EIU Network Use Policy

All computers attached to EIU’s network must have appropriate software running to ensure a secure environment for all users. Information Technology Services will provide monitoring software to ensure compliance with this policy. The software will assist students in maintaining their computers in the manner prescribed by ITS. 

Software needed to ensure a secure environment includes:

Bandwidth consumption is monitored to prevent inappropriate use of university resources ( i.e., setting up a public web site from a residence hall room). The use of the university provided internet service is a privilege that may be revoked at any time for inappropriate behavior.

The primary purpose of EIU’s network is to support students' educational goals. In support of these goals, the following activities are prohibited without specific written consent of ITS. Participating in the following activities may result in revocation of university network privileges and possible University judicial action and/or criminal charges.

The user is allowed to share her/his RJ45 Ethernet port with more than one computer/device at the same time via use of a hub/switch. . The user will abide by all policies and statues included in the Federal Computer Crime Laws. Crimes against these laws will result in University judicial action and/or investigation by the University Police Department for criminal offense. The laws include offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access. The Federal Computer Crime Laws are available at the following website.

http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446