Network Take Down Policy

Network managers are authorized by the University to run vulnerability scans in order to identify security risks and to protect computing and networking resources. Network operators should monitor network activity for signs of attack and take action in the absence of action by the operators of a compromised computer

In cases of emergency, network operators may act to block some or all network traffic to or from a computer that the operators have reason to think may be specifically vulnerable to attack, under attack or has been compromised or disconnect the computer from the network as approved by school or University senior management.