SITE Network Registration

SITE Networking is supported by SITE Support Staff.

For help registering your computer please see a consultant in STE 0110.

YOUR LOGO HERE

Registration Info

    The machine you are using has already been registered to the SITE network. No additional information is required.

Acceptable Network Usage Policy

    The University expects that all persons who make any use of University computing hardware, software, networking services, or any property related or ancillary to the use of these facilities, will abide by the following policy statement:

    University information technology resources are provided in the hope that the whole university community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.

    All hardware, software, and related services supplied by the University are for the sole purpose of supplementing and reinforcing the University's goals as set forth in the student and faculty handbooks and other mission statements of the University. Misuse of these facilities is a violation of Computer Crimes Statutes and possibly other laws as well. It is a specific violation to give account passwords to individuals who are not the owners of such accounts, or to obtain passwords to or use of accounts other than one's own.

    We expect that noone will use hardware, software or services without authorization to do so. Copying software is a violation of federal copyright law. Individuals may not extend their use of the facilities described above for any purpose beyond their intended use, nor beyond those activities sanctioned in University policy statements. In particular, no one may use them

    • for personal profit or gain,
    • to harass, threaten, or otherwise invade the privacy of others,
    • to initiate or forward e-mail chain letters,
    • to cause breaches of computer, network or telecommunications security systems,
    • to initiate activities which unduly consume computing or network resources.

    Individuals who violate the aims of this policy will be subject to disciplinary action or to referral to law enforcement authorities. Information Technology Services personnel are authorized to monitor suspected violations and to examine items stored on any University storage medium by individuals suspected of violating this policy.



Copyright ©2005, 2006