Network Use Policy

Polices for Connecting Devices to the University Network

Last Revision: June 22, 2017 | Contact:

The Tufts University network may only be used by authorized persons in a manner consistent with University policies, including the Information Stewardship Policy, other Tufts Technology Services (TTS) policies, and all applicable standards, guidelines, and procedures.

TTS has developed this policy to support the security and appropriate use of the Tufts University network, and to allocate access to network resources and bandwidth in an equitable manner. This policy will help users understand the specific conditions regarding connecting devices to the network.

  1. Users may only connect to the network from those locations that TTS, or its designees, has specified as connectivity points: TTS-provided wireless networks, voice/data jacks or separate demarcation points. These connections are limited to end-point devices such as desktop computers, laptops, servers, printers, tablets, smart phones, research or other lab equipment, clinical equipment, gaming stations, or other network-enabled end-point devices.

  1. Users may not extend or modify the network in any way by installing devices such as repeaters, bridges, switches, routers, gateways, wireless access points, or permanent hubs. These devices extend a single network connection into additional unmanaged connection points and are thus prohibited unless specific documented permission has been obtained from TTS Enterprise Infrastructure and Information Security. TTS may periodically review the implementation and reassess if a previously provided permission should continue.

  1. Users may not install mail servers without first discussing their project requirements with TTS. These devices could be used as open relays by outside e-mail firms and `spammers', making it appear that Tufts generated the mailing. Many firms block all e-mail from such originating organizations, putting Tufts at serious risk of e-mail service disruption and possible litigation. Any mail servers found not registered may be blocked by TTS.
  2. Users are encouraged to contact TTS, or its designees, when they would like to install Web, application, music, or other types of servers or other devices designed to provide services such as information storage, information processing, printing, applications, or access services. TTS can assist with best practices and management issues such as maintenance, backups, security, availability, and data management.  Those installing and managing these systems are responsible to comply with all applicable laws and regulations, University policies, guidelines, standards, and procedures, and any applicable licenses or other contracts.
  3. Users must use network services provided by TTS, or its designees, and not attempt to provision network services such as IP address assignment (i.e., DHCP servers), DNS, or other management services.

Any piece of equipment that is found in violation of this policy may be subject to immediate disconnection from the network and the owner/operator may be held liable for an infraction of the University policies, standards, and guidelines including the Information Stewardship Policies.