Information Technology


 

OCUNet Policy: Network Resources

The OCU network is actively monitored 24/7 by a SonicWALL Internet security appliance. This device is responsible for all real-time gateway anti-virus, anti-spyware and intrusion prevention. The device also provides SPAM filtering, policy enforcement, content filtering, and other network management capabilities. The SonicWALL Internet security appliance daily provides the OCU Department of Technology comprehensive reporting of various network activities. Below is a list of activities reported by SonicWALL that are strictly prohibited on the OCU network:
  • Any activity that can be classified as a user's attempt to "hack" the OCU network. Hacking is defined as "To use one's skill in computer programming to gain illegal or unauthorized access to a file or network." This includes the tampering with the network configuration on the user's personal computer.
  • Viewing of unauthorized websites as outlined in the OCU Community Handbook. Excessive violations reported by SonicWALL will be reported to Student Services for review. Activities will be handled in concordance with the OCU Community Handbook.
  • Usage of any peer-to-peer (P2P) file-sharing software to download or upload files of any kind, especially illegal music or movie files. P2P software presents critical security concerns that threaten the integrity of the OCU network. The presence of P2P file-sharing software on any end-user's computer is strictly prohibited. SonicWALL reports such software to the Department of Technology. The first occurrence will result in a written warning. The user must immediately cease the use of P2P file-sharing and remove any computer software used in this activity. The second occurrence will result in the temporary removal of the user's access to network resources. The user must bring their personal computer to technology staff for removal and will be charged a $25 service fee, to be paid in the business office. The user's access to network resources will be reestablished upon receiving receipt of the service fee and verification of software removal by the technology staff. The third occurrence will result in the permanent removal of the user's access to network resources for the remainder of the current and following semesters. Violations may also be prone to legal actions taken by the university. Ohio Christian University reserves the right to actively pursue those who use campus resources to commit illegal activities.