ResNet Subscriber Agreement

All subscribers of York University provided ResNet service must indicate their acceptance of this agreement for network service to be provided. Violations of this agreement will result in the offending subscriber system being disconnected from the network with or without prior notice. Restoration of service is dependent on the subscriber's compliance with this agreement and is at the discretion of University Information Technology. Violations of this agreement which also violate other York University policy or law may also result in loss of access privileges, University disciplinary action, and/or legal action.

Terms and Conditions

    1. Responsibility for Use: Individual subscribers are solely responsible for all use of their ResNet connection and ensuring that it is not used in violation of this and other relevant University policy or law, including the Senate Policy on Computing and Information Technology Systems and associated Network Security and Management Guidelines.
    2. Contact Information: ResNet is operated by University Information Technology (UIT). It is the subscriber's responsibility to submit accurate contact information to UIT. Failure to do so may result in termination of service without warning.
    3. Respect of Copyright: Distribution or downloading of copyrighted materials in violation of copyright law is prohibited.
    4. Client Computer Security Verification: Clients are required to maintain their computer in a secure fashion, at minimum ensuring all critical security updates are applied, and the system is free of viruses and other malicious software. UIT provides anti-virus software free of charge to students of York University. Clients may be required to run a verification agent/program on their system to verify appropriate security settings are in place, critical updates are applied, and UIT-provided anti-virus software is active and updated.
    5. Usage Limits: UIT reserves the right o limit the amount of ResNet upload/download usage.

Prohibited Use

The following points clarify or are in addition to the restrictions listed in the Network Security and Management Guidelines. Violation of any of the following prohibited uses may result in suspension or termination of the subscriber's ResNet connection.

    1. Network Abuse: Attempting to interfere with the normal operation of networks and systems within or external to the University is prohibited. This includes scanning, monitoring, interception, impersonation, or modification of systems and data without authorization.
    2. Commercial Use: Use of ResNet connections to host services for commercial purposes is prohibited.
    3. Subscriber Use Only: The ResNet connection is for the use of the individual subscriber only. Extending the service to others by any means (network hub, connection sharing, wireless access point, etc.) is prohibited except where expressly permitted.
    4. Unsolicited Bulk E-mail (Spam): Use of the ResNet connection to send unsolicited bulk e-mail is prohibited.
    5. IP Addresses and Domain Names: All subscribers will be automatically assigned a dynamic IP address and domain name by the network - attempting to use a different IP than the one assigned is prohibited. Arranging for an external non-"" domain name to refer to a ResNet IP address is prohibited.
    6. Third-party Use: Use of software which allows others to use the ResNet resources available to the subscriber, such as proxy servers, e-mail relaying, remote control of the computer, or other related function not directly initiated by the subscriber is prohibited.
    7. Wireless Network Services: Operation of DNS or DHCP services on any network interface connected to the ResNet service is prohibited.

Other Conditions

    1. Network Traffic: University Information Technology (UIT) will control inbound and outbound Internet traffic and the types and flow rates of traffic permitted. Decisions about the permitted types of traffic will be based on the business and academic goals of the University and the security exposure involved.
    2. Network Monitoring: UIT will monitor network traffic as necessary and appropriate to detect unauthorized activity or intrusion attempts and ensure efficient operation. All monitoring will be carried out in compliance with the University Policy on Computing and Information Technology Facilities.
    3. Security Auditing: UIT, or its designee, is authorized to perform a security audit of any device connected to the ResNet network service at any time. Subscribers will be notified via the contact information provided to resolve any identified vulnerabilities. UIT reserves the right to disable network access to any Subscriber with an identified security vulnerability until the vulnerability has been resolved.
    4. Incident Response: Subscribers are requested to report suspected system security compromises or network abuse via e-mail to, or to UIT Client Services.
    5. Prohibited/Blocked Network Services or Servers: Residence Network Subscribers are prohibited from running the following types of servers or services on computers connected to the Residence Network:
      • Remote login services (Windows Remote Desktop, PCanywhere, Dameware, telnet, RSH, SSH, etc)
      • File transfer servers (web, FTP, NFS, SMB/CIFS, etc.)
      • IRC servers
      • Mail servers (SMTP)

      Due to the increased threat of viruses, worms and other malicious network activity, access to ports used by these services as well as other ports commonly used for network attacks will be blocked; this should not interfere with typical network usage. The list of blocked ports may change without notice depending on security requirements. For more information on blocked ports, please contact UIT Client Services.

    6. Permitted use of Routers: Subscribers are allocated one IP address. The use of hubs or switches to extend the network is prohibited. Providing network service to computers located outside of the designated Subscriber's Undergraduate Residence Room or York Apartment Unit is prohibited. Extending the network access using a wireless network is prohibited. Users who have more than one computer will need to provide a 'broadband router' (sometimes referred to as a Cable/DSL router or home router), the use of a consumer grade 'broadband router' is permitted as long as it does not interfere with the normal operations of the network.


York University reserves the right to modify or change this agreement without prior notice or consent.