Acceptable Use Policy

Preamble

The Acceptable Use Policy (AUP) of the library provides the guiding principles for the use of Information Technology Resources (IT) in it. It is expected that the users of the library make a correct administration of these resources and act in a responsible manner. The proper use of IT resources allows the Institute to achieve a culture of openness, trust and integrity within our digital spaces.

Glossary

  • Information Technology Resource: Any information technology/network equipment, facility or service made available to users.
  • Acceptable Use: generally means respecting the rights of other computer users, the integrity of the
    physical facilities and all pertinent license and contractual agreements.
  • Malware: software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
  • Malicious software: any software that brings harm to a computer system.
  • Unauthorized access: when someone gains access to a website, program, server, service, or other system using someone else’s account or other methods



Policy statement

The library’s IT resources must be used in accordance with applicable licenses and contracts, and in accordance with its intended use in support of the library’s mission. All users must comply with current laws, as well as school policies, when using the library’s IT resources. The following sections define the acceptable uses of the library’s IT resources.

Acceptable uses section

With the exception of incidental personal use, as defined below, the library’s IT resources should be used only to carry out legitimate uses of the Institute (eg, academic activities, academic instruction, research, learning).

Unacceptable uses section

The users of the IT resources of the library are prohibited the following actions:

  • Unauthorized use of IT resources for commercial purposes or personal benefits.
  • Transmission of commercial or personal announcements, requests or promotions.

All users are prohibited from using library’s IT resources in a manner that results in a violation of law or policy or that adversely affects the performance of the network service.

Examples of unacceptable use include, but are not limited to, the following:

  • Activity that violates current laws
  • Activity that violates any school policy.
  • Activities that lead to the destruction or damage of equipment, software or data belonging to others or to the Institute
  • Avoid security controls on the information of the school’s IT resources.
  • Releasing malware
  • Intentionally installing malicious software
  • Prevent or interrupt the legitimate computer activities of others
  • Unauthorized use of accounts, access codes, passwords or identification numbers
  • Unauthorized use of systems and networks.
  • Unauthorized monitoring of communications.

This list is neither complete nor exhaustive. Provide examples of prohibited actions. Any user who has doubts about the acceptable use of the IT resources of the library should contact the corresponding department for more information and assistance.

Violations/sanctions section.

Violations of this policy may result in loss of our scholar system and network usage privileges, and/or disciplinary action (up to and including termination or expulsion) as outlined in applicable school policies.

If user suspects that they are a victim of a violation of this policy, then the violation may be reported directly to the administrator.

Consent or Acceptance form

If you read this AUP, it accepts your content and your order. Ignorance of this policy does not exempt compliance. You can read the full contents of this section in the school’s internal regulations. If you don’t accept this AUP you’re not authorized ti use this IT resources.