The Computer center provides facilities to support and enhance the educational mission of the university; to enrich the educational experience of the students, faculty and the staff by supporting their research and academic activities. Providing automation support to the university. This facility is needed for day-to-day research activities as well as courses and assignments.
A computer account is created for every individual on admission to the university. The account allows you to browse the web, send and receive e-mail, use the computational and interactive facilities of the center. You can use the state-of-the-art services of the computer center with freedom.
This freedom, you will find, is unsurpassed, when compared with elsewhere.
Hence it is expected that you have to use the services in a responsible manner. Your conduct and use should be tempered with propriety and a spirit that respects the right of everyone.
Any abuse of the facility may have serious implications on the reputation and the standing of the university as well as can bring the facility of the university into disrepute. Such misuse of the facility will not be tolerated.
Certain guidelines that should be followed in the use of the computer center and its facilities have been formulated. The compliance with the guidelines and the dos and the don’ts are necessary for the continued use of your freedom. Not only should users stick to the use of the facility in accordance with the guidelines, but also report any use that is against these guidelines or the spirit of these guidelines.
Failure to report infractions of the guidelines shall also be construed as an act of omission in following the guidelines.
Following activities amount to unethical use of computing facilities and will attract punishment from the university authorities. You should read the following list of activities that amount to unethical use of computing facilities and the previous discussion carefully and then sign your declaration of acceptance of the policies.
Unethical Use of Computing Facilities
- Playing games on the machines in the computer center
- Locking the screen of machines in the computer center
- Sending junk mail to all the users
- Unnecessary downloads from the Internet.
- Giving accounts to other persons, sometimes outsiders.
- Storing pornographic material on the disk.
- Viewing pornographic material on terminals
- Using the network to gain unauthorized access to any computer system.
Security related issues:
- Breaking security of the systems.
- Trying to capture password of other users.
- Damaging/gaining access to the data of other users.