Net Usage Policy

This constitutes a DLSU System-wide policy for the management of computer data networks and the resources they make available, as well as stand-alone computers that are owned and administered by the System. The policy reflects the ethical principles of the System community and indicates, in general, what privileges and responsibilities are characteristic of the System computing environment. Because some networks may operate in environments in which specific items in this policy do not apply, system administrators are free to create policies that are at variance to this one, as long as the principles related to legal use and System mission are preserved. In such cases, it is the responsibility of the system administrators to make relevant variances known to their users.


Definitions

System: The De La Salle University System network (DLSUnet) is a connection of networks of the member institutions of the De La Salle University System(referred here as System) and affiliated institutions.

Network member: A System member or affiliated institution connected to the DLSUnet is referred here as a network member.

The DLSU Information Technology Services Office (ITS) is responsible for the connection of the System members and affiliated institutions to DLSUnet and for DLSUnet to Internet.

System Administrator: A system administrator is a person or group who has system privileges and is responsible for the operation and security of one or more networked computing resources as determined by the network member.

User: A user is a person who is given exclusive access by the network member to an account on a computer system of the network member. When the phrase "your account" is used, this pertains to the account described above. The network member owns all accounts on its computer systems. A user should only use his/her account for the purposes which it has been issued.

Password: A password is an access code which must be a combination of letters and numbers. Each user is responsible for using a good password. A poor password is one that is found in the dictionary or one that is easily related to the user (e.g., name, nickname, birthday, address, favorite food, and the like). A user must not write his/her password on a sheet of paper, notebook, electronic organizer, and the like.

Purpose

The DLSUnet aims to contribute to the realization of the DLSU Mission-Vision Statement and for the access to Internet to contribute broadly to educational, research, and economic development in the Philippines.

Acceptable Use

This represents a guide to the acceptable use of DLSUnet. Any network member - in order to use the network or any other networks which are used as a result of their DLSUnet connection - must comply with this policy and the stated purposes and Acceptable Use Policies of any other networks or hosts used.Each network member is responsible for the activity of its users and for ensuring that its users are familiar with the DLSUnet Acceptable Use Policy or an equivalent policy. In addition, it is expected that each member will maintain and enforce its own Acceptable Use Policy. At a minimum, the System expects such policy will include:


  • To respect the privacy of other users.
  • For example, users shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to other users, or represent themselves as another user unless explicitly authorized to do so by that user.
  • To respect the legal protection provided by copyright and license to programs and data.
  • To respect the integrity of computing systems.
  • For example, users shall not intentionally develop programs that harass other users; infiltrate a computer or computing system; send bogus aliases/messages via electronic mail, newsgroups, or any Internet service; and/or damage or alter the software components of a computer or computing system.
  • Use by member institutions as a laboratory for research and experimentation in computer communications, where such use does not interfere with production usage. However, any experimental use requiring modification to router software or protocol layers below ISO layer 4 requires prior review by ITS.

Policies and Guidelines

The following policies and guidelines will be applied to determine whether or not a particular use of DLSUnet is appropriate:


  • The intent of this policy is to make clear certain uses which are consistent with the purposes of DLSUnet, not to exhaustively enumerate all such possible uses.
  • The System may at any time make determinations that particular uses are or are not consistent with the purposes of DLSUnet.
  • Computing resource users are encouraged to practice cooperative computing.
    For example:
    • Regular deletion of unneeded files from one's accounts on shared computing resources
    • Refraining from overuse of connect time, information storage space, printing facilities, or processing capacity
    • Refraining from overuse of interactive network utilities
    • Refraining from use of sounds and visuals which might be disruptive to others
    • Refraining from use of any computing resource in an irresponsible manner
    • Refraining from unauthorized use of departmental or individual computing resources, such as a personal or departmental laser printer or modem.
  • Malicious use is not acceptable. Use should be consistent with the ethical standards accepted by the University community. DLSUnet may not be used in ways that violate applicable laws or regulations. Use of DLSUnet and any attached network in a manner that precludes or significantly hampers its use by others is not allowed. Examples of unacceptable use include, but are not limited to, the following:
    • Accessing or attempting to access the password of an account that does not belong to you
    • Harassment of other users
    • Libeling or slandering other users
    • Destruction of or damage to equipment, software, or data belonging to the University or other users
    • Disruption or unauthorized monitoring of electronic communications
    • Unauthorized copying of copyright-protected material.
    • Violation of computer system security
    • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others
    • Use of bogus aliases
    • Use of DLSUnet and Internet services to send information repeatedly (e.g., posting an article in numerous newsgroups; sending electronic mail to several users and/or mailing lists)
    • Use of DLSUnet and Internet services to send or attempt to send information forming a chain, pyramid, or similar scheme or artifice
    • Use of computer communications facilities in ways that unnecessarily impeded the computing activities of others (such as randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, and so forth)
    • Academic dishonesty (plagiarism, cheating, et al)
    • Violation of software license agreements
    • Violation of another user's privacy
  • Connections which create routing patterns that are inconsistent with the effective and shared use of the network may not be established.
  • Unsolicited advertising is not acceptable. Advertising is permitted on some mailing lists and news groups if the mailing list or news group explicitly allows advertising. Announcements of new products or services are acceptable.
  • Faculty, staff, and students may use them only for purposes related to their studies, their responsibilities for providing instruction, the discharge of their duties as employees, their official business with the University, and other University-sanctioned activities. The use of University computing resources for commercial purposes is permitted only by special arrangement with the appropriate University official or as defined in existing University policies.
  • Use of the network for recreational games is not acceptable when such use places a heavy load on scarce resources (e.g., dial-up phone lines).

Security

The System assumes that users are aware that electronic files are not necessarily secure. Users will be informed of methods available for protecting information on DLSUnet from loss, tampering, unauthorized search, or other access. Levels of obtainable security will vary depending on the computer system. Information on procedures appropriate to each resource will be available from the DLSU ITS.

Confidentiality

In general, the System will treat information stored on computers as confidential (whether or not that information is protected by the computer operating system). Requests for disclosure of information will be honored only under one of the following conditions:


  • when approved by the DLSU-Manila Operations Council;
  • when authorized by the owners of the information;
  • when required by the Philippine law.

Except when inappropriate, computer users will receive prior notice of such disclosures. (Viewing of information in the course of normal system maintenance does not constitute disclosure.)

Warning

Users of electronic mail systems should be aware that electronic mail in its present form cannot be secured and is, therefore, extremely vulnerable to unauthorized access and modification. Users must take caution in sending information via DLSUnet and Internet.

Responsibility of Users

The user is responsible for correct and sufficient use of the tools available for maintaining the security of information stored on each computer system. The following precautions are strongly recommended:


  • Computer accounts, passwords and other types of authorization that are assigned to individual users should not be shared with others.
  • The user should assign an obscure account password and change it frequently.
  • The user should understand the level of protection each computer system automatically applies to files and supplement it, if necessary, for sensitive information.
  • The microcomputer user should be aware of computer viruses and other destructive computer programs, and take steps to avoid being a victim or unwitting distributor of these processes.

Ultimate responsibility for resolution of problems related to the invasion of the user's privacy or loss of data rests with the user. However, a reasonable effort will be made to lessen the impact of such loss or damage.

Account Expiration

Access to the network, especially to the My.LaSalle (MLS) account, will be discontinued only if an old student, in both the undergraduate and graduate levels, does not pay within week 2 day 6 of the term. The student may reactivate the expired account online after payment.

Remedial Actions

When ITS learns of possible inappropriate use, ITS staff will notify the member responsible, which must take immediate remedial action and inform ITS of its action. In an emergency, in order to prevent further possible unauthorized activity, ITS may temporarily disconnect that member from DLSUnet. If this is deemed necessary by ITS staff, every effort will be made to inform the member prior to disconnection, and every effort will be made to re-establish the connection as soon as it is mutually deemed safe.Violators of this policy will be subject to the normal disciplinary procedures of the University and, in addition, the loss of computing privileges may result. Violations of the policies described above for legal and ethical use of DLSUnet will be dealt with in a serious and appropriate manner. Illegal acts involving DLSUnet may also be subject to prosecution by the proper authorities.Any determination of non-acceptable usage serious enough to require disconnection shall be promptly communicated t o every representative of the DLSUnet member through an established means of publication.

Disclaimer

As part of the services available through DLSUnet, the System provides access to a large number of conferences, lists, bulletin boards, and information servers. Some of these may contain objectionable material.For those facilities for which the System has control, the policies described here apply.The System takes no responsibility for the content of those entities over which it has no control. Please be aware of the potentially offensive material found in those archives and use the system with the recognition that the System neither assumes responsibility for, nor endorses, any of the content found therein.

Use of This Document

This document may be used or copied without alteration for information dissemination. It may also be copied or modified to formulate an acceptable use policy for another institution.