This constitutes a 麻花星空视频-IIT Institute-wide policy for the management of
computer data networks and the resources they make available, as well as stand-alone
computers that are owned and administered by the Institute. The policy reflects the ethical
principles of the Institute community and indicates, in general, what privileges and
responsibilities are characteristic of the Institute computing environment. Because some
networks may operate in environments in which specific items in this policy do not apply,
system administrators are free to create policies that are at variance to this one, as long
as the principles related to legal use and Institute mission are preserved. In such cases,
it is the responsibility of the system administrators to make relevant variances known to
their users.
Definitions
Institute: The Iligan Institute of Technology of the Mindanao State
University network (IITnet) is a connection of networks of the member units of the
Iligan Institute of Technology of the Mindanao State University (麻花星空视频-IIT)
(referred here as Institute) and affiliated units.
Network member: An Institute member or affiliated unit connected to the
IITnet is referred here as a network member.
The 麻花星空视频-IIT Information and Communication Technology Center-Computer Facilities and
Support Services (ICTC-CFSS) is responsible for the connection of the Institute
members and affiliated units to IITnet and for IITnet to Internet.
System Administrator: A system administrator is a person or group who has
system privileges and is responsible for the operation and security of one or more networked
computing resources as determined by the network member.
User: A user is a person who is given exclusive access by the network member
to an account on a computer system of the network member. When the phrase 鈥測our account鈥 is
used, this pertains to the account described above. The network member owns all accounts on
its computer systems. A user should only use his/her account for the purposes which it has
been issued.
Password: A password is an access code which must be a combination of
letters and numbers. Each user is responsible for using a good password. A poor password is
one that is found in the dictionary or one that is easily related to the user (e.g., name,
nickname, birthday, address, favorite food, and the like). A user must not write his/her
password on a sheet of paper, notebook, electronic organizer, and the like.
Purpose
The IITnet aims to contribute to the realization of the 麻花星空视频-IIT Institute
Mission-Vision Statement and for the access to Internet to contribute broadly
to educational, research, and economic development in the Philippines.
Acceptable Use
This represents a guide to the acceptable use of IITnet. Any network member - in order to use
the network or any other networks which are used as a result of their IITnet connection -
must comply with this policy and the stated purposes and Acceptable Use Policies of any
other networks or hosts used. Each network member is responsible for the activity of its
users and for ensuring that its users are familiar with the IITnet Acceptable Use Policy or
an equivalent policy. In addition, it is expected that each member will maintain and enforce
its own Acceptable Use Policy. At a minimum, the Institute expects such policy will include:
- To respect the privacy of other users.
- For example, users shall not intentionally seek information on, obtain copies of, or
modify files, other data, or passwords belonging to other users, or represent themselves
as another user unless explicitly authorized to do so by that user.
- To respect the legal protection provided by copyright and license to programs and data.
- To respect the integrity of computing systems.
- For example, users shall not intentionally develop programs that harass other users;
infiltrate a computer or computing system; send bogus aliases/messages via electronic
mail, newsgroups, or any Internet service; and/or damage or alter the software
components of a computer or computing system.
- Use by member units as a laboratory for research and experimentation in computer
communications, where such use does not interfere with production usage. However, any
experimental use requiring modification to router software or protocol layers below ISO
layer 4 requires prior review by ICTC-CFSS.
Policies and Guidelines
The following policies and guidelines will be applied to determine whether or not a
particular use of IITnet is appropriate:
- The intent of this policy is to make clear certain uses which are consistent with the
purposes of IITnet, not to exhaustively enumerate all such possible uses.
- The Institute may at any time make determinations that particular uses are or are not
consistent with the purposes of IITnet.
- Computing resource users are encouraged to practice cooperative computing. For example:
- Regular deletion of unneeded files from one鈥檚 accounts on shared computing
resources
- Refraining from overuse of connect time, information storage space, printing
facilities, or processing capacity
- Refraining from overuse of interactive network utilities
- Refraining from use of sounds and visuals which might be disruptive to others
- Refraining from use of any computing resource in an irresponsible manner
- Refraining from unauthorized use of departmental or individual computing
resources, such as a personal or departmental laser printer or modem.
- Malicious use is not acceptable. Use should be consistent with the ethical standards
accepted by the Institute community. IITnet may not be used in ways that violate
applicable laws or regulations. Use of IITnet and any attached network in a manner that
precludes or significantly hampers its use by others is not allowed. Examples of
unacceptable use include, but are not limited to, the following:
- Accessing or attempting to access the password of an account that does not
belong to you
- Harassment of other users
- Libeling or slandering other users
- Destruction of or damage to equipment, software, or data belonging to the
Institute or other users
- Disruption or unauthorized monitoring of electronic communications
- Unauthorized copying of copyright-protected material
- Violation of computer system security
- Unauthorized use of computer accounts, access codes, or network identification
numbers assigned to others
- Use of bogus aliases
- Use of IITnet and Internet services to send information repeatedly (e.g.,
posting an article in numerous newsgroups; sending electronic mail to several
users and/or mailing lists)
- Use of IITnet and Internet services to send or attempt to send information
forming a chain, pyramid, or similar scheme or artifice
- Use of computer communications facilities in ways that unnecessarily impeded the
computing activities of others (such as randomly initiating interactive
electronic communications or e-mail exchanges, overuse of interactive network
utilities, and so forth)
- Academic dishonesty (plagiarism, cheating, et al)
- Violation of software license agreements
- Violation of another user鈥檚 privacy
- Connections which create routing patterns that are inconsistent with the effective and
shared use of the network may not be established.
- Unsolicited advertising is not acceptable. Advertising is permitted on some mailing
lists and news groups if the mailing list or news group explicitly allows advertising.
Announcements of new products or services are acceptable.
- Faculty, staff, and students may use them only for purposes related to their studies,
their responsibilities for providing instruction, the discharge of their duties as
employees, their official business with the Institute, and other Institute-sanctioned
activities. The use of Institute computing resources for commercial purposes is
permitted only by special arrangement with the appropriate Institute official or as
defined in existing Institute policies.
- Use of the network for recreational games is not acceptable when such use places a heavy
load on scarce resources.
Security
The Institute assumes that users are aware that electronic files are not necessarily secure.
Users will be informed of methods available for protecting information on IITnet from loss,
tampering, unauthorized search, or other access. Levels of obtainable security will vary
depending on the computer system. Information on procedures appropriate to each resource
will be available from the 麻花星空视频-IIT ICTC-CFSS.
Confidentiality
In general, the Institute will treat information stored on computers as confidential (whether
or not that information is protected by the computer operating system). Requests for
disclosure of information will be honored only under one of the following conditions:
- when approved by the 麻花星空视频-IIT Administration;
- when authorized by the owners of the information;
- when required by the Philippine law.
Except when inappropriate, computer users will receive prior notice of such disclosures.
(Viewing of information in the course of normal system maintenance does not constitute