6.13 NETWORK CONTROLS
Effective: August 15, 2024
Purpose: Emporia State University is committed to maintaining the confidentiality, integrity, and accessibility of the information it owns or controls.
Access to these assets is provided by several avenues. These include: wired network, wireless network, and VPN. The avenues that the University provides for access are protected by policies, standards, guidelines and other security measures including, but not limited to, firewalls and intrusion detection devices.
This policy sets out to ensure that all avenues into our network are approved and properly secured in order to prevent unauthorized individuals or organizations from exploiting weaknesses in network to gain access to systems or information.
Scope: This policy applies to all network access devices connected to the University network.
Responsible Office: Information Technology
Policy Statement: All users are responsible for taking the steps necessary to protect University information. This includes:
- Using only approved and authorized means to connect to ESU’s network;
- Obtaining proper approval before connecting any access device to ESU’s network; and
- Notifying the Information Security Officer (ISO) of any variance to this policy.
The ISO is responsible for monitoring and reporting compliance with this policy and for reviewing this policy on an annual basis.
Network access devices not approved and managed by Information Technology (IT) are prohibited. Examples of such devices include but not limited to:
- wireless access points;
- network switches, hubs, and routers.
The President or designee must approve any exceptions to this policy.
Definitions: All words and phrases shall be interpreted utilizing their plain meanings unless otherwise defined in another University or Board of Regents policy or by statute or regulation.
Procedures: All procedures linked and related to the policies above shall have the full force and effect of policy if said procedures have first been properly approved by the University’s administrator in charge of Information Technology.
[Information Technology procedures - coming soon]
Related Policy Information: [coming soon]