Network Take Down Policy

The school’s Information Security Manager is authorized by the University to run vulnerability scans in order to identify security and privacy risks and to protect computing and networking resources. The information security team monitor network activity for signs of attacks and take action in the absence of action by the operators of a compromised computer.

In cases of emergency, the information security team may act to block some or all network traffic to or from a computer that information security have reason to think may be specifically vulnerable to attack, under attack or has been compromised or disconnect the computer from the network as approved by school or University senior management.