Acceptable Use Policy guideline
- Individuals may not use another individual's account, or attempt to capture or guess other users' passwords.
- Individuals must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
- Individuals may use only the computers, computer accounts, and computer files for which you have authorization.
- You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
- Individuals are individually responsible for appropriate use of all resources assigned to them, including the computer, the network address or port, software and hardware. Therefore, one is accountable to the University for all use of such resources.
(Brown, 2015).
Rights and responsibilities
The school provides work related tools for every student to be able to study comfortably , including access to the Library, to certain computer systems, servers, software and databases, to the campus telephone and voice mail systems, and to the Internet. your right to access information and to express your opinion to be protected as it is for paper and other forms of non-electronic communication.
You are responsible for knowing the regulations and policies of the institution applying to appropriate use of the institutions technologies and resources and to also exercise good judgment in the use of the institutions technological and information resources.
Brown, 2015. Acceptable Use Policy. [Online]. Available at: https://it.brown.edu/computing-policies/acceptable-use-policy#30 [Accessed 22 June 2015]
No comments:
Post a Comment