Public Ethernet Line Acceptable Use
The University of Arizona maintains access to local, national, and international networks to support its fundamental activities of instruction, research, outreach, and administration. By using the Library Computing Network (library network) you need to take necessary measures to safeguard the operating integrity of the system. This policy covers all persons accessing computer or network resources through any UA Library facility. The following policies govern the use of the library network:
- Library network services and wiring may not be modified or extended beyond the area of their intended use. This applies to all network wiring, hardware and in-room jacks. The use of a hubs/hublets or data switches is prohibited.
- The library network may not be used to provide remote (off-campus) Internet access to unauthorized users for any purpose.
- University-specific network resources or network resources obtained commercially by the University may not be retransmitted outside of the University community.
- Network use or applications which inhibit or interfere with the use of the network by others are not permitted (e.g., spamming).
- Any computer connected to the library network must have up-to-date security patches and anti-virus software to protect both it and the library network. If failure to comply with this results in damage to or degradation of the performance of the network, access to the network will be blocked and the user must accept responsibility for any liability.
- Users must register their computers and have a valid University of Arizona NetID and password in order to connect via ethernet cables to the University network. Anti-virus software is available to university students, faculty and staff from the UA Sitelicense Web site. Users should adhere to University software use policies.
- Users must comply with all university policies regarding connection to and use of the campus network .
University Information Technology Services (UITS) is responsible for protecting the rights of users, setting policies consistent with those rights, and publicizing those policies to their users. They have the authority to control or refuse access to the network to anyone who violates these policies or who threatens the rights of other users. UITS has the authority to temporarily suspend network access without notice for any user/computer that is believed to have been the source of an alleged violation pending investigation of the violation and satisfactory resolution of the complaint.
Last modified: February 24, 2014