14.01.2013 Views

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

account ma<strong>in</strong>tenance activities for which the password is required.<br />

Similarly, one should not disclose other identify<strong>in</strong>g <strong>in</strong>formation (e.g., PIN<br />

numbers) used to access specific system <strong>in</strong>formation. Authorized users are<br />

held accountable for violations of this Code of Conduct <strong>in</strong>volv<strong>in</strong>g their<br />

accounts.<br />

b. Unauthorized use of resources: One must not allow others to make use of<br />

one's account(s) or network access privileges to ga<strong>in</strong> access to resources to<br />

which they would otherwise be denied.<br />

c. Circumvent<strong>in</strong>g or compromis<strong>in</strong>g security: Users must not utilize any<br />

hardware or software <strong>in</strong> an attempt to compromise the security of any other<br />

system, whether <strong>in</strong>ternal or external to the <strong>AUK</strong> systems and network.<br />

Examples of prohibited activities <strong>in</strong>clude (but are not limited to) Trojan<br />

horses, password crackers, port security probes, network snoopers, IP<br />

spoof<strong>in</strong>g, and the launch<strong>in</strong>g or know<strong>in</strong>g transmission of viruses or worms.<br />

2. Self-Protection:<br />

Any member of the <strong>AUK</strong> community who attaches a computer to the <strong>AUK</strong> network<br />

must take measures to ensure that the computer is protected aga<strong>in</strong>st compromise by<br />

an <strong>in</strong>ternal or external attack. In this context, reasonable measures <strong>in</strong>clude the<br />

<strong>in</strong>stallation and ma<strong>in</strong>tenance of virus detection and eradication software, care <strong>in</strong><br />

open<strong>in</strong>g e-mail message attachments, vigilance when visit<strong>in</strong>g web sites and adher<strong>in</strong>g<br />

to published system configuration and management standards.<br />

3. Commercial Activity:<br />

No member of the <strong>AUK</strong> community may use an <strong>AUK</strong> comput<strong>in</strong>g account or any<br />

communications equipment that is owned or ma<strong>in</strong>ta<strong>in</strong>ed by <strong>AUK</strong> to run a bus<strong>in</strong>ess<br />

or commercial service or to advertise for a commercial organization or endeavor.<br />

Use of <strong>AUK</strong>'s computer systems and networks for the personal promotion of<br />

commercial goods or services is strictly prohibited. <strong>AUK</strong> employees who are<br />

engaged <strong>in</strong> professional consult<strong>in</strong>g for-a-fee relationships may use <strong>AUK</strong>'s comput<strong>in</strong>g<br />

and network resources to correspond with exist<strong>in</strong>g clients, but not to advertise or<br />

promote their consult<strong>in</strong>g practice.<br />

4. Personal Use of <strong>AUK</strong> Resources:<br />

In general, the use of <strong>AUK</strong>'s comput<strong>in</strong>g and network resources to promote<br />

commercially related activities or events that have no direct relationship to <strong>AUK</strong>'s<br />

mission is not permitted. Occasional personal use of these resources, for example, to<br />

promote a s<strong>in</strong>gle fund-rais<strong>in</strong>g event or activity, to sell a used item with<strong>in</strong> the <strong>AUK</strong><br />

community, or to offer <strong>AUK</strong> colleagues the opportunity to rent an apartment may be<br />

permitted.<br />

70 | P a g e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!