Dual Homed Network Policy
The purpose of this policy is to minimize potential exposure to the University from unauthorized access to the University’s IT Resources with multiple network interfaces.
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
The use of multiple network interfaces into a single computer to facilitate “dual-homed” or “multi-homed” connectivity creates a bypass of network security and is prohibited.
Dual Homing is defined as having concurrent connectivity to more than one network from a computer or network device.
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
|Responsible Person:||Director, IT Risk and Data Integrity|
|Approval Date:||May 16, 2017|
|1.1||05/23/2018||Updated disclaimer, scope, and definitions|
|1.2||06/09/2020||Updated purpose statement.|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to UISO written policies may be met with University sanctions.