You are on page 1of 2

What is an IT INFRASTRUCTURE?

An IT infrastructure is made up of the usual hardware and software components:


facilities, data centers, servers, networking hardware desktop computers and
enterprise application software solutions.

Rules for IT infra-


NETWORK: User will be held responsible for all the network traffic generated by
the computer. He should understand that the network capacity is a shared
resource. She/he should agree that physically tampering of network resources is
strictly prohibited. Damage if any and in any form to IT-infrastructure at HIT,
Nidasoshi shall be recovered by the concern users.

ACADEMIC USE: User should understand that the IT-Infrastructure at HIT,


Nidasoshi is only for academic use and should not be used for any commercial
purpose or to host data services for other people or groups.

IDENTITY: User should not attempt to deceive others about his identity in
electronic communication or network traffic to threaten intimidate or to harass
others.

MONITORING: User should understand that the IT resources provided to them


are subject to monitoring with cause as determined through consultation with the
HIT Nidasoshi administration, when applicable.

VIRUSES: User should maintain his/her computer on this network with current
virus detection software and current updates of the operating system and should
attempt to keep his/her computer free from viruses,worms,trojans and other
similar programs.

SECURITY: User should understand that he/she will not take any step that
endanger the security of the HIT, Nidasoshi network, specifically should not
attempt to bypass firewalls and access rules in place. Any wireless network on
campus, which poses a security threat, may be disconnected from the campus
backbone network.
PENALTIES: User should understand that any use of IT-infrastructure at HIT,
Nidasoshi that constitutes a violation of HIT Nidasoshi regulations could result in
administrative or disciplinary procedures.

INTERFERENCE: No campus user may establish or operate an 802.11-type device


that interferes with HIT-Wi-Fi devices. That is, you're not allowed to fire up your
own wireless access point if its signals overlap with the signals from ours (For ex:
by using Connectify Me). If found, such device will be deactivated for minimum of
3 months.

NO BRIDGING: Under no circumstances may anyone connect to the Wi-Fi


network a device that is configured to bridge network traffic (For ex: by using
Connectify Me). Similarly, users are forbidden from using the Wi-Fi network while
attached to any other network.

JUST COMPUTERS: The only devices permitted on the Wi-Fi network without prior
express written permission are computers (laptops). Video game units, wireless
routers, access points and all other devices are strictly prohibited.

NO PASSWORD SHARING: Users must not reveal their login information


(Username and password) to anyone for any reason. If you need your own login
(if you have forgotten), contact the Wi-Fi Co-coordinator.

VIOLATIONS: Violation of any of the rules mentioned above may lead the user
device to be removed from the network completely or deactivated at least for 3
months or may undergo any other type of punishment.

What is vendor certificate?


Vendor certification is a supplier-customer partnership, and can only be
successful with the full involvement and agreement of both partners.

You might also like