Many of us have some form of "Guest Wireless
Access", I am interested in what others are doing
in terms of restricting that access.
Require any kind of registration or
Restrict the bandwidth, or access to ports and
functionality in any way?
Do you allow P2P from the guest range?
Here at NEU we do not allow access to our
preferred resources or core systems (data centers
ect) from the guest range, but otherwise people
have most functionality. What we have been seeing
over the past year is an up-trend of people using
the guest range to download copyright material.
Our automated system will respond to complaints
from outside entities and notify students they are
in violation of our policies, but we do not have
that ability with the guest network.
Mark T. Nardone, CISSP, MIS
Director of Information Technology Security
Boston , MA 02115
Northeastern University's Appropriate Use Policy
"Security as a shared responsibility"
**Northeastern University will never request
details of your password or account by email at
New Mass requirements for protecting Personal
Identity Information (Pii) became Law on March 1st
2010. Please take a moment to review our on-line
training material at Blackboard.neu.edu
Information Security Awareness.
This message may contain confidential or sensitive
information and is for the use of the intended
recipient only. If it appears you are not the
intended recipient, or if you feel you have
received this message in error, we ask your
cooperation and that you refrain from
disseminating, distributing or copying this
e-mail. We request that you delete this email from
your device and notify the sender.