麻花星空视频

Net Usage Policy


This constitutes a 麻花星空视频-IIT Institute-wide policy for the management of computer data networks and the resources they make available, as well as stand-alone computers that are owned and administered by the Institute. The policy reflects the ethical principles of the Institute community and indicates, in general, what privileges and responsibilities are characteristic of the Institute computing environment. Because some networks may operate in environments in which specific items in this policy do not apply, system administrators are free to create policies that are at variance to this one, as long as the principles related to legal use and Institute mission are preserved. In such cases, it is the responsibility of the system administrators to make relevant variances known to their users.

Definitions

Institute: The Iligan Institute of Technology of the Mindanao State University network (IITnet) is a connection of networks of the member units of the Iligan Institute of Technology of the Mindanao State University (麻花星空视频-IIT) (referred here as Institute) and affiliated units.

Network member: An Institute member or affiliated unit connected to the IITnet is referred here as a network member.

The 麻花星空视频-IIT Information and Communication Technology Center-Computer Facilities and Support Services (ICTC-CFSS) is responsible for the connection of the Institute members and affiliated units to IITnet and for IITnet to Internet.

System Administrator: A system administrator is a person or group who has system privileges and is responsible for the operation and security of one or more networked computing resources as determined by the network member.

User: A user is a person who is given exclusive access by the network member to an account on a computer system of the network member. When the phrase 鈥測our account鈥 is used, this pertains to the account described above. The network member owns all accounts on its computer systems. A user should only use his/her account for the purposes which it has been issued.

Password: A password is an access code which must be a combination of letters and numbers. Each user is responsible for using a good password. A poor password is one that is found in the dictionary or one that is easily related to the user (e.g., name, nickname, birthday, address, favorite food, and the like). A user must not write his/her password on a sheet of paper, notebook, electronic organizer, and the like.

Purpose

The IITnet aims to contribute to the realization of the 麻花星空视频-IIT Institute Mission-Vision Statement and for the access to Internet to contribute broadly to educational, research, and economic development in the Philippines.

Acceptable Use

This represents a guide to the acceptable use of IITnet. Any network member - in order to use the network or any other networks which are used as a result of their IITnet connection - must comply with this policy and the stated purposes and Acceptable Use Policies of any other networks or hosts used. Each network member is responsible for the activity of its users and for ensuring that its users are familiar with the IITnet Acceptable Use Policy or an equivalent policy. In addition, it is expected that each member will maintain and enforce its own Acceptable Use Policy. At a minimum, the Institute expects such policy will include:

  • To respect the privacy of other users.
  • For example, users shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to other users, or represent themselves as another user unless explicitly authorized to do so by that user.
  • To respect the legal protection provided by copyright and license to programs and data.
  • To respect the integrity of computing systems.
  • For example, users shall not intentionally develop programs that harass other users; infiltrate a computer or computing system; send bogus aliases/messages via electronic mail, newsgroups, or any Internet service; and/or damage or alter the software components of a computer or computing system.
  • Use by member units as a laboratory for research and experimentation in computer communications, where such use does not interfere with production usage. However, any experimental use requiring modification to router software or protocol layers below ISO layer 4 requires prior review by ICTC-CFSS.

Policies and Guidelines

The following policies and guidelines will be applied to determine whether or not a particular use of IITnet is appropriate:

  • The intent of this policy is to make clear certain uses which are consistent with the purposes of IITnet, not to exhaustively enumerate all such possible uses.
  • The Institute may at any time make determinations that particular uses are or are not consistent with the purposes of IITnet.
  • Computing resource users are encouraged to practice cooperative computing. For example:
    • Regular deletion of unneeded files from one鈥檚 accounts on shared computing resources
    • Refraining from overuse of connect time, information storage space, printing facilities, or processing capacity
    • Refraining from overuse of interactive network utilities
    • Refraining from use of sounds and visuals which might be disruptive to others
    • Refraining from use of any computing resource in an irresponsible manner
    • Refraining from unauthorized use of departmental or individual computing resources, such as a personal or departmental laser printer or modem.
  • Malicious use is not acceptable. Use should be consistent with the ethical standards accepted by the Institute community. IITnet may not be used in ways that violate applicable laws or regulations. Use of IITnet and any attached network in a manner that precludes or significantly hampers its use by others is not allowed. Examples of unacceptable use include, but are not limited to, the following:
    • Accessing or attempting to access the password of an account that does not belong to you
    • Harassment of other users
    • Libeling or slandering other users
    • Destruction of or damage to equipment, software, or data belonging to the Institute or other users
    • Disruption or unauthorized monitoring of electronic communications
    • Unauthorized copying of copyright-protected material
    • Violation of computer system security
    • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others
    • Use of bogus aliases
    • Use of IITnet and Internet services to send information repeatedly (e.g., posting an article in numerous newsgroups; sending electronic mail to several users and/or mailing lists)
    • Use of IITnet and Internet services to send or attempt to send information forming a chain, pyramid, or similar scheme or artifice
    • Use of computer communications facilities in ways that unnecessarily impeded the computing activities of others (such as randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, and so forth)
    • Academic dishonesty (plagiarism, cheating, et al)
    • Violation of software license agreements
    • Violation of another user鈥檚 privacy
  • Connections which create routing patterns that are inconsistent with the effective and shared use of the network may not be established.
  • Unsolicited advertising is not acceptable. Advertising is permitted on some mailing lists and news groups if the mailing list or news group explicitly allows advertising. Announcements of new products or services are acceptable.
  • Faculty, staff, and students may use them only for purposes related to their studies, their responsibilities for providing instruction, the discharge of their duties as employees, their official business with the Institute, and other Institute-sanctioned activities. The use of Institute computing resources for commercial purposes is permitted only by special arrangement with the appropriate Institute official or as defined in existing Institute policies.
  • Use of the network for recreational games is not acceptable when such use places a heavy load on scarce resources.

Security

The Institute assumes that users are aware that electronic files are not necessarily secure. Users will be informed of methods available for protecting information on IITnet from loss, tampering, unauthorized search, or other access. Levels of obtainable security will vary depending on the computer system. Information on procedures appropriate to each resource will be available from the 麻花星空视频-IIT ICTC-CFSS.

Confidentiality

In general, the Institute will treat information stored on computers as confidential (whether or not that information is protected by the computer operating system). Requests for disclosure of information will be honored only under one of the following conditions:

  • when approved by the 麻花星空视频-IIT Administration;
  • when authorized by the owners of the information;
  • when required by the Philippine law.

Except when inappropriate, computer users will receive prior notice of such disclosures. (Viewing of information in the course of normal system maintenance does not constitute