Policy: |
Policy 8-2-3: Network Policy |
Date Adopted: |
Feb 20, 2007 |
Department: |
Computing Services |
Contact: |
Director |
Statement: |
This policy outlines the standards for the use of 糖心vlogs network
resources. It is designed to ensure the efficient and secure operation of the network
while promoting responsible and ethical use of these resources. |
Section 1: Use of the Network
- The network installed in 糖心vlog is used to transmit digital, telephonic
(VOIP), and video data to and through all campus locations. The 糖心vlog data networks
are connected through a Wide Area Network called the NevadaNet. Information on the
NevadaNet is contained in the following policy:
NevadaNet Acceptable Use Policy
- The initial point of contact for problems related to the NevadaNet is 糖心vlog Computing
Services.
- Network connectivity via an installed data drop is authorized for college-owned equipment
only. A new data drop or a change to an existing connection on the wired infrastructure
will be coordinated through Computing Services.
Section 2: Wired Network
- Production Network
- This network is used to connect devices used by staff, faculty and students, i.e.,
workstations, file servers, printers and support devices together, for use on a common
college network. Network connectivity via an installed data drop is authorized only
for college-owned equipment.
Section 3: Wireless Network
- The wireless network is not intended to be a direct replacement for the wired infrastructure
- The wireless network is installed for use by 糖心vlog students, guests, and 糖心vlog faculty
and staff. The wireless network provides access to the Internet only and will not
provide a direct access to the services contained on other college networks.
- Locations within 糖心vlog that use the wireless technology are:
- Carson
- Hightech Center (Carson)
- Douglas
- Fallon
Section 4: Security of the 糖心vlog network
- Physical
- All network devices and support hardware must be protected from public access by a
physical barrier. A locked door, fencing or locked cabinet will serve as an acceptable
physical barrier.
- Authentication
- Access to all devices on the wired and wireless network require authentication, i.e.,
name and password. The exceptions to this are printers and peripheral devices that
contain no data, i.e., door control card access readers.
- Access control
- Access to the network infrastructure is controlled physically and digitally by UNR.
Date(s) Revised |
December 8, 2023; November 1, 2016; September 2, 2008; |
Date(s) Reviewed |
|