Rules of proper use of the University Gent Belgium) network

Rules of proper use of the UGent network and the computers controlled by DICT

(based on the Dutch version approved by the Computer Commission Agency, 25 August 1994: https://www.ugent.be/nl/univgent/reglementen/voorzieningen/ict/netwerk.htm/)

The translation below is not a stringent one, for legal matters the Dutch version will be the criterion.

General

The intercampus computer network of Ghent University is intended for academic research and education and its supporting activities.
The university network is connected to BELNET, the Belgian research network. An Acceptable Use Policy (AUP) determines what is or what is not allowed on BELNET. This AUP has been described in the base issue of BELNET Info. BELNET for its part is connected to international networks as EUROPAnet and NSFnet, of which each has its own individual AUP.
When one uses the network, one does not only have to reckon with the Rules of proper use of the UGent network but also with the AUP’s of the networks that one makes use of via our network.

Regulations

  1. The Ugent network (UGentNet) should only be used for research and academic activities by members of staff and students of Ghent University. Amongst other things, this implies the following:
    • The university network must not be used for commercial purposes.
    • Excessive usage of the network for personal or recreational purposes is not allowed.
    • It is prohibited to grant access to the network (and thus to BELNET) to any person who is not a member of Ghent University.
  2. A user only has access to the computers connected to the UGent network, BELNET and the Internet, which are either intended for public use  (e.g. an anonymous FTP server) or on which the user has a registered account.
    Amongst other things, this implies the following:

    • It is prohibited to use computers to which no access has been granted, even if these computers have not been secured.
    • Attempts to get non-authorized access to computers connected to UGentNet, BELNET or the Internet are prohibited.
  3. The privacy of other users and the integrity of data must not be endangered.
    Amongst other things, this implies the following:

    • It is not allowed to read other users’ electronic mail.
    • It is prohibited to pose as someone else, an other user, on the network.
    • Network snooping is forbidden.
  4. It is prohibited to prejudice the good functioning of the university network or to hinder other users by loading the network excessively.
    Amongst other things, this implies the following:

    • Activities that generate high network loads (such as backups via the network or large file transfers) are to be performed  outside of usual working hours (e.g. at night or during the weekend).
    • To guarantee a good functioning of the network, the allocation of IP numbers and hostnames is centrally controlled by DICT.  Creating an IP number yourself or connecting a non-registered computer to the network could prevent the network from functioning well  and is not allowed.
  5. For its functioning the network has to rely on limited resources concerning manpower, band width and computers.  Each waste of these limited resources is prohibited. Amongst other things, this implies the following:
    • Subscribing to mailing lists available at UGent via netnews is a waste of system resources and should be avoided.
  6. By using the UGentNet, one commits itself to observing the Rules of proper use of the network of UGent University.

Rules of proper use of the computers controlled by DICT

  1. All computers controlled by DICT are connected to the university network. Users of computers controlled by DICT therefore commit themselves to observing the Rules of proper use of the network of Ghent University.
  2. An account on a computer controlled by DICT is strictly personal. The user is responsible for the account assigned to him/her. Amongst other things, this implies the following:
    • An account can never be lent out to anyone else, not even to a colleague, a secretary or fellow student.
    • An account holder should see to it that his/her account can not be used by others.
      • The password has to be chosen judiciously and has to be kept secret at all times. When one suspects that his/her password is compromised,  it must be altered at once.
      • After using a computer controlled by DICT, one should always log out.
      • When a computer or terminal posted in a public space has been left unattended – even for shorter periods – one should log out or run a locking application.
      • Using an other user’s account is strictly prohibited.
      • It is not allowed to try and retrieve an other user’s password.
    • It is prohibited to prejudice the good functioning of computers controlled by DICT or to hinder other users by loading the network excessively. Amongst other things, this implies the following:
    • Large jobs have to be performed in the background.
    • The file system /tmp is intended for temporary files created by system applications (such as editors, compilers etc.). Extensive use of /tmp for personal use can hinder other users and is therefore prohibited.
    • By accepting an account, one commits oneself to observing the Rules of proper use of the computers controlled by DICT.

Implementation and measures

The Rules of proper use of the network of Ghent University and the Rules of proper use of the computers controlled by DICT will be proclaimed to all faculties and central and rectoral administrations. The rules will be put up on the bulletin board in all PC rooms and in the DICT computer room. To be able to verify the observation of the rules, DICT can – if necessary – demand that a user identifies himself/herself.  At nonobservance of the rules, the Direction ICT can take action. In some cases this may lead to the liquidation of an account or denying access to the university network. Similar incidents will always be reported to the Academic Authority, which then can take further appropriate disciplinary measures.

See also Regulations on ICT and Internet use Leiden University.

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.