AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
5. Harmful Activities:<br />
One must not use one's privileges as a member of the <strong>AUK</strong> comput<strong>in</strong>g community<br />
to cause harm to any <strong>in</strong>dividual or to harm any software or hardware system,<br />
whether <strong>in</strong>ternal or external to <strong>AUK</strong>. Examples of harmful activities, <strong>in</strong> addition to<br />
those noted elsewhere <strong>in</strong> this Code, <strong>in</strong>clude:<br />
� Intentional damage<br />
� Disabl<strong>in</strong>g others' computers<br />
� Compromis<strong>in</strong>g security<br />
� Disabl<strong>in</strong>g or corrupt<strong>in</strong>g software systems<br />
� Destroy<strong>in</strong>g, alter<strong>in</strong>g, or compromis<strong>in</strong>g <strong>in</strong>formation <strong>in</strong>tegrity (e.g., student<br />
records, personnel <strong>in</strong>formation, etc.)<br />
� E-mail spamm<strong>in</strong>g<br />
� Threaten<strong>in</strong>g or <strong>in</strong>timidat<strong>in</strong>g e-mail, newsgroup post<strong>in</strong>gs, or web sites.<br />
� Denial-of-service attacks (e.g., mak<strong>in</strong>g it difficult or impossible for others to<br />
use the network effectively and efficiently).<br />
6. Illegal Activities:<br />
For the protection of the <strong>AUK</strong> comput<strong>in</strong>g community as a whole, it is imperative<br />
that all members refra<strong>in</strong> from any conduct that is illegal. Illegal activities that are<br />
prohibited <strong>in</strong>clude (but are not limited to):<br />
� Copyright <strong>in</strong>fr<strong>in</strong>gement, <strong>in</strong>clud<strong>in</strong>g publish<strong>in</strong>g copyrighted material such as<br />
papers, software, music, musical scores, movies and artistic works. It is<br />
irrelevant whether or not any profit is made from such distribution; the mere<br />
fact of provid<strong>in</strong>g uncontrolled access to such material is illegal.<br />
� Divulg<strong>in</strong>g <strong>in</strong>formation that is confidential or proprietary <strong>in</strong>formation.<br />
� Misrepresentation of one's identity to ga<strong>in</strong> access to systems, software, or<br />
other services to which one does not have authorized access.<br />
IV. <strong>AUK</strong> Rights:<br />
Users should be aware that their use of <strong>AUK</strong>'s comput<strong>in</strong>g and network resources is<br />
not completely private. However, <strong>in</strong> all <strong>AUK</strong> operations discussed <strong>in</strong> the follow<strong>in</strong>g<br />
paragraphs, <strong>in</strong>dividual rights of privacy will be preserved to the fullest extent<br />
possible that is compatible with the nature of the operation. As an <strong>in</strong>stitution, <strong>AUK</strong><br />
reta<strong>in</strong>s the follow<strong>in</strong>g rights with respect to its comput<strong>in</strong>g and network resources:<br />
A. Allocation and Control of Access to Resources:<br />
Those responsible for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g <strong>AUK</strong>'s <strong>in</strong>formation technologies and resources<br />
have the right to allocate resources <strong>in</strong> ways appropriate to the achievement of <strong>AUK</strong>'s<br />
overall mission. They also may control access to its <strong>in</strong>formation and the devices on<br />
which it is stored, manipulated and transmitted <strong>in</strong> accordance with the policies of<br />
the <strong>University</strong>, civil, and crim<strong>in</strong>al law.<br />
B. Usage Monitor<strong>in</strong>g and Inspection of Files:<br />
71 | P a g e