Take responsibility for your device's activity
In order to connect your computer, smartphone, tablet, gaming console, or other device to the Internet while on campus, you need to first register that device for University network access.
When you register a device on the University network, you are agreeing to take responsibility for that device—no matter what it is, who it belongs to, or who is using it. This includes being responsible for how that device is used on the network at any given time, even when you're not around. If a device registered to your account is misusing the network, you will be held accountable.
For example, you would be held accountable for each of the following violations:
- You register your friend's or family member's laptop so that they can connect to the University network. Their device is infected with malware and threatens the network.
- A peer-to-peer (P2P) file sharing program on your computer begins illegally sharing copyrighted materials with or without your knowledge.
When you register a device for a University network connection, you take responsibility for it. You are held accountable for that device regardless of what it does or who uses or owns it. If a device registered to your UDelNet account is used to violate laws or policies, it may be disconnected from the network and you may face additional consequences for any violations.
Tips for taking responsibility
- Your name is on it. When you register a device for network access, you take responsibility for how it uses the network. You will be accountable for any violations committed using that device, regardless of whether you're the one using it at the time.
- Be in control. Manage the devices you register and how they're used. Don't allow them to be used to violate policies or laws.
- Be willing to say no. Don't let others abuse IT resources or pressure you into doing so.
Your responsibilities as a student
As a student at the University, you're responsible for protecting yourself, your information, and your devices as well as the University's IT resources as you use them.
- Use IT resources appropriately
- Take responsibility for your device's activity
- Protect and clean your computer
- Use strong and unique passwords
- Protect yourself from phishing and other fraud
- Understand copyright laws and file sharing
- Protect your online reputation
- Understand the consequences for violating the rules