Effective date of the policy:

4 October 2004

Last updated:

25 January 2013

Policy owner:

ICTS

Policy approved by:

ITMT

Table of contents

Background

A number of Student Residences are networked providing students living in residence access to information resources, including computer networks and computer equipment.  Appropriate use of these computing resources should always be legal and ethical, reflect academic honesty, uphold community standards, and prevent the over consumption of shared resources such as network bandwidth. Appropriate use should demonstrate respect for intellectual property, ownership of data, system security mechanisms, and individual’s right to privacy and to freedom from intimidation and harassment.

ICTS and the residences reached agreement on the need for a Policy for Access to the UCT network from Residence computers during May 2003.  Given the need for network security and appropriate management of UCT's Internet bandwidth, ICTS implemented a more rigorous firewalling policy for residences.

In order to pursue their academic work, residence students need access to the following services:

  • Services on the UCT network (Vula, lynda.com and departmental web servers)
  • Mail
  • The web
  • FTP

Purpose

This policy allows access to the above services, while restricting access to other services that are not widely required for academic purposes.


Definitions


UCT network

For the purposes of this document, the UCT network is defined as:

The data network that extends across UCT-owned or -leased premises excluding the Graduate School of Business. The network connects various classes of devices to each other and to third-party networks such as the Internet.

The UCT network consists of data cables and network infrastructure devices.

Broadly, from the average end-user's perspective, this includes the network up to the plug in the wall.

ResNet

Residents in UCT accommodation managed by Student Housing and Residence Life are connected to ResNet.

Firewall

A security system that controls and restricts both Internet Protocol connectivity and Internet services. Firewalls establish a perimeter where access controls are enforced. Connectivity, as the word is used here, defines which computer systems can exchange information. A service, as the word is used here, is sometimes called an application, and refers to a way for information to flow through a firewall. Examples of services include FTP (file transfer protocol) and HTTP (web browsing).

Perimeter Firewall

The firewall that separates the UCT network from the Internet.

Applicable to

All students who connect to UCT's network from a student residences.


Exclusions

All students and staff that do not connect to UCT's network from a student residence.


Policy summary

This policy outlines the traffic limitations, firewall rules and traffic limit exceptions for students who connect to UCT's network from a student residence.


Policy details

All student residences will connect to the University network from behind routers that will also act as firewalls. These firewalls will be used to manage traffic to and from student residence networks. The following rule sets have been implemented on the firewalls between the UCT network and student residences:

NOTE: Apart from the Policy on Network Access from Residence Computers, described here, students must also adhere to the following UCT policies:

Students must also adhere to all relevant SA laws, regulations, and contractual obligations. The use of UCT's technology resources is a privilege which may be revoked if users fail to comply with these policies.

Policy violations

Students that make use of UCT's network from student residences need to adhere to the above policy and to all relevant SA laws, regulations, and contractual obligations. The use of UCT's technology resources is a privilege which may be revoked if users fail to comply with this policy.