Network Infrastructure Access

1.0 Overview

This policy is designed to outline the security requirements for the Network Infrastructure and define the levels of access that are permitted based on job duty.

2.0 Purpose

Provide specific access guidelines and permissions to the Network Infrastructure based on need.

3.0 Scope

This policy impacts any individual who has previously had access to the Network Infrastructure, and those who continue to require access under the new guidelines.

4.0 Policy

The Network Infrastructure is to remain secured at all times.  At no time should a door be left ajar and un-tended.  Individuals requiring access to the Network Infrastructure must request this access via the Network Engineer, Manager of Network Operations or the Director of Network Services.  Access will be granted for those who can demonstrate a need to access the Network Infrastructure due to their job duties.

Those authorized to access the Network Infrastructure will be issued the appropriate keys as is dictated by the Key Usage Policy.

Those having access to the Network Infrastructure will be placed into one of these categories with the resulting level of access:

  • Campus Safety and Security
    • This group includes all members of the Campus Safety and Security staff.
  • Full-Access Staff Members
    • This group is comprised of all staff members that are directly responsible for one or more components of the Network Infrastructure, participate in the on-call schedule and the CIO.  Access to the Network Infrastructure is granted to these individuals at any time.
  • Student employees
    • This group is comprised of student employees who need to access the Network Infrastructure during the normal course of their duties.  Access will be granted during each student’s normal working hours (business hours only).

Those having access to the Network Infrastructure also have the responsibility to report suspected unauthorized access or tampering with equipment to the CIO (or the Director of Network Services in the CIO’s absence).  The CIO will initiate an investigation into all reports of unauthorized access.

5.0 Enforcement

Failure to follow this policy will result in the offender(s) being subject to disciplinary action up to and including dismissal.  Individuals who gain access to the Networking Infrastructure by means other than those outlined in this document will be considered trespassing and will be referred to Human Resources or the Dean of Students as appropriate.

6.0 Definitions

NOC – Network Operations Center – Room 222 ERC

Networking Infrastructure – Any room containing voice or data networking equipment or interconnects

Guest – Anyone not considered an authorized staff member

7.0 Revision History

Draft Policy v0.1 – 05 May 2005 – jfiske

Draft Policy v0.2 – 22 September 2007 – jfiske, bhuntley

Approved Policy v1.0 – 4 November 2013 – jfiske

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>