Network Use Policy

Guidelines for Connecting Devices to the University Network
October 9, 2001

As outlined in the Information Stewardship Policy and Supporting Information Policies, the Tufts University network may only be used by authorized persons in a manner consistent with those policies and Technology Service guidelines.

Technology Services has developed these guidelines to support the security and appropriate use of the Tufts University network, and to allocate access to network resources and bandwidth in an equitable manner. These guidelines will help users understand the specifics regarding connecting devices to the network. These guidelines supplement the Information Stewardship Policies.

  1. Users may only connect to the network from those locations that Technology Services, or its designees, has specified as connectivity points: voice/data jacks or separate demarcation points. These connections are limited to end-point devices such as PCs, notebooks, workstations, printers, or other terminating devices.
  2. Users may not extend or modify the network in any way by installing devices such as repeaters, bridges, switches, routers, gateways, wireless access points, or permanent hubs. These devices extend a single network connection into additional unmanaged connection points and are thus prohibited unless specific permission has been obtained from Technology Services, or its designees.
  3. Users may not install mail servers without first discussing their project requirements with Technology Services. These devices can be used as open relays by outside e-mail firms and `spammers', making it appear that Tufts generated the mailing. Many firms block all e-mail from such originating organizations, putting Tufts at serious risk of e-mail service disruption and possible litigation. Any mail servers found not registered may be blocked by Technology Services staff.
  4. Users are encouraged to let Technology Services, or its designees, know when they install Web, application, music, or other types of servers or devices designed to provide file, print, application, or access services. Technology Services can assist with best practices and management issues involving security and maintenance.
  5. Users must use network services provided by Technology Services, or its designees, and not attempt to provision network services such as IP address assignment (i.e., DHCP servers), DNS, or other management services.

Any piece of equipment that is found in violation of these guidelines may be subject to immediate disconnection from the network and the owner/operator may be held liable for an infraction of the Information Stewardship Policies.