Ensuring network performance
You must not attempt to intercept, capture, alter, or interfere in any way with information on local, campus or global network pathways. This also means you may not run "sniffers" (programs used illegitimately to capture information being transmitted) on the campus network or any portion thereof. You may not operate Dynamic Host Configuration Protocol (DHCP) or Bootstrap Protocol (BootP) servers on the campus networks without authorization. Such a server may be connected to a private network within the Princeton.EDU domain, but only if the reply packets sent by the server are confined to the private network and do not enter the campus network at any time.
You must not attempt to obtain system privileges to which you are not entitled, whether on Princeton University computers or on systems outside the University. Attempts to do so will be considered serious transgressions.
Computer procedures, programs and scripts that permit unauthenticated or unauthorized senders to send e-mail to arbitrary recipients from unrestricted sources are prohibited.
You must refrain from any action that interferes with the supervisory or accounting functions of the systems or that is likely to have such effects. You must refrain from creating and/or implementing code intended to periodically or aperiodically interrupt or interfere with computer systems or services. You must refrain from knowing propagation of computer viruses or presumed computer viruses. You must not conduct unauthorized port scans. You must not initiate nuisance or denial-of-service attacks, nor respond to these in kind.
Individual members of the campus community who elect to install wireless access points must assure that their operation will not disrupt University wireless network service. If the access point is installed and configured as a "bridge,” the people responsible for the systems using that device for network access will remain responsible for activity from their respective devices. If the wireless access point is configured as a "NAT" (Network Address Translator), the person responsible for the NAT will also be held accountable for all activity by those using the NAT.
Wireless access points may not be installed by individuals in campus academic, administrative, or service buildings, including buildings rented or owned by the University off-campus, without authorization from the department responsible for the area involved. If authorization is provided, the individual must comply with any rules regarding the wireless access point established by the department.
Wireless access service is provided by the University in campus dormitories and some University-owned off-campus apartments. Some commonly used appliances, for example certain cordless telephones and most microwave ovens, operate at a frequency that could interfere with wireless network service. Personal wireless access points also can cause such interference. If a device interferes significantly with the University’s residential wireless network service, the owner may be required to relinquish use of the device in the residence. Malicious use of any such device to disrupt network service will be considered a serious violation of University regulations.
Computers, smart phones, and other network devices connected to the University's network must be registered for network use. Each will be assigned an Internet Protocol (IP) address or, if mobile, "leased" an address by the University's network management servers. Using other than the assigned IP address can disrupt normal network operation for others, so users and owners of such devices are expected to refrain from supplying some other IP address for use in any network transaction.