Home

Guidelines to Network Users

This policy is meant for all users of IIT (BHU) Network and it outlines the responsible use of the Computers and Network Infrastructure at IIT (BHU), Varanasi.


The use of the Internet connection and network resources is a privilege afforded to IIT (BHU) faculty, staff and students. It is not a right. Institute is committed to providing a stable computing environment to its students, faculty, and staff. In the unlikely event of an actual loss or corruption of data stored on a college system, the college and associated employees cannot be held financially responsible.


Statement of Policy


All users of IIT (BHU), Varanasi will be subject to the following Acceptable Use Policy

1.   [Content] I shall be responsible for all use of this network. In case I own a computer and decide to connect it to IIT (BHU) network, I will be responsible for all the content on it, especially that which I make available to other users. (This provision will also apply to any computer or device for which I am responsible). In case I do not own a computer but am provided some IT resources by IIT (BHU), I will be held responsible for the content stored in the designated workspace allotted to me (examples: file storage area, web pages, stored/archived emails, on Department machines).


2.    [Network] I will be held responsible for all the network traffic generated by “my computer”. I understand that network capacity is a limited, shared resource. I agree that physically tampering with network connections/equipments, sending disruptive signals, or making EXCESSIVE USE of network resources is strictly prohibited. Repeated offenses of this type could result in permanent disconnection of network services. I shall not share the network connection beyond my own use and will not act as a forwarder/ masquerader for anyone else.


3.     [Academic Use] I understand that the network infrastructure at IIT (BHU) is for academic use and I shall not use it for any commercial purpose or to host data services for other people or groups. Also, I shall not host or broadcast information that might harm others or may be otherwise considered objectionable or illegal as per Indian law (IT Act 2000, Govt. of India).


4.    [Identity] I shall not attempt to deceive others about my identity in electronic communications or network traffic. I will also not use IIT (BHU) IT resources to threaten, intimidate, or harass others.


5.    [Privacy] I will not intrude on privacy of anyone. In particular I will not try to access computers (hacking), accounts, files, or information belonging to others without their knowledge and explicit consent.


6.    [Monitoring] I understand that the IT resources provided to me are subject to monitoring, with cause, as determined through consultation with the IIT (BHU) administration, when applicable. The monitoring may include aggregate bandwidth usage to effectively manage limited IT resources as well as monitoring traffic content in response to a legal or law enforcement request to do so. I authorize IIT (BHU) administration to perform network vulnerability and port scans on my systems, as needed, for protecting the overall integrity and efficiency of IIT (BHU) network.


7.    [Viruses] I shall maintain my computer on this network with current virus detection software and current updates of my operating system, and I shall attempt to keep my computer free from viruses, worms, trojans, and other similar programs.


8.    [File Sharing] I shall not use the IT infrastructure to engage in any form of illegal file sharing (examples: copyrighted material, obscene material). In particular, I have noted the following:


Electronic resources such as e-journals, e-books, databases, etc. made available by the Central Library, IIT (BHU) are for academic use. These resources can be searched, browsed, and material may be downloaded and printed as single copies of articles as is done in the case of printed library material. Use of robots, spiders or intelligent agents to access, search and/or systematically download from the e-resources is also prohibited. Any violation of this policy will result in penal action as per the rules and regulations of the Institute.


9.    [Security] I understand that I will not take any steps that endanger the security of the IIT (BHU) network. Specifically, I will not attempt to bypass firewalls and access rules in place. This includes not setting up servers of any kind (examples: web, mail, proxy) that are visible to the world outside the IIT (BHU) campus. In critical situations, IIT (BHU) authorities reserve the right to disconnect any device or disable any account if it believed that either is involved in compromising the information security of IIT (BHU).


10. [Penalties] I understand that any use of IT infrastructure at IIT (BHU) that constitutes a violation of IIT (BHU) Regulations could result in administrative or disciplinary procedures.

                                                                                                                                                                                                                                                                                                 ^Top


  *Last updated on 07 August 2014