EIU Network Use Policy
All computers and devices attached to EIU’s network must have appropriate software running to ensure a secure environment for all users. Information Technology Services may provide monitoring software to ensure compliance with this policy. The software will assist users in maintaining their computers and devices in the manner prescribed by ITS.
Software needed to ensure a secure environment includes:
- ITS approved malware protection software.
- Vendor-supported operating system with current security update and patches.
- Monitoring software to ensure that copyrighted files are not freely shared over the internet.
- Other software as periodically deemed appropriate by ITS to ensure a safe and secure Internet and Intranet for all network users.
The primary purpose of EIU’s network is to support EIU’s mission and students' educational goals. Participating in the following activities may result in revocation of university network privileges and possible employee disciplinary action or university judicial action and/or criminal charges.
In support of these goals, the following activities are prohibited without specific written consent of ITS:
- Child pornography or child pornography related material.
- Setting up a router, wireless router, or a private subnet.
- Setting up any type of information server to host services such as a web, gopher, email, games, etc.
- Propagating phishing or email chain letters.
- Forging email.
- Allowing unauthorized persons access to the university network.
- Using EIU’s network for personal financial gain.
- Copying university-owned or licensed information to another computer without prior written approval.
- Unauthorized distribution of copyrighted materials. The Digital Millennium Copyright Act prohibits the unauthorized distribution of copyrighted materials. Unauthorized distribution of copyrighted materials is not an acceptable use of the EIU network and will be possible termination of network access privileges.
- Modifying or attempting to modify University-owned or licensed information including software and data.
- Attempting to damage or disrupt networking services.
- Using the university network or related resources in the commission of a crime.
- Use of software or devices to preform reconnaissance, scan for vulnerabilities or attack other devices on EIU’s network or the internet.
- Using traffic intensive applications may cause problems within the network or diluting the level of service to other users. No print servers, mail servers, FTP servers, etc. are allowed. The network sharing of any computer-related device or materials that may cause excessive network traffic is forbidden.
Bandwidth consumption is monitored to prevent inappropriate use of university resources (For example, setting up a public web site). The use of the university provided internet service is a privilege that may be revoked at any time for inappropriate behavior.
The user will abide by all policies and statutes included in the Federal Computer Crime Laws. Crimes against these laws will result in employee disciplinary action, university judicial action and/or investigation by the University Police Department for criminal offense. The laws include offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access. are available at the following website.
The Illinois Child Online Exploitation Reporting Act (ICOLAR) requires EIU to report suspected child pornography to the National Center for Missing and Exploited Children (NCMEC).
Further Reading
http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446
Illinois Child Online Expoloitation Reporting Act
Last Date Reviewed: 06/13/2024