UC San Diego SearchMenu

ResNet Acceptable Use Policy for Guests

Introduction and Coverage of Service


Through a joint effort between Housing, Dining, and Hospitality (HDH), Administrative Computing and Telecommunications (ACT), and Academic Computing and Media Services (ACMS), high-speed data service is provided in on-campus residences via the Residential Networking system (ResNet). Your agreement to the following points in this Acceptable Use Policy is required to use the ResNet network.

Note for Guests!

As guests on ResNet, you will be held to a more restricted Acceptable Use Policy. Areas of significant difference will be highlighted in this manner.


Access to the ResNet network is provided in residential housing located in the six undergraduate colleges, The Village at Torrey Pines transfer student housing, and the graduate student housing located in Warren College and Coast Apartments.

Each student is given, except where noted:

  1. Wireless access in the common areas.


    Wireless access is NOT guaranteed in the bedrooms. There may be some bleedover from the access points in the common room, but this is NOT guaranteed.
    Wireless broadcast is NOT provided in the Coast Apartments. If students living in the Coast Apartments wish to get wireless, you may register a router with ResNet. Please contact ResNet for further details.
  2. One (1) Ethernet port located in the student bedrooms


    If there are more students than active ports in the room (e.g.: three students live in one room with only two active ports), you may rent out a network switch from ResNet at no additional cost. Please contact ResNet for further details.


The primary purpose of ResNet is to provide access to UCSD's electronic resources and educational / research related material on the Internet.

Personal use is expected and encouraged on the ResNet network, as long as it does not interfere with another user's ability to connect to the ResNet network or violate any portion of the Acceptable Use Policy. Please note that personal use is NOT the primary objective of the ResNet network.


As an Internet Service Provider (ISP), ResNet is committed to enforcing its policies. The Acceptable Use Policy draws heavily from the policies mentioned in Section VIII, "Other Relevant Policies," and a violation of these mentioned policies while on the ResNet network will also be considered a violation of the Acceptable Use Policy.


General violations of this Acceptable Use Policy, if not addressed under the appropriate section, will be handled individually, based on the nature of the violation and if this is a case of recidivism. In the case of guest user violations, your connection will likely be permanently blocked without any possibility of having your connection restored on the first violation. Most general violations will be handled in this way, but ResNet makes no guarantee as to if your particular violation will be treated in the same manner.

ResNet Registration and Authentication

Registration Requirements

You must register your network devices each year you live in one of the areas mentioned above, under "Locations". You are required to provide accurate registration information in the event that ResNet needs to contact you with critical information regarding your network connection.

ResNet Policy Key

To assist in enforcing the Acceptable Use Policy, a ResNet Policy Key (Policy Key) is required to access the ResNet network. Both Microsoft Windows (Windows) and Apple Macintosh (Mac) machines must install and run the Policy Key to successfully connect to the ResNet network. Failure to install or removal of the Policy Key will automatically result in your computer being unable to connect to the ResNet network.


Guests to the ResNet network will be required to create an account on the ResNet guest system before gaining access. You will use the credentials generated by the system for every device you want to connect to the ResNet network.

User Responsibilities

Extent of Liability

You will be held responsible for any and all network traffic generated by any network device registered and / or authenticated with your username. It is your responsibility to seek advice from ResNet about any situation that you feel may violate any policies.


You will be held accountable for violations of policies mentioned here, regardless of whether you:

  1. Generated the traffic
  2. Were aware of the traffic
  3. Are aware of the policy violation

Prohibited Activities

Limitations of Activity

The performance of normal business, research, education, and other vital functions is dependent upon the appropriate use of the ResNet and UCSD network. To maintain this performance, the activities below are strictly prohibited. Please note that many of these activities are caused by inaction rather than action.

  1. Any intentional or unintentional action that impairs the overall function of the network.
  2. Any intentional or unintentional action that produces an excessive load on the network.
  3. Any intentional or unintentional action that would deny or impair network service to another system or user.
  4. Any intentional or unintentional distribution of computer viruses or malware.
  5. Operation of any unauthorized server.
  6. Any action that violates Federal or State law or any other University policy.
  7. Providing a service or distributing any product for a fee.
  8. Providing access to University facilities to non-University affiliates.
  9. Scanning any systems or networks other than the devices registered to you.
  10. Unauthorized installation of networking hardware (router, wireless router, network extender, etc.)
  11. Forging or attempting to hide your identity while using ResNet, including manually changing the Media Access Control (MAC) address or Internet Protocol (IP) address of any device connected to the ResNet network.
  12. Attempting to circumvent data protection schemes or security mechanisms.

Copyright Law and Enforcement

Copyright Law

It is illegal to distribute copyrighted material without the express permission of the copyright owner, as noted under the Copyright Act of 1976 and the Digital Millennium Copyright Act of 1999. Most material that is available through peer-to-peer (P2P) file sharing software, such as movies, television shows, and music, is not legal to download and distribute.


In the event that ResNet is notified of a copyright violation against you, ResNet will block your connection permanently without the possibility of having your connection restored.

Computer and System Requirements


Malware (e.g.: viruses, Trojan horses, worms, adware, etc.) is commonly spread through computer-to-computer communications. This includes email attachments, instant messaging clients, P2P file sharing software, and vulnerabilities in installed software and the operating system. For this reason, ResNet requires that your computer meet certain security standards before connecting to the ResNet network.

Security Software

ResNet requires that antivirus and firewall software be active and updated on all devices connected to the ResNet network. It is your responsibility to ensure that your computer is compliant with this policy.

Updated Operating System and Software

You must keep the operating system and software updated on devices registered or authenticated to you. If the operating system is not under active support by the software manufacturer, your device will not meet the standards of an updated operating system. Updates are provided through the software manufacturer on a regular basis to patch security vulnerabilities. Ignoring these updates can and will leave your computer open to attack and may place your computer as a violator of Federal or State law, or University policies. Please note that though you may not be the one actively participating in these violations, you will be held responsible for these violations.

Computer Passwords and Access Control

To prevent unauthorized access to your computer, strong passphrase authentication must be used on your computers for any and all access. We recommend using a passphrase (a collection of several words) rather than a password, as a passphrase takes longer to crack and is often easier to remember.

You can use the following tips to create a secure passphrase:

  1. Do not use a famous phrase or well-known quote.
  2. Make sure that you are the only one who can remember the phrase.
  3. Use characters from at least three of the four categories:
    1. Lower case letters (abcde...)
    2. Upper case letters (ABCDE...)
    3. Numbers (12345...)
    4. Non-alphanumeric Characters (!@#$%...)

You must set your devices to log off or lock if left unattended for a period of time. Because you will be held responsible for any traffic generated from any device under your username, locking your computer after a period of time will mitigate unauthorized access.


The ResNet Policy Key will actively verify that these requirements are satisfied. If these requirements are not met, your computer will be denied access to the ResNet network.

Network Monitoring and Mitigation

Monitoring Techniques

To ensure the ResNet network is running at optimum efficiency, ResNet, in conjunction with Network Security, monitors the ResNet network for vulnerable or infected computers and / or abuse of resources. This is done through a combination of different techniques, including:

  1. IP Sourcing: The starting and terminating IP addresses of a connection are checked against a black list of known viral hosts. If any of these IP addresses match a known viral host, the computer is quarantined.
  2. ResNet Policy Key: ResNet will use the Policy Key software to ensure devices on the network meet the UCSD Minimum Network Security Standards before granting access to the ResNet network.
  3. High Resource Usage: Abnormally high load on the ResNet network is also flagged and your device may be blocked. In these cases, you may be contacted by ResNet to either modify or suspend the activity that caused the load.

Network Suspension and Blocking

ResNet reserves the right to immediately block your connection without prior warning or notification. If your computer is blocked under this circumstance, ResNet may notify you why your computer was blocked along with remediation options.

Other Relevant Policies

As mentioned in "Introduction and Coverage of Service: Enforcement," your acceptance of this Acceptable Use Policy and use of the ResNet network also includes your acceptance and compliance with the following policies.

  1. UCSD Minimum Network Connection Standards (Please see Exhibit B)
  2. UCSD ACMS Acceptable Use Policy
  3. University of California Electronic Communications Policy
  4. UCSD Email Procedures and Practices
  5. UCSD Student Conduct Code

Contact and Questions

ResNet is available to assist you with questions or concerns you have regarding this Acceptable Use Policy and / or responsible computing. We are more than happy to assist you in answering a particular concern or issue.

Telephone: (858) 534-2267
E-mail: resnet@ucsd.edu
Location: Applied Physics and Mathematics 1313

twitter facebook