Search Information Security site

 

External Physical Network Connections Procedures

Table of Contents

1.  Purpose and Background
2.  Procedures
     a) ITS-Managed Wired and Wireless Network
     b) HIT-Managed Wired and Wireless Networks
     c) UVA-Wise Wired and Wireless Networks
3.  Definitions
4.  Related Links
5.  Exceptions

[Return to Library]

1. Purpose and Background

In order to assure the highest level of service to the users of the University’s networks, it is critical to preserve their manageability, robustness, and security. Unauthorized networking connections can disrupt normal network operations through interference or misconfiguration and can provide unauthorized access to the University network.

In order to maintain the integrity and availability of the University’s information technology resources, only Information Technology Services (ITS), Health Information and Technology (HIT), or their authorized designees may provide for external physical connections to the University’s network (e.g., connections to an external Internet service provider) as stated in the IRM-002 Acceptable Use of the University’s Information Technology Resources.

[Table of Contents]

2. Procedures

ITS-Managed Wired and Wireless Networks

Departments wishing to request installation of an external physical connection to the University’s network or designation to install such a connection must fill out a request in the ITS Service Catalog under “Connecting: Consultation Services.” The request must explain the nature of the external connection, the benefit(s) expected from the connection, and the names, e-mail addresses, and phone numbers of administrative and technical contacts.

HIT-Managed Wired and Wireless Networks

The procedures governing the acquisition of IT-enabled resources are descrited by Health System Policy IT-001. 

UVA College at Wise Wired and Wireless Networks

To request approval for external physical connections to the network, fill out the Office of Information Technology Helpdesk request form or call 276-376-4509 or email helpdesk@uvawise.edu.

[Table of Contents]

3. Definitions

For a comprehensive list of the definitions found in the Acceptable Use, Data Protection, Information Security, and Privacy & Confidentiality policies, please click here.

[Table of Contents]

4. Related Links

[Table of Contents]

5. Exceptions

If you think you need to request an exception to these requirements, please refer to the Exceptions Process.

[Table of Contents]

APPROVER: Chief Information Officer

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security Office will evaluate the report and provide a full investigation.

Complete Report Form