Access to modern information technology
is essential to the University mission of providing the students,
faculty, and staff of the AUC with educational services of the highest
quality. The pursuit and achievement of the AUC mission of education,
research, and public service require that the privilege of the use
of computing systems and software, internal and external data networks,
as well as access to the World Wide Web, be made available to all
members of AUC. The preservation of that privilege for the full community
requires that each faculty member, staff member, student, and other
authorized user comply with institutional and external standards for
To assist and ensure such compliance, the University has established
the following policy, which supplements all applicable policies.
In the following, "computing
facility" includes any personal computer, computing or communications
facility owned wholly or partly by AUC; "account" means
any account number, access code, user-ids or authorization code for
a computer or communications facility, together with its associated
passwords and files; "user" means any person using AUC's
computing facilities; and "system administrator" means a
person who has the authority to grant authorization to use computing
II. General Principles:
Authorized use of computing
and network resources owned or operated by AUC shall be consistent
with the education, research, and public service mission of the
AUC, and consistent with this policy.
Authorized users of AUC computing
and network resources include faculty, staff, students, and other
affiliated individuals or organizations authorized by the Provost
or his designee.
This policy applies to all AUC
computing and network resources, including host computer systems,
AUC-sponsored computers and workstations, software, data sets, and
communications networks controlled, administered, or accessed directly
or indirectly by AUC computer resources or services, employees,
The AUC reserves the right to
limit access to its networks when applicable campus or university
policies or codes, contractual obligations, or laws are violated,
but does not monitor or generally restrict the content of material
transported across those networks.
The AUC reserves the right to
remove or limit access to material posted on the university-owned
computers when applicable campus or university policies, codes,
contractual obligations, or laws are violated; it does not however
monitor the content of material posted on university-owned computers.
The AUC does not monitor or
generally restrict material residing on AUC computers housed within
a private domain or on non-AUC computers, whether or not such computers
are attached to campus networks.
The AUC reserves the right,
upon reasonable cause for suspicion, to access all aspects of its
computing systems and networks, including individual login sessions
to determine if a user is violating this policy.
This policy may be supplemented
with additional guidelines by campus units which operate their own
computers or networks, provided such guidelines are consistent with
III. User Responsibility
Privacy: No user should
view, copy, alter or destroy another's personal electronic files without
permission (unless authorized or required to do so by law or regulation).
Copyright: Written permission from the copyright holder is
required to duplicate any copyrighted material. This includes duplication
of audio tapes, videotapes, photographs, illustrations, computer software,
and all other information for educational use or any other purpose.
Most software that resides on AUC computing network(s) is owned by
the University, and is protected by copyright and other laws, together
with licenses and other contractual agreements. Users are required
to respect and abide by the terms and conditions of software use and
redistribution licenses. Such restrictions may include prohibitions
against copying programs or data for use on AUC computing network(s)
or for distribution outside the University. Restrictions also include
the resale of data or programs, or the use of them for non-educational
purposes or for financial gain; and the public disclosure of information
about programs (e.g., source code) without the owner's authorization.
Harassment, Libel and Slander: Under no circumstances, may
any user use AUC computers or networks to libel, slander, or harass
any other person.
Access to Computing Resources:
Accounts: Accounts created
by a system administrator for an individual are for the personal
use of that individual only.
Sharing of access: Computer
accounts, passwords, and other types of authorization are assigned
to individual users and should not be shared with others.
Permitting unauthorized access:
You may not run or otherwise configure software or hardware to
intentionally allow access by unauthorized users.
Termination of access: When
you cease being a member of the campus community (e.g., withdraw,
graduate, or terminate employment, or otherwise leave the university),
or if you are assigned a new position and/or responsibilities
within the University system, your access authorization must be
reviewed. You must not use facilities, accounts, access codes,
privileges or information for which you are not authorized in
your new circumstances.
Circumventing Security: Users
are prohibited from attempting to circumvent or subvert any system's
security measures. Users are prohibited from using any computer
program or device to intercept or decode passwords or similar
access control information.
Breaching Security: Deliberate
attempts to degrade the performance of a computer system or network
or attempts to deprive authorized personnel of resources or access
to any AUC computer or network is prohibited. Breach of security
includes, but is not limited to, the following:
- Creating or propagating
- Password grabbing
- Disk scavenging
- Abuse of Computer Resources: Abuse of AUC computer
resources is prohibited. This abuse includes, but is not limited
to, the following:
Game Playing: Limited
recreational game playing, which is not part of authorized
and assigned research or instructional activity, is acceptable,
but computing and network services are not to be used for
extensive or competitive recreational game playing. Recreational
game players occupying a seat in a public computing facility
must give up the use of the terminal when others who need
to use the facility for academic or research purposes are
Chain Letters: The propagation
of chain letters is considered an unacceptable practice by
AUC and is prohibited.
The establishment of a background process that services incoming
requests from anonymous users for purposes of gaming, chatting
or browsing the Web is prohibited.
A user may not use computing resources for unauthorized monitoring
of electronic communications.
Flooding: Posting a message
to multiple list servers or news groups with the intention
of reaching as many users as possible is prohibited.
Private Commercial Purposes:
The computing resources of AUC shall not be used for personal
or private commercial purposes or for financial gain.
or Campaigning: The use of AUC computers and networks shall
be in accordance with University policy on use of University
facilities for political purposes
on Users' Rights
The issuance of a password or other
means of access is to assure appropriate confidentiality of AUC
files and information and does not guarantee privacy for personal
or improper use of university equipment or facilities.
AUC provides reasonable security against
intrusion and damage to files stored on the central facilities.
AUC also provides some facilities for archiving and retrieving files
specified by users, and for recovering files after accidental loss
of data. However, the AUC is not responsible for unauthorized access
by other users or for loss due to power failure, fire, floods, etc.
AUC makes no warranties with respect to Internet services, and it
specifically assumes no responsibilities for the content of any
advice or information received by a user through the use of AUC's
Users should be aware that AUC computer
systems and networks may be subject to unauthorized access or tampering.
V. Web Policy
The AUC World Wide Web Home Page (http://www.aucegypt.edu)
is an official publication of the AUC. Unless otherwise indicated,
all materials, appearing on the Home Page or subsequent official home
pages of specific departments,including text and photographs, are
copyrighted and should not be reproduced without written permission.
Home pages linked to AUC Home Page may be created by academic departments,
programs, centers or institutes, administrative departments, or recognized
student groups. Individual members of the faculty and staff may create
their own, but must link them through their department's home page.
Individual students may create their own home page. Each student home
page shall include the disclaimer that neither the page contents nor
the link identifiers are monitored, reviewed, or endorsed by AUC.
Violators of this policy will be subject
to the existing student or employee disciplinary procedures of AUC.
Sanctions may include the loss of computing privileges. Illegal acts
involving AUC computing resources may also subject users to prosecution
by Egyptian authorities.
To report violations or request further information, please fill the
incident reporting form or
contact Hussein Moustafa Networking and Systems Security Officer,
to other Policies