Network Guest Access
Scope
The scope of this policy covers the security of University electronic information and the infrastructure upon which this information is processed, transmitted or stored and the access of these resources over the University network by guests of the University.
Foundation / Philosophy Statement
The University may need to grant network and information system access to guests for legitimate reasons. In such cases, proper management of this guest access should be used in order to maintain the security of University systems and information.
Statement of Policy
As a convenience to University guests and others having legitimate, professional affiliations with the University, 欧洲杯投注 allows approved individuals to receive guest access to 欧洲杯投注 information systems and receive guest Net-ID accounts. Guest Net-ID accounts serve the purpose of allowing approved individuals access to certain University network resources for a limited period of time. Net-ID guest access will be limited to individuals who need information systems access in support of instruction, research, or administration.
Guests are subject to the same policies and procedures governing access to information technology resources as other 欧洲杯投注 faculty, staff, and students. To be granted guest access, an individual must be sponsored by a faculty or administrative employee of 欧洲杯投注 and must read, agree to, and abide by the 欧洲杯投注 Network Usage Policy.
Requestors are responsible for ensuring that guests know the laws and procedures governing access to information technology resources at 欧洲杯投注.
ITS Responsibilities
ITS is responsible for managing guest network access to University systems and data. ITS develops policies, procedures and guidelines which manage guest network access to University systems and data.
Operational Procedures
Operational Procedures define our department's services, expectations, and role as part of the campus community.
- Asset Classification
- Campus Computer Repurposing & Surplus Process
- Chargeback for Technology Support
- Computing Environment Support Policy
- Desktop Support Service Guidelines
- Desktop Operating Systems Support
- Data Custodianship
- Data Handling After a Campus Official's Departure
- Employee Checkout/Off-Boarding
- Guest Access
- Information Outsourcing
- Ingeniux & Google Analytics
- Listserv Policy
- Securing Office Computer Equipment
- Port Activation
- Surveillance Camera Use
- Technology Purchasing & Acquisition
- Web DNS Policy & Naming Guidelines