AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
account ma<strong>in</strong>tenance activities for which the password is required.<br />
Similarly, one should not disclose other identify<strong>in</strong>g <strong>in</strong>formation (e.g., PIN<br />
numbers) used to access specific system <strong>in</strong>formation. Authorized users are<br />
held accountable for violations of this Code of Conduct <strong>in</strong>volv<strong>in</strong>g their<br />
accounts.<br />
b. Unauthorized use of resources: One must not allow others to make use of<br />
one's account(s) or network access privileges to ga<strong>in</strong> access to resources to<br />
which they would otherwise be denied.<br />
c. Circumvent<strong>in</strong>g or compromis<strong>in</strong>g security: Users must not utilize any<br />
hardware or software <strong>in</strong> an attempt to compromise the security of any other<br />
system, whether <strong>in</strong>ternal or external to the <strong>AUK</strong> systems and network.<br />
Examples of prohibited activities <strong>in</strong>clude (but are not limited to) Trojan<br />
horses, password crackers, port security probes, network snoopers, IP<br />
spoof<strong>in</strong>g, and the launch<strong>in</strong>g or know<strong>in</strong>g transmission of viruses or worms.<br />
2. Self-Protection:<br />
Any member of the <strong>AUK</strong> community who attaches a computer to the <strong>AUK</strong> network<br />
must take measures to ensure that the computer is protected aga<strong>in</strong>st compromise by<br />
an <strong>in</strong>ternal or external attack. In this context, reasonable measures <strong>in</strong>clude the<br />
<strong>in</strong>stallation and ma<strong>in</strong>tenance of virus detection and eradication software, care <strong>in</strong><br />
open<strong>in</strong>g e-mail message attachments, vigilance when visit<strong>in</strong>g web sites and adher<strong>in</strong>g<br />
to published system configuration and management standards.<br />
3. Commercial Activity:<br />
No member of the <strong>AUK</strong> community may use an <strong>AUK</strong> comput<strong>in</strong>g account or any<br />
communications equipment that is owned or ma<strong>in</strong>ta<strong>in</strong>ed by <strong>AUK</strong> to run a bus<strong>in</strong>ess<br />
or commercial service or to advertise for a commercial organization or endeavor.<br />
Use of <strong>AUK</strong>'s computer systems and networks for the personal promotion of<br />
commercial goods or services is strictly prohibited. <strong>AUK</strong> employees who are<br />
engaged <strong>in</strong> professional consult<strong>in</strong>g for-a-fee relationships may use <strong>AUK</strong>'s comput<strong>in</strong>g<br />
and network resources to correspond with exist<strong>in</strong>g clients, but not to advertise or<br />
promote their consult<strong>in</strong>g practice.<br />
4. Personal Use of <strong>AUK</strong> Resources:<br />
In general, the use of <strong>AUK</strong>'s comput<strong>in</strong>g and network resources to promote<br />
commercially related activities or events that have no direct relationship to <strong>AUK</strong>'s<br />
mission is not permitted. Occasional personal use of these resources, for example, to<br />
promote a s<strong>in</strong>gle fund-rais<strong>in</strong>g event or activity, to sell a used item with<strong>in</strong> the <strong>AUK</strong><br />
community, or to offer <strong>AUK</strong> colleagues the opportunity to rent an apartment may be<br />
permitted.<br />
70 | P a g e