If a person’s computer is using network bandwidth to the extent that
other people’s use of network resources is detrimentally affected, IT Services will take action
to restrict that person’s computer usage and restore service to other network users, as follows:
• On the person’s first incident of excessive usage, network access will be temporarily suspended.
Depending on the severity and the cause of the excessive usage, the person may be invited to discuss
the incident with the IT Services director before access is restored. The discussion will enable IT
Services to explain why P2P traffic degrades our network performance, how “botnets” or other malware
can affect the performance of the person’s computer, and what steps people can take to minimize the
likelihood of a recurrence. If the incident is due to a virus or other malware, we will clean the
computer to the best of our abilities at no cost to the student or employee. Severe infections may
require professional assistance before the computer can be allowed back onto our network.
• On the second incident of excessive usage, the person’s computer will be placed in a network access
control list. Only specific types of network traffic (including but not limited to web, email, instant
messaging, and gaming) will be allowed to and from the device. This is intended to curb the excessive
traffic in P2P activities and/or to shut down malicious software activities. Since it is possible that
legitimate activities could be curbed by the network access control list, people using computers on the
list are invited to contact IT Services if they experience problems with legitimate network activity.
• Subsequent incidents could result in the suspension of network access for the remainder of the academic
term, or other disciplinary action as described in the Acceptable Usage Agreement.
Most computers found to use network resources excessively (to the point of
affecting other users’ ability to work) fall into one of several possible categories:
• The computer user is actively engaging in unmanaged P2P activities, either knowingly or unknowingly.
• The computer is infected with malware (viruses, spyware, Trojans, botnets, or other malicious software).
Most legitimate academic uses of network resources will not hinder other users’ ability to work effectively.
This includes electronic transfers of large data files via FTP or HTTP, such as a software download or a
research data set. Should you encounter problems with these or other examples, please contact IT Services
so that we may adjust our network traffic shaping rules accordingly