved devices.
Other documents to review
The following documents contain additional information regarding the SSU Wireless/Residential (Wired & Wireless) Network:
Use of the Wireless Network services is a privilege and it is the responsibility
of each user to utilize these services appropriately. By connecting a host
(computer, game console or any other approved device utilizing the network) to
the Wireless Network, users are bound to and required to adhere to all aspects
Campus Computer and Network Use Policy 5.30
Conditions for Use of Campus Computing Resources
as well as any and all university, city, county, state and federal regulations.
In addition, users of the Wireless Network at SSU are required to adhere to the
following terms of acceptable use.
- Users will refrain from abuse and excessive use of the finite resources and hosts connected to the Wireless Network. Users will also refrain from abuse and excessive use of hosts and services outside of the Wireless Network.
- User must not illegally download or share copyrighted items. Including but not limited to movies, music, software or games.
- As the intent of the Wireless Network is to provide users with access to outside services, users will not attempt to run any unauthorized services.
- Users will not attempt to circumvent the Wireless Network's firewall or any other established network services.
- Users will not modify or tamper with any of the Wireless Network wiring, hardware, access points or network jacks.
- Users are responsible for all network traffic originating from their host.
- Users are prohibited from installing personal routers (wired or wireless) to the network. Routers may disrupt the network and introduce unnecessary security risks for other housing students
Any actions that are deemed a violation of this Acceptable Use Policy may result
in a termination of services. Users are subject to any applicable university
and/or criminal sanctions and procedures. For more information, questions, or
to report an abuse, contact UIS Help Desk at 740-351-3538 or via email at
In addition to the Acceptable Use Policy, individuals must comply with the following rules:
1. UIS provides protection to all UIS managed networks but users are ultimately responsible for securing their own computer systems. Therefore computers connected to the Wireless Network must meet the conditions outlined below:
a. Software must be installed and running.
b. Software definition files must be current.
c. Live Update feature must be enabled for Anti-virus/Anti-malware definition files.
Operating System Updates
a. Operating System updates will be posted when required. Any required updates must be applied.
Network Access Control technology will be utilized to ensure that all of the conditions are met on each individual’s system. If conditions are not met, the student will have be prompted on the steps needed to be followed.
2. The Wireless Network will be scanned to check for malicious activity. If
issues are detected on a system, the owner of that computer will be notified of
the action taken to resolve the problem and will be advised of the steps that
must be taken to be reconnected to the Wireless Network.
In order to reactivate a port after a virus or other malicious software has been removed, an appointment with a UIS Technician may need to be made for a Technician to verify the hard drive has been cleaned.
3. Servers of any kind will not be allowed on the network.
Servers open security holes on the network. These holes allow attackers to gain access to your computer or the network. They also may serve files you are not aware of. Specific examples of servers are: Web servers (apache, Windows Personal Web Server, etc), FTP servers (Serv-U, WS-FTPD, etc), File sharing servers, Gaming servers and many more.
4. Static IP’s will not be allowed on any system.
There is no reason to have a static IP on the Wireless Network. The Wireless Network system monitors IP addresses and assigns them as needed.
5. Network port scans will not be allowed.
Port scans may be performed by UIS to maintain the network. However, no individual is to perform a port scan of any host inside or outside of the Wireless Network. This will be considered a network attack.
6. Network attacks of any kind will not be tolerated.
Network attacks are serious concerns to UIS and should be to the individual involved as well. They can result in expulsion from the University and even Federal charges.
7. There will be no dissemination of libelous, slanderous, racial, or offensive material.
8. Software and hardware devices that are currently prohibited by Shawnee State University and UIS will not be permitted on the Wireless Network.
Devices such as wireless network products (e.g. Apple Airport), thin-clients, hubs, switches, routers, print servers, and network appliances.
9. The Wireless Network services and physical wiring may not be modified or extended for any reason. This applies to all network wiring, hardware, access points and in-room jacks.
10. Shawnee State University restricts illegal peer-to-peer (P2P) file sharing
on our campus network. P2P technologies may be used for legitimate purposes such
as instructional gaming, open source downloads, and licensed distribution of
media files; however, the use of P2P software to violate copyright law carries a
number of possible sanctions, including loss of Internet access, internal
disciplinary actions, and even civil or criminal charges. Shawnee State
University takes our obligation under The Higher Education Opportunity Act (H.R.
4137), as well as all other State and Federal legislations that address P2P file
sharing, very seriously and will make all efforts to comply with authorities if
users of the Shawnee State University Network are suspected of violations.
Violation of the Wireless Network rules may result in disconnection from the Wireless Network (temporarily or permanently) and/or referral to the Vice-President of Student Affairs for disciplinary action. A UIS referral could result in a formal reprimand, probation, suspension or dismissal from the University. Depending on the nature of the violation you could also be prosecuted under local, state or federal laws.
If events beyond the scope of these rules should arise, with Executive authorization, UIS will take the necessary actions to resolve the issue. If you have any questions about these rules and would like clarification, please contact the Help Desk.
Disclaimer – Document Content
The information contained in this document will be modified when warranted and without prior notice.