You are on page 1of 3

Student Computer Facilities Rules

1. Introduction
The following regulations apply to all computer facilities at the University of KwaZulu-Natal (UKZN). It is the responsibility of the computer user to know and understand these regulations. A user is defined as a student, staff member or any other person making use of the University's computer facilities. These regulations are intended to safeguard the University's computer resources for your continued benefit as well as to protect the rights of other users. Breach of these regulations will be subject to users being banned from using the facilities, to disciplinary procedures, or to prosecution under South African law. If any aspect of the regulations is not understood, please approach the Lab Consultant or Information & Communication Technology (ICT) division for clarification. The actions of users must be in compliance with the South African law and the rules of the University of KwaZulu-Natal (UKZN).

2.
2.1

General rules
University computer facilities, including printers, may only be used for official University purposes. Private or personal work may not be undertaken without the permission of the Director, ICT. Users may not create a disturbance or interfere with other users. No smoking, eating or drinking is permitted in the computer laboratories. Users shall not litter, cause any mess or leave the laboratories in an untidy state. Users shall obey all reasonable instructions of Lab Consultants.

2.2 2.3 2.4 2.5

3.
3.1 3.2 3.3 3.4

Rights of Use
Users shall only gain access to the computer facilities by producing a UKZN student or staff card, or written authorisation to use the facility. Users shall produce proof of identity at the request of the Lab Consultant or a University official. Users shall not share, distribute or use access identifications or passwords other than those assigned to them. It is the responsibility of the student to logout after using the computer. Any student who either intentionally or negligently fails to logout will be held responsible for whatever purpose the computer is used for whilst being left active.

4.
4.1

Use of Hardware
Users must treat all computer facilities and equipment with due care and consideration. Users must report any misuse of computer facilities or equipment to the Lab Consultant.

4.2

No equipment may be removed from computer facilities or tampered with in any way.

5.
5.1 5.2 5.3 5.4 5.5

Use of Software and Data


Users shall not use any software other than official University software without the authority of the Lab Consultant. Users shall not make use of University computer facilities to access or copy any computer games, pornography, viruses, movies and music for personal use. Users shall not play computer games on University computer facilities unless authorised by a lecturer. Users shall not interfere or tamper with software configurations or any system data files. Users shall respect all copyright and licensing requirements and intellectual property rights. Users shall not copy software or other files from the University computer systems without due permission. Users are responsible for resources under their control. Any file found on a disk in a person's possession will be assumed to be owned by that person unless the contrary can be proven on a balance of probability. Users shall not access or in any way alter other user's files without authorisation.

5.6

5.7

6.
6.1 6.2 6.3

Use of Networks
Users may not attempt to bypass or undermine the system security. Thus the system security must be observed at all times. No software may be loaded, developed or executed on University computers that attempt to alter the network file servers or other equipment. Users may only access those facilities which they have been specifically authorised to use. Users shall not access or attempt to access any other facilities, equipment, systems or data that they are not specifically authorised to. Only material relating to users courses and duties at the University may be downloaded from the Internet. Users shall not send messages using E-mail facilities to an individual or a large number of users that may be considered undesirable or harassment by some or all the Recipients.

6.4 6.5

7.

Consequences of Breach of Rules


Breaching these rules could, apart from possible disciplinary action in terms of the Rules for Student Discipline, result in a variety of departmental penalties, ranging from a verbal warning, at one end of the scale, to removal of the user from the Labs for a period of up to 2 weeks. Commission of a second or subsequent offence under any of these rules can result in a recommendation for a formal student disciplinary procedure. It must be noted that removal from the Labs means that a student cannot continue with his or her computer-related work in a course, which can have a negative impact on his or her academic studies.

8.

Departmental Appeals
Appeals may be put in writing to the ICT Lab Manager, giving full details of the reason for the appeal. Student disciplinary matters are not dealt with by ICT and appeals follow the normal University disciplinary procedures.

9.

Policy Duration

This policy is effective from the underlying date and will be in force until official notice is given to the contrary.

BY ORDER OF THE UNIVERSITY AUTHORITIES

You might also like