Statement of Policy

Library and Technology Services (LTS) is charged with developing and maintaining a secure, fault-tolerant, high-performance campus technology infrastructure to support instruction, research, administrative activities and university communication and outreach. Under this broad mandate, LTS is responsible to develop and promulgate standards which will ensure that the centrally-supported technology infrastructure is secure and operational.

Definitions

Campus Network refers to the campus-wide network and associated network services established, funded by the University and supported by LTS for general academic and administrative use. This network comprises both wired and wireless components.

Department-Managed Network - a network facility and associated services that support specific department-internal activities and which receives financial, technical and operational support from resources supplied by the department.

Network-connected Device – any electronic entity that uses a network to communicate. These include but are not limited to routers, switches, servers, computers, wireless access points, cameras, A/V equipment, monitoring equipment, etc.

  1. Implementation

    The University recognizes that different needs of campus constituents may lead to conflicts in standards, priorities, and operations. LTS will work with representatives from the appropriate constituent groups to seek balanced solutions to problems identified under this policy. Effective implementation of this policy requires the close cooperation of all departmental representatives across the campus.

  2. Mediation of Disputes

    In the event that a dispute arises in the administration of this policy:

    • ACIS will provide clarification of this policy statement or its implementation activities.
    • Further arbitration of disputes arising from this policy will be brought to the Provost for resolution.
  3. Rationale

    The objective of this cyberinfrastructure policy is to ensure that new and existing networks, network equipment, (including wireless network equipment), servers, computers, and all network-connected devices (whether university-owned or not) conform to certain technical, operational, and maintenance standards so as to have no consequential impact on the reliability, stability, or maintainability of the campus technology infrastructure.

  4. Precedence and Performance

    All devices connecting to the network must be capable of complying with LTS-selected standard network protocols. Departments should verify that devices they wish to purchase comply with the requirements and standards prior to purchasing.

    LTS will perform an ongoing assessment of the performance, utilization, and security of the core network and network subnets. Sub-nets or network-attached devices that pose a risk to the broader network community will be considered for removal from the network until the risk is reduced or eliminated. Action taken will depend on the severity of the discrepancies and the associated vulnerability of the network. To that end, LTS will take all reasonable steps, consistent with the risk posed, to help departments resolve the non-compliance issue.

    Likewise, while it is acknowledged that departmental networks are permitted to operate within their own spaces, at no time should a departmental network create an adverse operational effect on the broader campus-wide network. The existence of such an adverse effect will be jointly reviewed by LTS and the specific department to eliminate the non-compliance issue.

    LTS reserves the right to scan network-connected hosts to understand what resources are connected to the network and the vulnerability of each. LTS will provide advanced notification to departmental network managers, where applicable, prior to initiating such activities.

    Since the campus wireless network operates in an unlicensed frequency and is a shared resource it is important to reduce the interference caused by separately managed wireless broadcast devices (Access Points and other wireless devices). LTS is responsible for providing campus-wide wireless that is integrated into a single network environment. It is important that other wireless devices in the same unlicensed bands do not interfere with the campus-wide wireless. LTS will ensure (to the extent that budget provides) that areas of poor wireless coverage are addressed and enhanced such that non-LTS wireless equipment can be removed and interference diminished.

    Servers residing in the central data center must meet certain specifications for hardware, operating system software, network interoperability and security. Servers meeting those requirements will be operated, backed-up, and protected by LTS. Servers not meeting the requirements will not be permitted. LTS will provide disaster recovery services for servers operating in the data center pending funding from the department.

  5. Standards Employed

    LTS will develop, publish and maintain a set of standards which will ensure that network segments and connections can interact appropriately with the campus-wide network, that network security is maintained, and that network hardware and software is maintained. Standards will include but not be limited to such issues as:

    • Electronic interface
    • Cable plant used within the subnet
    • Internal configuration
    • Security practices
    • Use of appropriate network monitoring procedures
    • Up-to-date network diagrams
    • Appropriate server security facilities in place (including anti-virus and software patch levels)
    • Currency of operating system release levels
    • Backup procedures are in place and adequate
    • Hardware maintenance and/or support is in place
    • Software maintenance and/or support is in place
    • Departmental contact is assigned and available on-call
    • Appropriate technical documentation is available
    • All applicable software has been appropriately licensed
  6. Violation of standards

    LTS has the responsibility to disconnect from the network any network subnet, wireless access point, server, computer, or any other network-connected device that has been identified as being the source of any action which:

    • Violates applicable "conditions of use" policies
    • Violates local, state, federal or international laws
    • Is determined to be a nuisance or potential nuisance
    • Is determined to be compromised or is likely to be compromised
    • Is interfering with the security or performance of the broader infrastructure

    LTS will notify the appropriate departmental contact of the nature of the “violation” and assist the departmental contact to cure the violation.

  7. Standards Review

    The standards used to assess cyberinfrastructure services will be reviewed and updated as necessary.

Revised August 25, 2015