Policies

MIT maintains certain policies with regard to the use and security of its computer systems, networks, and information resources. All users of these facilities, including technology developers, end users, and resource administrators, are expected to be familiar with these policies and the consequences of violation.

IS&T policies are implemented throughout IS&T, but the end product is owned and approved by the VP of IS&T and their staff. IS&T policies are guided by the principles articulated in MIT Policy generally, but specifically in MIT Policy 13.2 which states in part:

"Information technology policies ensure that everyone's use of the Institute's computing and telecommunications resources supports its educational, research, and administrative mission in the best possible way."

 

Residential Computing policies

In addition to the MITnet Rules of Use, there are a few specific policies with regards to computing in the dormitories and FSILGs at MIT:

No personal hubs/switches or back-end networks allowed on MITnet
A hub is designed as anything that converts one UTP connector to many UTP connectors. A switch counts as a hub for MITnet purposes. Routers (Cable/DSL routers, "broadband routers", or anything else that does routing or NAT) are prohibited from MITnet as they interfere with the operation of the network, in addition to the potential for security issues.

Further, wireless coverage is provided in all MIT dormitories and FSILGs, which eliminates much of the need for your own wireless network. If you are having a problem with that coverage, or it does not meet your needs, please submit a help request

No traffic "sniffing"
Don't try to intercept or otherwise monitor any network communications not explicitly intended for you. These include logins, email, and any other network traffic not explicitly intended for you.

For a complete list of IT policies, see http://ist.mit.edu/about/it-policies