Campuswide networking policies are developed by Computing and Network Services with the consultation of the Assistant Vice President of University Technology, and other constituencies as necessary. Policies are derived to provide for security, usabilty, and accountability.
- Network Guidelines and Policies
- Network User Agreement
- Non-Standard Systems on the Drew Network
- Software Distribution and Support Policies
Network Guidelines and Policies
Drew’s network services are primarily made available for academic and work-related use for faculty, staff, and students. The following policies and guidelines for these systems apply as a supplement to the standard computer and network usage guidelines:
- Any software installation to be installed on the network for use by multiple users must be submitted through documented standard procedures and in accordance with all relevant licensing restrictions. Software will be metered to restrict access according to the license agreements, and when possible software will be installed in public areas of the server to provide the widest possible access to these materials.
- Personal materials should be kept on your personal network (F drive), your hard drive, or on backup media such as CD-R or CD-RW drives. Please refer to Data Storage Best Practices for more information.
Although system backups are performed, it is still the responsibility of the user to keep their own backup copies in case of emergency. System backups are for the purpose of rebuilding the system in case of system failure. In some cases, using NetWare salvage will enable a user to retrieve deleted files.
Other servers may not be established or maintained on the campus network without prior consultation with Computing and Network Services. This is so we can be certain that network service and security are maintained, and to maximize the benefit of such services to the University. Computing and Network Services reserves the right to not allow servers on the network if the functionality can be achieved with existing resources, or by new CNS resources that can serve the community at large. Computing and Network Services may need administrative access to such servers as well.
Network User Agreement (formerly Campus LAN Agreement)
Use of University computing systems is governed by the following policy:
Computing resources are provided for the use of faculty, students and staff for academic or administrative purposes. The privilege of use is not transferable to another member of the Drew community, to an outside individual, or to an outside organization. Misuse of computer facilities is considered a serious judicial offense at Drew and carries sanctions for anyone found in violation of the university’s policy.
As a member of the Drew community, there are rules and policies by which you must abide to keep the network secure and available for all to use, and to maintain an atmosphere where all are welcome. Your use of Drew’s networking services connects you to the entire Drew community and to the world via the Internet, and therefore reflects on you and on the institution.
Please take these responsibilities seriously and read this agreement carefully.
- The Drew network is to be used primarily for purposes of fulfilling the university’s mission. It is intended to be used as a tool to enhance education education and research and to facilitate administrative work and is not available for unrestricted use for other purposes. Use of the Drew network for other purposes will always be restricted in favor of academic or administrative usage when the situation dictates.
- The university provides the Drew network exclusively to you as a member of the Drew community. Your network identity and uLogin account uniquely identify you, and are not transferable to other members of the Drew community or to people outside of Drew.
- Protect your uLogin password or other credentials at all times and do not share them with others. You will be held responsible for all activities which occur with your uLogin account.
- The Drew network is a shared resource. Therefore, network use or applications which inhibit or interfere with the use of the network by others are not permitted. At times, network administrators may ask you to restrict your use of the network or not to use the network because of a temporary condition. You must comply with those requests. Applications which use an unusually high proportion of network bandwidth for extended periods of time, including, but not limited to, running servers or network games, are not permitted and may be shut down, with the user contacted as soon as possible.
- Hardware or software that interferes with network operation will be removed or disabled.
- Users of the Drew network must comply with federal, state, and local laws and ordinances including U.S. copyright law.
- Users of the Drew network can expect that their data is confidential and secure. Network administrators will access data on the system, either stored or in transit, only to maintain network operation or security, and will adhere to the SAGE Code of Ethics when doing so. Contents of personal files may be accessed by programs designed to do heuristic searches for materials that could interfere with network operation or security. Files may be individually searched for investigative purposes only when ordered by a court of competent jurisdiction, or when there is an alleged violation of University regulations and the search is authorized by a dean, vice president, president, or their designated representatives. Search and notification procedures in accordance with University policies will be followed.
- Drew network services and wiring may not be modified, tampered with or extended. This applies to all network wiring, network jacks and hardware. If you cause damage by modifying or tampering with network wiring, jacks or hardware, you will be held financially responsible for such damage and may be subject to disciplinary procedures.
- Malicious use of the network is strictly forbidden by university computer usage policies. This includes but is not limited to: sending harassing or threatening messages; attempting to forge messages, crack passwords, intercept data or circumvent server security; sending bulk unsolicited email; or sending data intended to disrupt services.
- Support of the Drew network is provided through university staff, student employees and outside vendors. Drew’s goal is to provide 24 hour service to all users. In the event of critical system failures (loss of an entire building, critical server, or large amount of network infrastructure) we strive for a 2 hour response time, with an 8 hour resolution. We will strive to resolve non-critical issues within 2 business days.
Non-Standard Systems on the Drew Network
Network users may connect personally owned computers or other non-standard PC configurations (non-standard means a machine other than the one issued to a faculty member, staff member, or student by Drew, or a Drew-issued machine in a configuration different than distributed by CNS) to the network with the understanding that the University will not make changes to network hardware or software explicitly to accommodate them. CNS budgets will not be used to purchase or maintain these computers or their client software. Users assume full responsibility for any damage to network devices by or through their computers and for any damages to their computers by or through the network. Should the computer or its configuration impede network performance, jeopardize network security, or violate computer usage policies, CNS may remove it from the network until these issues are resolved.
When using these computers on the network, the following procedures must be followed:
- TCP/IP addresses must be acquired via DHCP and be hardware compatible with Ethernet networking.
- Access to Causeway volumes must be through the Novell Client or available native access methods.
- Computers should not provide server functions, or replace existing services provided by Computing and Network Services, without prior consultation.
- Individuals or departments are responsible for all software and hardware costs and maintenance for nonstandard systems.
Additional Network Jacks for Non-Standard Systems
Users of personally owned computers should attempt to connect to existing network jacks. Network switches may be installed to provide additional connections in a given space, but such installations are not supported by Computing and Network Services unless configured and installed by CNS or Telecommunications. Use of switches or hubs may degrade network performance for devices connected to them, and is the user’s responsibility.
Software Distribution and Support Policies
- Requests for software, databases, and related materials to be distributed through Computing and Network Services require appropriate licensing and/or proof of authorization to distribute.
- Packages that impact the stability of user or lab PCs, or network stability, will be refused distribution.
- User support for course-specific software is the responsibility of the software’s sponsor.
- We will not distribute or assist in the purchase of any product that replaces a Drew standard package.
- Software will only become “standard” upon review by technology directors along with relevant users or committees. Once accepted, support (help desk, training, licensing) will be provided by Computing and Network Services as is relevant.
- Support for older versions of software will continue as long as the majority of CNS Helpdesk staff can support it. This period is approximately 4-5 years for major applications, such as word processors, and less for licensed applications in cases where new releases or their logical replacements are freely available and supported.
- Updates to licensed software will be made available to appropriate parties via the Novell Application Launcher, software.drew.edu, or the CNS Helpdesk after they have been tested and verified by Computing and Network Services.

