Skip to main content

Campus Network Standard


The Campus Network standard is designed to ensure the security, stability, and efficient operations and management of the campus network of West Virginia University.  The core campus network is managed centrally by the Office of Information Technology’s Telecommunications and Network Operations unit.  The network includes both wired and wireless components, devices, or networks that are connected to the core campus network.  Any component that is connected to the campus network is subject to this standard, regardless of their ownership.

This standard is designed to minimize the potential exposure to West Virginia University and its community from damages, cyber-attacks, and unauthorized access.

This standard applies to all students, employees, and guests that utilize the WVU campus network.

Effective Date

August 10, 2011.


1.1. The Office of Information Technology (ITS) is responsible for designing, managing and securing the WVU campus network, including network address and access control management.

1.2. Devices may be connected to the campus network at approved connectivity points. Approved on campus connectivity points include,

  • Wall jacks
  • ITS approved wireless access points
  • ITS approved Virtual Private Network (VPN)
  • ITS approved remote access mechanisms such as Digital Subscriber Line (DSL), cable modems, and traditional modems over phone lines

1.3. Modifications or extensions to the campus network are prohibited. These include, but are not limited to, the use of Wireless Access Points (WAPs), hubs, and small office/home office (SOHO) routers/switches.

1.4. Users must authenticate when connecting to the campus network.

1.5. Network infrastructure equipment must be registered with ITS prior to implementation and be located in ITS approved locations (communications closets).  These locations must be secured by an electronic lock system or an ITS approved alternative. All communications closets must have an electronic lock installed and have a process in place to review logs on a monthly basis.

1.6. All network traffic on the campus network is monitored.  Security scans will be conducted periodically on the campus network.  By connecting a computer or device to the network, employees, students, and guests are acknowledging that the network traffic to and from your computer or device may be scanned, as set forth in the Acceptable Use of Data and Technology Standard.

1.7. West Virginia University, reserves the right to prioritize, restrict or block certain types of network traffic. The network is monitored continuously for suspicious activity such as but not limited to:

  • causing an exceptional load on a campus service
  • exhibiting a pattern of network traffic that disrupts university services
  • exhibiting a pattern of network traffic indicative of a compromised host or scanning or attacking others
  • activity that does not comply with other IT standards or policies.

1.8. Internet providers must be approved via the Office of Information Technology


Violation of or non-compliance with this standard will be addressed in accordance with established WVU disciplinary policies and procedures, as issued and enforced by the appropriate authorities. Failure to comply with this or other related standards may result in disciplinary action up to and including termination of one’s employment or studies.


Exceptions to IT Standards will be considered using the IT Standard Exception Procedure.

Revision History

August 10, 2011 – Standard approved by the IT Oversight Committee


Policy Questions

Questions, concerns or additional information about this and any ITS policy should be directed to the CIO office at

Service Desk Hours and Contact

Service Desk Hours

Sunday: 10 a.m. - 10 p.m.   
Monday through Thursday: 7:30 a.m. - 10 p.m.
Friday: 10 a.m. - 8 p.m.
Saturday: 10 a.m. - 5 p.m.
Closed on most WVU Holidays

Contact Us

Information Technology Services
One Waterfront Place
Morgantown, WV 26506

(304) 293-4444 | 1 (877) 327-9260

Get Help

Maintenance Schedule

To function effectively and securely, applications and the systems that support them must undergo regularly planned maintenance and updates.      

See Schedule