Skip to Main Content

Top Searched

null

eduroam

Coming Soon to Queens!

eduroam (education roaming) is a secure worldwide federated network access service developed for the international research and education community. It allows Queens faculty, staff, and students to use their Queens username and password to access wireless network services when visiting participating institutions. In addition, it enables Queens to serve as a hotspot for eduroam members visiting our campus. Ready to try eduroam?

Where is eduroam?

eduroam is covered throughout the majority of wireless locations on the Queens campus, in addition to locations across the United States (see eduroam-US Institutions) and internationally (see eduroam International Map). You can also read more specific information about eduroam in other countries.

Note: There is an eduroam Companion app for Android and iOS to help you discover eduroam hotspots using your GPS.

Benefits of eduroam

  • As an educational member, enjoy roaming wireless access across a global network of universities!
  • Get immediate wireless access with a credential you already know!
  • Enjoy increased bandwidth and less restrictions often afforded to authenticated connections such as eduroam!
  • Network access through secure 802.1x EAP protocol… no open, unsecure guest networks!

eduroam Acceptable Use

eduroam is provided for Queens University of Charlotte students to support their educational needs and for Queens faculty and staff to support their professional activities. All Queens users are responsible for using eduroam in an effective, efficient, ethical, and lawful manner. Access is a privilege, not a right, and as such, can be withdrawn from those who use it irresponsibly.

Purpose

All Queens users are responsible for their internet activity and will use the internet in a judicious and ethical manner. The use of technology shall be consistent with local, state, and federal laws and in accordance with Queens policies and procedures.

Use

The internet and technology resources are to be used for business and educational purposes, fostering a positive educational and working environment.

  • Acceptable uses include, but are not limited to:
    • Official university business
    • Instructional and student research
    • Independent study
    • Professional development
    • Service representing the university or community
    • Reasonable non-commercial personal use
  • Unacceptable uses include, but are not limited to:
    • Any purpose which is illegal, immoral, unethical, intentionally dishonest, purposefully hurtful, or inconsistent with the university’s mission.
    • Harassment, libel, slander, and cyberbullying behavior
    • Fraudulent or intentionally misleading statements
    • Undermining computer, network, or technology security settings
    • Unauthorized access to Queens technology systems
    • Using another user’s login credentials, using password cracking programs, packet sniffers, port scanners, or similar.
    • Using university technology for personal, private, or commercial business purposes is not part of official university business.
    • Violation of software and maintenance license agreements
    • Downloading unlicensed material or violating copyright limitations of information.
    • Viewing, sending, posting, downloading, or intentionally accessing pornographic, sexually explicit, offensive material, or material that does not support the values of employee and student good behavior.

Confidentiality

Queens has a monitored technology infrastructure. Internet activity, electronic mail, computer logs, and computer files are monitored. All network, computing, and communications activities are subject to e-discovery and forensic investigation purposes. The university cannot guarantee the unmonitored privacy of electronic communications.

Privacy

Computer files, electronic mail, and accounts on university networks are not the private property of the user, and the user has no reasonable expectation of privacy. The university president, vice presidents, or the Chief Information Officer or designee may monitor use:

  • To protect the integrity, security, or functionality of the network or other computing resources
  • To protect the university from liability
  • When there is reasonable cause to believe that the user has violated this Internet Acceptable Use policy
  • When there appears to be unusual or unusually excessive activity, as indicated by monitoring general usage patterns
  • When requested by supervisors or the Director of Human Resources
  • When required by law