Skip Navigation

Network Acceptable Use Policy

Users of the Johns Hopkins wired and wireless networks are expected to take precautions to ensure the security of their systems and the network. Users may be held responsible for security breaches on their systems, even if they are not personally involved in the violation. Any violation of the Johns Hopkins Network Terms of Service may lead to a loss of ResNet service and academic and/or legal disciplinary action.

Illegal Activity

An illegal action on the Johns Hopkins network includes, but is not limited to:

  • Unauthorized distribution or downloading of copyrighted material, including:
       -   Music
       -   Movies
       -   Television Shows
       -   Computer Software
  • Obtaining or distributing anything believed ot be, representing, or resembling child pornography.
  • Distributing any type of pornography to minors.
  • Forging electronic communication / identity theft.
  • Committing acts of harassment.
  • Obtaining electronic services or data without required payment.


Misuse of the Johns Hopkins network includes, but is not limited to:

  • Hogging computer resources or access. (Printers, Internet, Etc.)
  • Hacking / cracking / exploiting security gaps.
  • Using Johns Hopkins computing resources and networks for personal or private commercial purposes or financial gain.
  • Vandalizing any Johns Hopkins resource or property.
  • Making Johns Hopkins resources available to unauthorized persons (including family or friends).
  • Knowingly hindering the performance of the network or other clients on the network.


The actions listed above are subject to change and may be modified by Johns Hopkins at any time.


Problems? Issues? Questions?

If you are having any problems, issues, or questions please visit our Getting More Help / Contact Us page.