Introduction

The Acceptable Use Policy (AUP) governs use of the WPI network, accounts, and technology. The AUP helps to ensure technology resources and usage are accessible, equitable, and safe for the entire campus. The examples below are provided to further explain some areas of the policy, but is not a replacement for the AUP. The full policy is agreed upon at login, and should be read by each individual who is granted access at WPI.

The difference between joining a personal network and an enterprise network is similar to the differences between driving a vehicle on a back road versus a major interstate. Devices on the WPI enterprise network are on the information superhighway! Along with the increased speed and accessibility comes the potential for increased exposure.  To this end, WPI retains the right to audit activity, review violations, and deny network access in response to any activity that is not in compliance with the WPI policy.

  • AUP Examples

    1. Systems Usage: All WPI Systems or Services are used for academic and campus business purposes. Users will not subvert a system or service for illegal or inappropriate use. Users must not grant access to WPI resources to users outside the WPI community without express permissions of the university. Examples of prohibited behavior:
      • Allowing Unauthorized connections to devices on the WPI network.
      • Tor
      • Torrenting
      • TeamViewer
      • LogMeIn Hamachi
    2. Ethics and Legality: All WPI technology resources are to be used for ethical and legal activities that comply with federal, state, and local laws. Respect resources, property, and privacy. Examples of prohibited behavior:
      • Illegally downloading copyrighted material.
      • Allowing devices to become infected with viruses and malware.
      • Allowing devices to be connected without changing default passwords.
      • Any type of hacking, network scanning, web exploits, or scraping.
    3. No Personal Gain: The WPI network and connected devices may not be used for commercial use or personal gain. Users may not resell WPI computing or networking resources. Examples of prohibited behavior:
      • Mining of cryptocurrency.
      • Any type of hosting or advertising for profit.
      • Generating personal profit through use of WPI resources.
    4. Email Lists and Aliases: Creation of email lists and aliases is provided as a privilege to the WPI community. The creation of lists and aliases must adhere to the Institute's mission of research, education, and community. WPI group names may be properly used for official groups approved by WPI. Lists and aliases are closely monitored and the creator is fully responsible for any misuse or misrepresentation of the lists or aliases that they create. Also, please consider email etiquette such as using BCC and not replying to all when using WPI groups and distribution lists (see Related Articles). Examples of prohibited behavior:
      • Typosquatting: Using names of other people, groups, or services that you are not authorized to represent.
      • Profanity: Use of profane language for list and alias names is strictly prohibited.
      • Not WPI related: Lists and aliases not approved by WPI for authorized business purposes.
      • Personal Lists: Lists and aliases created for personal use.
  • Standards

    The WPI AUP and standards (linked in Actions) are in effect at all times. Users are responsible for familiarizing themselves with the standards and complying with them.

  • Reporting, Questions, and Assistance

    Additional details about Blocked Services are available in the Related Article. Information Technology encourages you to contact the WPI Service Desk if you need more information about the AUP.

All WPI systems or services are used for academic and campus business purposes. Users will not subvert a system or service for illegal or inappropriate use. Users must not grant access to WPI resources to users outside the WPI community without express permission of the university. Examples of prohibited behavior:

he WPI network and connected devices may not be used for commercial use or personal gain. Users may not resell WPI computing or networking resources. Examples of prohibited behavior: