Home » Services and Admin » ICT Service » Policy Documents » Network Policy

Network Policy

 

All Computer Room and office PCs are connected to the EUI network.

Personal devices (laptops, smartphones, etc.) belonging to EUI members can be connected to the EUI network to gain access to a number of services such as web-browsing, personal or shared area access, printing, accessing email, etc.

The ICT Service provides instructions for connecting to the EUI LAN and WiFi. These instructions are generally compatible with any recent and properly configured Windows, Mac or Linux machine. It is therefore recommended that users carry out the initial network configuration by themselves on the basis of those guidelines.

If you do not succeed in establishing a connection yourself you may refer to Portable Device Support for help. However, before doing so please consider that the inability to connect using the standard settings provided usually means that there is a special configuration on your computer.

Altering your own particular configuration to obtain connectivity might be detrimental to the functionality of your computer and/or software. 

 

The rules and regulations below apply to ANY user and/or ANY device (desktop computer, laptop, smartphone, etc.) connected to the EUI network:

  1. It is the responsibility of each user to use these services appropriately and in compliance with all EUI and European regulations.
  2. The EUI network is a shared resource. Using excessive bandwidth for extended periods of time and inhibiting the use of the network by others may result in the termination of network services.
  3. Digital reproduction and distribution of copyrighted materials is against international law. Anyone found distributing (sharing) such material, including copyrighted music, digitized video from copyrighted motion pictures, copyrighted software, etc.) will have their access to network services terminated.
  4. It is strictly prohibited to use the EUI's network to create and distribute (share) obscene, offensive, indecent, defamatory or any other content which may offend human dignity with respect to gender, race or belief other than for justified research purposes.
  5. It is prohibited to use P2P or any other (sharing) software which may reduce bandwith and/or breach security.
  6. Attempts to circumvent or defeat any mechanism put in place by the ICT Service to manage the network and users' privacy will be subject to immediate termination of network services.
  7. The EUI network services and wiring may not be modified or extended beyond the area of their intended use of one computer per network socket.
  8. The EUI wireless network services and wiring may not be modified or extended beyond the area of intended use.
  9. It is forbidden to install hubs, switches or any kind of hardware or software devices with the intent to duplicate and/or share access to the Institute's network. It is also forbidden to install WiFi equipment for sharing network access or resources of any kind.
  10. The EUI network may not be used for any commercial purposes or used to provide Internet or EUI network access to non-EUI members or anyone outside the EUI community for any purpose (third-party routing).
  11. It is prohibited to transmit unsolicited commercial or advertising contents (spamming).
  12. Faking or otherwise misrepresenting one's identity via email or any other form of communication is a violation of law. This includes forging IP addresses or ethernet adapter addresses to conceal your computer's identity.
  13. Any unauthorized attempt to access another computer (on or off campus) is prohibited. Attempts made by individuals to access other computers will result in the immediate deactivation of the suspected network connection.
  14. The EUI adopts any national (Italian) and/or European regulation, including social conventions (netiquette), prohibiting illegal or offensive activities.

 

Network Firewall

The EUI's network firewall is set up in such a way as to block most incoming/outgoing connections. Please refer to the Firewall Policy for further information.

 

Consequences of Misuse

Members infringing the above rules and regulations may face sanctions as per the Acceptable Use Policy (AUP).

Page last updated on 17 August 2017