Skip to main content

SC Network Policy

All of SC’s networking resources are provided through SCinet. This includes multiple terabits of wired bandwidth delivered to meeting rooms and exhibitor booths, as well as the wireless network that permeates the convention center.

Users of these services and facilities have access to valuable conference resources, and to internal and external networks. Consequently, it is important for all users to behave in a responsible, ethical, and legal manner.

Acceptable use means respecting the rights of other network users and maintaining the integrity of the physical facilities. If an individual is found to be in violation of the Network Use Policy, SC will take action, including possible revocation of network privileges.


SCinet will strive to make the best network resources available for users throughout the SC Conference. Each year we make improvements to the service, working in partnership with the local convention center IT staff.

SC attendees are among the most connected conference-goers in the world and put even the most sophisticated wireless networks to the test.

SCinet actively monitors the health of the wireless networks and will make every effort to provide stable and reliable service.

Wired Network Policy

SCinet can facilitate wired connections to exhibitors, delivered via fiber optic cables on the exhibit floor, when they are ordered and paid for through the SCinet Connection Request System (CRS). Connections include 1/10/100/400 Gigabit Ethernet, and dark fiber between distinct locations.

Exhibitors may make a network request for their exhibit booth.

Wireless Network Policy

SCinet deploys two primary SSIDs for the conference: SC23 and eduroam. SC23 is an unencrypted open network and does not require authentication. Eduroam is available for users who have this service configured through their home institutions. Both SSIDs will be available throughout the conference venue.

SCinet deploys IEEE 802.11ax wireless networks that enable basic access to the internet at no charge to attendees. The wireless network will extend to meeting rooms, the Exhibits Hall, and all common areas of the space occupied by the SC Conference.

In order to provide the most robust wireless service possible, SCinet has some special policies in place. SCinet must control the entire 2.4GHz, 5.2GHz, and 6GHz ISM bands (2.412GHz to 2.462GHz, 5.15GHz to 5.35GHz, and 5.925GHz to 7.125GHz) within the convention center. This has important implications for exhibitors and attendees:

  • Exhibitors and attendees may not operate their own IEEE 802.11 (a, g, n, ac or other standard) wireless Ethernet access points anywhere within the convention center, including within their own booths. This includes personal hotspots, mifi, or other WiFi-to-cellular bridges.
  • Wireless clients may not operate in ad-hoc or peer-to-peer mode due to the potential for interference with other wireless clients.
  • Exhibitors and attendees may not operate 2.4GHz or 5.2GHz cordless phones or microphones, wireless video or security cameras, or any other equipment transmitting in the 2.4GHz, 5.2GHz, or 6GHz spectrum.

SCinet wants everyone to have a successful, pleasant experience at the SC Conference. This should include the ability to sit down with your laptop, tablet, or smartphone to check email or surf the web from anywhere in the wireless coverage areas. Please help us achieve this goal by not operating equipment that will interfere with other users.

SC reserves the right to deny or remove access to any system in violation of the SCinet Network Use Policy and to anyone who uses multicast applications or harms the network in any way, intended or unintended, via computer virus, excessive bandwidth consumption, or similar misuse.

Network Use Policy

When you use SCinet you agree to comply with this and all other computing-related policies.


The network resources of SCinet support the activities of the SC Conference. As a user of these services and facilities, you have access to valuable conference materials, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical, and legal manner.

Acceptable use means respecting the rights of other network users and the integrity of the physical facilities. If an individual is found to be in violation of the Network Use Policy, the SC Conference will take action, including the restriction and possible revocation of network privileges. Individuals are also subject to federal, state, and local laws governing interactions that occur on the internet.

This document establishes specific requirements for the use of all network resources of SCinet at the SC Conference.


This policy applies to all users of networking resources (wired and wireless) owned or managed by SCinet and the SC Conference, regardless of the ownership of the computer or device connected to the network.

Your Rights and Responsibilities

As an attendee of the SC Conference, SCinet provides you with the availability of wired and wireless networking resources that facilitate access to conference materials and to the internet. You have a reasonable expectation of unobstructed use of these resources, of certain degrees of privacy, and of protection from abuse and intrusion by others sharing these resources.


Acceptable use

  • You are individually responsible for appropriate use of all resources and thus accountable to SCinet and the SC Conference for all use of such resources. You may not enable unauthorized users to access the network.
  • You should make a reasonable effort to protect your passwords and privacy, and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing SCinet in an unauthorized manner.
  • You must not attempt to access restricted portions of the network, or connected systems, without appropriate authorization.
  • You must not use SCinet in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other users, or damage or degrade performance of the network.
  • Do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password “crackers,” vulnerability scanners, network sniffers, etc.).

Fair Share of Resources

SCinet expects to maintain an acceptable level of performance and must ensure that frivolous, excessive, or inappropriate use of the resources by anyone does not degrade performance for others. The network is shared, requiring that resources be utilized with consideration for others who also use them. Therefore, the use of any automated processes to gain technical advantage over others is explicitly forbidden.


Attendees of the SC Conference are expected to uphold local ordinances and state and federal law. As a user of SCinet you must:

  • Abide by all federal, state, and local laws.
  • Abide by all applicable copyright laws and licenses.
  • Observe the copyright law as it applies to music, videos, games, images, texts, and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified, and sent over the internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy, and copyright infringement.
  • Do not use, copy, or distribute copyrighted works (including, but not limited, to graphics, audio files, videos, trademarks, software, and logos) unless you have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation, and criminal prosecution.

Privacy & Personal Rights

All users of SCinet resources are expected to respect the privacy and personal rights of others.

While the SC Sonference does not generally monitor or limit content of information transmitted on SCinet, it reserves the right to access and review such information under certain conditions. These include: investigating performance deviations, determining if an individual is in violation of this policy or, as may be necessary, to ensure that the SC Conference is not subject to claims of misconduct.

User Compliance

When you use SCinet you agree to comply with this and all other computing-related policies.

SC SCinet computer hardware


Contact the SCinet committee if you have any questions about the high-capacity network or how to participate. or contribute. We’d be happy to help.

Back To Top Button