Policy Manual

Background

Information accessible through the Internet is available worldwide. Unfortunately, the incidence of hacking attempts continues to grow. Although the greatest threat is from locations off campus, inappropriate access to servers is possible from any computer on campus as well. The result of unauthorized access to a server can result in major financial penalties, legal action, business disruption and damage to the university's image. This overview is supplemental to and does not supersede the official GCSU Policies for Connecting Devices to the University Network. In order to protect the GCSU network from unwanted intrusions, the University utilizes a firewall on the connection to the external Internet. The firewall is used to manage all outbound traffic from the GCSU network to hosts on the Internet. Incoming connections to machines on the GCSU network will be blocked unless registered with the University's Division of Information Technology (IT)