Search Information Security site

 

Connecting Network Equipment Procedures

Table of Contents

1.  Purpose and Background
2.  Procedures
     a) ITS-Managed Wired and Wireless Networks
     b) HIT-Managed Wired and Wireless Networks
     c) UVA-Wise Managed Wired and Wireless Networks
3.  Definitions
4.  Related Links
5.  Exceptions

[Return to Library]

1. Purpose and Background

In order to assure the highest level of service to the users of the University’s networks, it is critical to preserve their manageability, robustness, and security. Unauthorized networking equipment can disrupt normal network operations through interference or misconfiguration and can provide unauthorized access to the University network.

In order to maintain the integrity and availability of the University’s information technology resources, only Information Technology Services (ITS), Health Information and Technology (HIT), or their authorized designees may attach networking equipment (e.g. routers, switches, wireless access points, DHCP/DNS servers) to the University network or modify University network infrastructure (e.g. building copper and fiber cable plant, outlet wiring) as stated in the IRM-002: Acceptable Use of the University’s Information Technology Resources policy.

[Table of Contents]

2. Procedures

ITS Managed Wired and Wireless Networks

To request ITS installation of networking equipment or infrastructure, fill out the appropriate request in the ITS Service Catalog under “Connecting.”  For approvals, exceptions, authorizations, and designations, fill out the “Consultation Services” request.

Health Information & Techology Managed Wired and Wireless Networks

The procedures governing the acquisition of IT-enabled resources are described by Health System Policy IT-001

UVA College at Wise Wired and Wireless Networks

To request OIT installation of networking equipment or infrastructure, fill out the Office of Information Technology Helpdesk request form, call 276-376-4509 or email helpdesk@uvawise.edu.

[Table of Contents]

3. Definitions

For a comprehensive list of the definitions found in the Acceptable Use, Data Protection, Information Security, and Privacy & Confidentiality policies, please click here.

[Table of Contents]

4. Related Links

[Table of Contents]

5. Exceptions

If you think you need to request an exception to these requirements, please refer to the Exceptions Process.

[Table of Contents]

APPROVER: Chief Information Security Officer

 

 

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security Office will evaluate the report and provide a full investigation.

Complete Report Form