Point University reserves the right to monitor network usage and to limit or block Internet access for any user who violates the Internet Usage Policy or who uses excessive amounts of bandwidth. Our Internet connection is shared by all members of the campus community, and as such, users are expected to be considerate of others in using this limited resource.
Excessive bandwidth usage typically occurs when uploading or downloading large files. Also, computers infected with spyware and viruses can increase a user’s network traffic without his or her knowledge. Please take appropriate precautions and run virus and spyware scans on your computer regularly.
All network traffic that goes to or comes from off-campus systems which are not connected via remote access services is considered to be Internet traffic. This includes Internet 2 connected sites. The primary purpose for UMR's Internet connectivity is to aid with the campus' research and educational mission.
Point IT is responsible for ensuring that this delicate resource is available to support the campus mission. Because of this, traffic related to educational endeavors, sponsored research, and campus administrative needs is classified as priority traffic. All other traffic will be considered as non-priority traffic and is not guaranteed. A best effort will be made to allow non-priority traffic to transit the campus connection to the Internet. However, Point IT reserves the right to further prioritize or filter this traffic as necessary to maintain the stability and availability of the Internet connection for priority traffic.
All Internet use is subject to federal and state laws, as well as Point system policy and the Point Acceptable Computer and Network Use Policy. Personal use of the Internet is allowed, provided it does not put an excessive load on the network. Internet access may be restricted or revoked to individuals using excessive Internet bandwidth or violating any law or Point policy.
Actions which could affect the user:
Misuse of University computing facilities will be dealt with on a case-by-case basis. The users subject to charges of misuse will be dealt with in a manner consistent with the laws of the state of Georgia and the policies of Point University. The technology coordinator is responsible for making these misuses known to the appropriate Point administrators. The technology coordinator may impose temporary restrictions on the offender's computer access in order to ensure that the Point network remains stable and secure for all the Point users.
If you have questions or concerns about information technology at Point, please contact the helpdesk.