Preaload Image

 

2.5.        Unacceptable Internet Use Policy

The unacceptable Internet use policy include:

  • Use of the University’s computing and/or network resources in conjunction with the execution of programs, softwares, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performances of software or hardware components of a system,
  • Violation of the rights of any person or the University’s intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by the University or the owner of the computer,
  • Using University resources for file-sharing applications such as Kazaa, Limewire, Shareaza, BitTorrent, or similar technology to upload, download, acquire, store, use, distribute or otherwise transmit unlicensed copyrighted works,
  • Use of ICT resources such as email, IP telephone, instant messaging, or any other new electronic technologies that may emerge, to create, post, transmit materials or messages that violate the University’s policies against discrimination, harassment on account of age, race, religion, sex, ethnicity, nationality, disability, height, weight, marital status, familial status, or other protected class, status or characteristic or other applicable laws,
  • Accessing pornography and similar sites,
  • Use of ICT resources for commercial purpose, product advertisement, or political activities without authorization of the University,
  • Use of ICT resources to access or transmit the files or communications of other students, faculty, or staffs without authorization, or to provide information about, or lists of students, faculty or staffs to persons, groups, or organizations outside the University without authorization,
  • Causing or allowing access, modification, or destruction of any files, programs, settings, or data transmitted or stored by any device without permission,
  • Sending unsolicited email messages, including the sending of “junk mail” or other advertising materials to individuals who did not specifically request such materials (email, spam), and
  • Creating or intentionally sending viruses or other harmful programs or files.

 

2.6. Internet Bandwidth and Use Policy    

2.7. Remote Access Policy