Institute Policy does not allow any student, faculty, or staff to connect unauthorized access points (devices such as Netgear, Cisco, Linksys wireless routers) to the campus network without prior authorization. In the case of wireless routers, any wireless radios must be disabled. Hiding the SSID or disabling SSID broadcast does not disable the radio, and as such still causes interference.
Do not use wireless hotspots within campus buildings. Wireless hotspots (from AT&T, T-Mobile, Verizon, etc.) should not be operated in any campus building. These hotspots act as access points and cause interference with the campus wireless access points. This will prevent others in your area from receiving an adequate signal due to channel interference.
Should you need assistance in disabling a broadcasting signal, please submit a help request and we will be happy to assist.
CNUSP Policy Highlights
The full Computer and Network Usage and Security Policy can be found here.
Responsible Use of IT Resources
[Housing] and EastNet residents may use their assigned wired-network port connections for recreational purposes to the extent that such use does not violate other provisions of this policy or adversely affect network service performance for other users engaged in academic activities.
Limitations on Use of IT Resources
In general, Georgia Tech IT resources should not be used to transmit commercial or personal advertisements, solicitations, or promotions. Some mail lists or web sites have been set up for use of the Georgia Tech community to sell items and may be used for this purpose.
The following technologies cannot be implemented at Georgia Tech without prior written approval by OIT or a Unit’s IT lead: routers, switches, hubs, wireless access points, voice over IP (VOIP) infrastructure devices, intrusion detection systems (IDS), intrusion protection systems (IPS), and other networking technologies that may not be included here. The procedure for requesting implementation of new (wired or wireless) networking service to an area, or the expansion in coverage, is described in Section 2.2.4 of the Computer and Network Security Procedures.
The Institute may specifically monitor the activity and accounts of individual users of the Institute’s computing resources, including individual login sessions and communications, without notice. This monitoring includes all network-based traffic, wireless traffic, and GT systems’ use (e.g. e-mail, voice over IP communications (VoIP), content on computers owned by GT, sponsors, and contracted entities).