- Academic Affairs
- Accountability and Compliance
- Administration and Finance
- Center for Health and Homeland Security
- Center for Information Technology Services
- Communications and Public Affairs
- Community Engagement
- Government Affairs
- Human Resource Services
- Office of Philanthropy
- Operations and Planning
- Police and Public Safety
- President's Office
- Research and Development
- University Counsel
Information Technology Policies
UMB IT Campus Network Policy
Information Technology | Approved September 11, 2017
Applies to Faculty, Staff, Students
Technical revisions updated September 11, 2017.
The purpose of this policy is to establish a framework for ensuring that UMB's information technology resources are managed in a secure fashion.
The scope of this policy includes all faculty, staff and students who have or are responsible for an account (or any form of access that supports or requires a password) on any system connected to the campus network, has access to the campus network, or stores any non-public UMB information.
General network practices are defined to protect the integrity of organizational networks. These practices must be followed to assure adequate protection of system security, as well as appropriate user access.
- No network capable games or non-business related software is allowed on any UMB owned workstation or server. Use of illegally obtained software is strictly prohibited.
- Only UMB authorized personnel will configure and connect devices to the campus network infrastructure. These devices include, but are not limited to, bridges, firewalls, intrusion detection devices, network monitoring tools, VPN devices, routers and hubs and wireless access points.
- External connections to any critical system must be established through an approved VPN connection provided by CITS or another school or department.
- Any requests for waivers to these Standards must be approved by the campus Campus IT Security Officer.
- No network equipment will be installed or located outside of designated wiring closet or equipment room accessible only to authorized personnel. These devices include, but are not limited to bridges, firewalls, intrusion detection devices, network monitoring tools, VPN devices, routers, switches, etc.
- The use of all security devices or security software monitoring tools must be with the approval of the UMB Information Security Officer.
- No data or files shall be shared illegally on the campus networks.
- UMB CITS Communications must approve installation of any wireless network equipment on the campus wireless network.
Network Violations and Enforcement Procedures
Violations of Network Standards are subject to disciplinary action. Violations include, but are not limited to:
- Knowingly breaking into ("hacking") a network device or workstation/server.
- Malicious or intentional destruction of network infrastructure.
- Broadcasting over the entire Class B network.
- Knowingly stealing or forging (“spoofing”) another user's connection or TCP/IP addresses.
- Installation and operation of non-approved infrastructure equipment or software.
- Sharing of the username and password for network devices.
- Use of peer-to-peer software illegally to transfer or share material.
Disciplinary action for people found to be in violation of these Standards will be in accordance with the Human Resources policies of the person’s employer or, in the case of students, discipline policies of the appropriate UMB School. In addition, a UMB Communications may take any action it deems appropriate, including disabling an account or user connection, in order to protect the integrity of the campus network. These actions must be taken promptly and may remain in effect pending further review and investigation of an incident.