AUP Quick Reference Guide

Guidelines, explanations, and examples to supplement the Acceptable Use Policy

Introduction

The Acceptable Use Policy (AUP) governs use of the WPI network, accounts, and technology. The examples below are provided to further explain some areas of the policy, but is not a replacement for the AUP. The full policy is agreed upon at login, and should be read by each individual who is granted access at WPI.

The difference between joining a personal network and an enterprise network is similar to the differences between driving a vehicle on a back road versus a major interstate. Devices on the WPI enterprise network are on the information superhighway! Along with the increased speed and accessibility comes the potential for increased exposure. The AUP helps to ensure technology resources and usage are functional and safe for the entire campus. To this end, WPI retains the right to audit activity, review violations, and deny network access in response to any activity that is not in compliance with the WPI policy.

AUP Examples

  1. Systems Usage: All WPI systems or services are used for academic and campus business purposes. Users will not subvert a system or service for illegal or inappropriate use. Users must not grant access to WPI resources to users outside the WPI community without express permission of the university. Examples of prohibited behavior:
    • Allowing unauthorized connections to devices on the WPI network
    • Tor
    • Torrenting
    • TeamViewer
    • LogMeIn Hamachi
  2. Ethics and Legality: All WPI technology resources are to be used for ethical and legal activities that comply with federal, state and local laws. Respect resources, property and privacy. Examples of prohibited behavior:
    • Illegally downloading copyrighted materials
    • Allowing devices to become infected with viruses and malware
    • Allowing devices to be connected without changing default passwords
    • Any type of hacking, network scanning, web exploits, or scraping
  3. No Personal Gain: The WPI network and connected devices may not be used for commercial use or personal gain. Users may not resell WPI computing or networking resources. Examples of prohibited behavior:
    • Mining of cryptocurrency
    • Any type of hosting or advertising for profit
    • Generating personal profit through the use of WPI resources
  4. Email Lists and Aliases: Creation of email lists and aliases is provided as a privilege to the WPI community. The creation of lists and aliases must adhere to the Institute's mission of research, education and community. WPI Group names may be properly used for official groups approved by WPI. Lists and aliases are closely monitored and the creator is fully responsible for any misuse or misrepresentation of the lists or aliases that they create. Examples of prohibited behavior:
    • Typosquatting: Using names of other people, groups or services that you are not authorized to represent.
    • Profanity: Use of profane language for list and alias names is strictly prohibited.
    • Not WPI related: Lists and aliases not approved by WPI for authorized business purposes.
    • Personal Lists: Lists and aliases created for personal use.

Standards

The WPI AUP and standards are in effect at all times. Users are responsible for familiarizing themselves with the standards and complying with them.

Reporting, Questions and Assistance

Information Technology encourages you to contact the WPI Service Desk if you need more information about the AUP.

WPI Info
What is your Affiliation with WPI?

Include details such as which device(s), your location (on or off campus), how long the issue has been ocurring.