WIFI CONNECTIVITY AND USE GUIDELINES
CAMPUS WIFI CONNECTIVITY
Follow the instructions below to access the Point University WiFi network. If you are unable to connect or have other difficulties, visit the IT Service Desk on the 1st floor of the Smith Lanier Academic Center (Monday through Friday between 8-5) and a staff member can help you.
Campus and Residence Hall networks
Our on campus residential halls have two networks:
- Main Campus – Point University’s main campus facilities have a student WiFi network named “Skyhawk Net”. If you do not know the password, stop by the IT Help Desk and someone will be available to help you. This password will be posted in your dorm room, and in other student areas of the campus.
- The Summit– This network is for students living in The Summit dorms. You should follow the instructions provided in your dorm room for joining this network— basically, select the network and log in with the appropriate password.
- The Nest– This network is for students living in The Nest dorms. You should follow the instructions provided in your dorm room for joining this network— basically, select the network and log in with the appropriate password.
- Point University off campus housing – If you live in an apartment at The Lofts, or at Skyhawk Hall, your internet and WiFi is provided by WOW Cable services. If you have trouble connecting, you may submit a ticket to the IT helpdesk by emailing firstname.lastname@example.org, or by completing THIS FORM. Please include a photo on your cable modem with the barcode information located on the bottom of the modem so it can be identified by the service provider. If you have questions, please call the help desk at (706) 385-1493
If you have any trouble connecting to either of these networks, or have trouble using your internet enabled devices on the Point network, please call the support number: (706) 385-1493 or visit the help desk in the Smith Lanier Academic Center.
Game Consoles and Streaming Devices
Game consoles like Xbox, Playstation, etc. and streaming devices such as Google Chromecast, Amazon Fire, and Roku are allowed on the Point University WiFi network but the OIT does not support these devices. If you have issues connecting your device, the OIT cannot assist you with them.
*Note, some game consoles have very limited wireless capability. Users have had some success by using a WiFi bridge, like the one below, to connect their device to the Point University WiFi.
Please review our WiFi Use Guidelines, and the Acceptable Use Policy below.
Visitor/Guest Wireless Connections
Guests to the Point University campus may access the internet via the Point University Guest wireless network. This network intended for casual use of the internet via web browser, such as web surfing, webmail, etc. Not all services will work on our guest WiFi. Since it has limited bandwidth, no streaming of audio or video is supported.
Steps to connect:
- Open your device’s wireless network connections page, select and connect to “Skyhawk-Guest.”
- Once connected, launch your internet browser and navigate to a web page to begin the wireless network validation process. You should be redirected to a welcome screen for the Point University Guest wireless network.
Please note that Point University WiFi will not work if you have entered a custom DNS server, such as 18.104.22.168 (Google). Your network settings must be set to obtain the DNS server automatically.
If you are still unable to connect after trying the steps above, please visit the IT Service Desk with your device during our hours of operation.
WiFi Use Guidelines
For information on how to connect, visit the WiFi page.
Maintaining a solid WiFi network is a shared responsibility.
The WiFi network is a critical campus resource. All users share responsibility for protecting the integrity and security of the network. Interference from personal wireless equipment can limit network access. Use of unauthorized WiFi access points poses a security risk to the Point University computing environment. It is the responsibility of the Office of Information Technology (OIT) to ensure that wireless devices are properly installed and administered to manage both performance and security risks.
Only OIT should deploy wireless access points on campus.
Personal wireless access points (WAPs) will interfere with Point University WAPs causing signal degradation and connectivity issues for those nearby.
Personal wireless devices (e.g. Mobile Hot Spots, Mi-Fi, phone tethering, unauthorized wireless access points, WiFi printers, etc.) significantly and negatively affect the Point University campus WiFi environment.
OIT personnel will periodically scan for personal wireless access devices. If an unauthorized WAP or Mi-Fi is identified, OIT personnel will open a ticket in the incident tracking system and attempt to contact the appropriate individual to address the WiFi issue in that location. If contact cannot be made, the device will be disconnected digitally at the network level. The same applies to WiFi printers. Printers on the Point University campus should have WiFi connectivity disabled and be connected only to a wired network jack with a reserved IP address.
Help the OIT improve campus WiFi service by contacting the IT Service Desk.
If you have concerns about WiFi connectivity, please contact the IT Service Desk (706.385.1493, ITSupport@point.edu). Please include details such as locations, times of day, and work that is being interrupted by WiFi connectivity issues. This detailed information will enable the OITS to engage the right personnel and tools to troubleshoot problems and implement solutions.
Acceptable Use Policy
Information Technology Acceptable Use Policy
Please review our WiFi Use Guidelines.
For more detailed policy information, read the full Information Technology Acceptable Use Policy.
This document describes the guidelines that Information Technology uses in providing services to its clients. Information Technology has great leeway within these guidelines to ensure that services it administers are operated as smoothly as possible.
Many people and organizations, local and distant, use University resources. Within this document we refer to this collective group as clients. This document is intended to tell clients what they can expect from Information Technology and what Information Technology expects from them.
2.0 Information Technology responsibilities
Information Technology operates a variety of services for its clients and assures its clients that these services will be reliable. By reliable we mean that the services will operate according to schedule, efficiently, correctly, and securely. Information Technology will take any action necessary, including unannounced inspection of a client’s files, network traffic, denial of access, and instigation of formal University disciplinary procedures, in order to protect the reliability of the services and the security of information. In addition to the policies and responsibilities discussed in this document, Information Technology will also rely on other relevant University documents, such as Point University’s Student Policies and Procedures when appropriate.
2.1 Point University Network services
Information Technology maintains connections to various networks and considers these connections to be among the most vital of our services. Information Technology has a responsibility to help maintain the reliability of computers and networks at other sites. Information Technology will treat any attempt to compromise the reliability of another computing system through the University’s computer network as if the attempt were directed at Information Technology’ computers.
2.2 Moderate security
Information Technology makes every effort to ensure that the information in its systems is secure. By secure we mean that the information stored in the computer will be safe from unauthorized access, and that Information Technology won’t lose the information. It is important to realize that Information Technology cannot make these guarantees absolute. Clients have a variety of levels of security available and must choose the level appropriate for their own information.
Information Technology will only inspect the contents of non-public files to protect the reliability of its services. Information Technology makes no attempt to censor any information held on its systems. Information Technology may be called upon to provide information and/or files to law enforcement agencies for the express purpose of assisting in active criminal investigations.
Information Technology runs regular file backups on its servers. Theoretically, in the event of a server failure, it is possible to recover all information stored in a computer at the time of the last backup. There are, however, occasional problems with these restorations which can result in other lost information. Information Technology does not restore email messages or mailboxes except in the sole case of a total system restore when recovering from some type of computer disaster. It is best practice for the user to maintain multiple copies of important documents in case of accidental file loss or deletion. This ensures you have YOUR document available quickly and easily in case the document cannot be restored for any reason.
3.0 Client responsibilities
Information Technology clients must bear certain responsibilities in order to continue using Information Technology resources. Responsible clients are necessary if Information Technology is to provide reliable services. Information Technology computer systems are not immune to tampering. Information Technology relies on its clients to refrain from deliberate attempts to abuse the systems. Information Technology clients are responsible for contacting Information Technology prior to undertaking any activity which Information Technology could interpret as compromising the reliability and security of computer systems and networks. Several other specific responsibilities are described below.
3.1 Proper Use
Information Technology computers and networks are funded by a variety of sources. University employees and students may use Information Technology resources only for work done for the University, and only when it is appropriate that the work be supported by university funds. Personal, for-profit activities are explicitly forbidden.
3.2 Sharable Resource
Information Technology resources are limited and shared by many clients. To avoid performance problems and/or unnecessary expenses, clients must refrain from initiating activities that consume an unreasonable amount of resources.
3.3 Unauthorized Access
Clients must only access information that belongs to them, is permitted to them, or is public. Clients must not attempt to decode, crack, or discover passwords that belong to others. Information Technology may remove clients who are found to possess programs that could be used to access private information that belongs to others.
Clients can ensure the privacy of their own information by being careful to NEVER share a password with anyone. Do not send passwords through email, because others can easily scan email messages looking for them.
Information Technology clients must not use University resources to harass others. This is considered a serious offense which Information Technology will pursue according to University regulations. Information Technology considers displaying or sending of un-requested, objectionable (as defined by the recipient) material to others to be harassment.
Clients may not use University resources to support inappropriate activities on any network, even if the activities don’t interfere directly with University resources. Information Technology will pursue allegations of inappropriate network activities with the utmost diligence.
3.5 Back-up files
Clients are responsible for maintaining their own multiple, current back-up copies of valuable or critical information to insure against inadvertent loss by Information Technology.
3.6 Pay attention to Information Technology Information
Information Technology may at times use its systems to provide clients with important information. We ask that clients pay attention to announcements and/or requests in order to protect themselves from unnecessary difficulties.