Sie sind auf Seite 1von 5

4/10/12

Acceptable Use Policy

APPROVEDACCEPTABLEUSEPOLICYFORINFORMATIONTECHNOLOGY(IT)RESOURCESOFTHEUPSYSTEM

Section1.PolicyStatement
(a)

Computersandnetworksarepowerfultechnologiesforaccessinganddistributinginformationandknowledge.Theyare
strategictechnologiesforthecurrentandfutureneedsoftheUPSYSTEM.

(b)

Fornow,computingfacilitiesandnetworkinfrastructureareacostlyresourceandthusmustbeusedsolelyfor
teaching,learning,research,andotherofficiallysanctionedactivities.Also,sincethesetechnologiesallowindividuals
toaccessandcopyinformationfromremotesources,usersmustrespecttherightsofothers,particularlytotheir
privacyandintellectualproperty.Thereisthereforeaneedforrulesandregulationstoensureequitable,secureand
reliableaccesstotheseresources.Thefollowingregulationswillgoverntheuseofcomputingfacilities,networksand
otherInformationTechnology(IT)resourcesoftheUniversityofthePhilippinesSystem.

(c)

Theseregulationsaimto:
(i)

ensureaninformationinfrastructurethatpromotesthebasicmissionsoftheUPSYSTEMinteaching,learning
andresearch

(ii)

protecttheintegrity,reliability,availability,confidentialityandefficiencyoftheITresourcesoftheUP
SYSTEM

(iii)

establishprocessesforaddressingpolicyviolationsandprovidingsanctionsforviolators

(iv)

emphasizethattheUPSYSTEMshallnotbeliableforanydamagesincurredfromtheuseofITresourcesand
foranyclaimsandsuitsarisingfromtheunauthorizedandirresponsibleuseofthesame

(v)

warnusersthatuseofITresourcesforpartisanpoliticalactivitiesasdefinedinrelevantrulesandregulations
ofthecivilservicecommissionortheuniversityofthePhilippines,orforanyunauthorizedcommercial
purposesisprohibitedand

(vi)

notifyusersoftheexistenceofthisPolicy.

Section2.BasicStandards
(a)

Thesamestandardsandprinciplesofintellectualandacademicfreedomdevelopedforuniversitylibrariesshallbe
appliedtomaterialreceivedfromthenetwork.Thesamestandardsofintellectualandacademicfreedomdeveloped
forfacultyandstudentpublicationintraditionalmediashallbeappliedtopublicationincomputermedia.

(b)

Asconstituentsoftheacademiccommunity,faculty,students,andacademicandnonacademicstaffshouldbefree,
individuallyandcollectively,toexpresstheirviewsonissuesofinstitutionalpolicyandonmattersofgeneralinterest
totheacademicbody.Theconstituentsoftheacademiccommunityshouldhaveclearlydefinedmeanstoparticipate
intheformulationandapplicationofinstitutionalpolicyaffectingacademicandstudentaffairs.Theactionsofthe
constituentsoftheacademiccommunitywithintheareasofitsjurisdictionsshouldbereviewedonlythroughorderly
prescribedprocedures.

Section3.Definitions
(a)

AgreementFormmeansdocumentinwhichtheuserundertakestocomplywiththisPolicy.Theformmaybe
electronic.

(b)

Confidentialinformationmeansdataorinformationwhichonitsfaceisnotintendedforunrestricteddissemination.
Examplesincludestudentrecords,examinationarchives,proprietarytechnicalinformation,disciplinarycaserecords,
administrativerecords,andthelike.

(c)

DocumentwhenusedinthisPolicyshallreferbothtothepaperanditselectronicformat.

(d)

InformationTechnologySystemorITSystemincludescomputers,terminals,printers,networks,modembanks,online
andofflinestoragemediaandrelatedequipment,andsoftware,databasesandotherdatafilesthatareowned,
managed,ormaintainedbyanyunitoftheUniversityofthePhilippines.
ForpurposesofthisPolicy,anyotherequipment,computerunitorexternalnetwork,whenattachedto,orusedto
accessand/orinteractwithanycomponentof,theITSystemmayalsobeconsideredpartoftheITSystem.

(e)

Privatefilesmeansinformationthatauserwouldreasonablyregardasprivate.Examplesincludethecontentsof
electronicmailboxes,privatefilestorageareasofindividualusers,andinformationstoredinotherareasthatarenot
public,evenifnomeasurehasbeentakentoprotectsuchinformation.

(f)

SystemandNetworkAdministratormeansapersondesignatedtomanagetheparticularsystemassignedtoher/him,
tooverseethedaytodayoperationofthesystem,ortopreliminarilydeterminewhoispermittedaccesstoparticular
facilitiesandresourcesoftheITSystem,whetherhiredonatemporary,contractualorpermanentbasis.

(g)

UPSYSTEMmeanstheUniversityofthePhilippinesSystemandallitsconstituentunits.

(h)

Usermeansanyperson,whetherauthorizedornot,whomakesanyuseoftheITSystemoranyofitscomponentsby
anymeansorfromanylocation.

Section4.ScopeAndApplicability
(a)

(b)

GeneralCoverage.
(i)

ThisPolicyappliestoallfacilitieswithintheITSystemandallitsusers.

(ii)

Allusersshouldbeawareoftheseregulations,andshouldrealizethatwhenusingthecomputerswithintheUP
SYSTEM,theyareboundbytheseregulations.Usersmayberequiredtosignaformagreeingtocomplywith
thisPolicy.However,failuretosigntheagreementformwillnotreleaseusersfromcoverageofthisPolicy.

LocalandExternalConditionsofUse.
(i)

IndividualunitswithintheUPSYSTEMmaydefineadditional"conditionsofuse"forcomponentsofthe
ITSystemundertheircontrol.

(ii)

Theseconditionsmustbeconsistentwiththisoverallpolicybutmayprovideadditionaldetail,guidelines,
restrictions,and/orenforcementmechanisms.Theseunitswillberesponsibleforpublishingtheregulationsthey
establishandtheirpoliciesconcerningtheauthorizedandappropriateuseoftheequipmentforwhichtheyare
responsible.CopiesofthesepoliciesshouldbegiventothePresident,VicePresidentforDevelopment,the
IntellectualPropertyOfficeandtheOfficeofLegalServices.

(iii)

Whereuseofexternalnetworksisinvolved,policiesgoverningsuchusewillbeapplicableandmustbeadhered
to.

Section5.GeneralResponsibilities
(a)

GeneralResponsibilitiesofUsers.Ingeneral,usersoftheITSystemmust:
(i)

usetheITSystemonlyforitsintendedpurpose,andrefrainfrommisusingorabusingit

(ii)

maintaintheintegrity,reliability,availability,confidentialityandefficiencyofcomputerbasedinformation
resources

(iii)

refrainfromseekingtogainunauthorizedaccessorexceedauthorizedaccess

(iv)

respectsoftwarecopyrightandlicensesandotherintellectualpropertyrights

(v)

respecttherightsofothercomputerusersand

mail.up.edu.ph/local/files/aup.html

1/5

4/10/12

Acceptable Use Policy

(vi)

(b)

(c)

beawarethatalthoughcomputingandinformationtechnologyprovidersthroughouttheuniversityarecharged
withpreservingtheintegrityandsecurityofresources,securitysometimescanbebreachedthroughactions
beyondtheircontrol.Usersarethereforeurgedtotakeappropriateprecautionssuchassafeguardingtheir
accountandpassword,takingfulladvantageoffilesecuritymechanisms,backingupcriticaldataandpromptly
reportinganymisuseorviolationsofthepolicy.
EverymemberoftheuniversitycommunityhasanobligationtoreportsuspectedviolationsoftheAcceptable
UsePolicyforInformationTechnologyoftheU.P.Systemoranyofitsunits.Reportsshouldbedirectedtothe
systemandnetworkadministrators,Chairs,Deans,ChancellorsorthePresident.

GeneralResponsibilitiesOfSystemAndNetworkAdministrators
(i)

SystemandnetworkadministratorsandprovidersofuniversityInformationTechnologyresourceshavethe
additionalresponsibilityofensuringtheintegrity,confidentiality,andavailabilityoftheresourcestheyare
managing.Personsinthesepositionsaregrantedsignificanttrusttousetheirprivilegesappropriatelyfortheir
intendedpurposeandonlywhenrequiredtomaintainthesystem.Anyprivateinformationseenincarryingout
thesedutiesmustbetreatedinthestrictestconfidence,unlessitrelatestoaviolationorthesecurityofthe
system.

(ii)

Systemandnetworkadministratorsareexpectedtotreatthecontentsofelectronicfilesasprivateand
confidential.Anyinspectionofelectronicfiles,andanyactionbaseduponsuchinspection,willbegovernedby
thisPolicy,otheruniversityrulesandallapplicablelaws.

GeneralResponsibilitiesOfUniversityAdministrators
(i)

Tobeinformedandknowledgeableaboutthesepolicies

(ii)

Toinitiatesystematicprogramstoinformacademicandnonacademicpersonnelofthesepolicies

Section6.AppropriateUse
(a)

AppropriateUse.UsersmayonlyusetheITSystemforitsauthorizedpurposes,whichistosupporttheresearch,
education,clinical,administrativeandotherfunctionsoftheUPSYSTEM.Theparticularpurposesofanyofthe
componentsoftheITSystem,aswellasthenatureandscopeofauthorizedincidentalpersonaluse,mayvary
accordingtothedutiesandresponsibilitiesofauser.

(b)

ProperAuthorization.UsersmayaccessonlythosefacilitiesandcomponentsoftheITSystemthatareconsistentwith
theirauthorizationcomingfromcompetentauthorities.

(c)

SpecificProscriptionsonUse.ThefollowingcategoriesofuseoftheITSystemareconsideredprohibitedand/or
inappropriate:
(i)

(ii)

UsesContraryToLaw
1.

Unlawfuluse.UsersmaynotusetheITSystemforanyactivitythatiscontrarytoanylawor
administrativeruleorregulation,ortoencourageanysuchunlawfulactivity.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneyeartoexpulsionordismissal

2.

Infringementofprotectedmaterial.Usersmustnotinfringeonthecopyrightandotherpropertyrights
coveringsoftware,databasesandallothercopyrightedmaterialsuchastext,images,icons,retrieved
fromorthroughtheITSystem.Theseactsshallinclude,butisnotlimitedto,theunauthorizedcopying,
reproduction,dissemination,distribution,importation,use,removal,alteration,substitution,
modification,storage,unloading,downloading,communication,publicationorbroadcastingofsuch
material.UsersmustproperlyattributeanymaterialtheycopyfromorthroughtheITSystem.Usersare
remindedthattheinfringementofintellectualpropertyrightsbelongingtoothersthroughtheuseof
telecommunicationsnetworksisacriminaloffenseunderSection33(b)oftheElectronicCommerceAct.
Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtoexpulsionordismissal.

3.

Hacking.UsersmaynotusetheITSystemtogainunauthorizedaccessintoorinterferewithanother
computer,system,server,informationorcommunicationsystem,ortoobtainanyaccessinorderto
corrupt,alter,stealordestroyanysuchsystemorinformationwithinsuchsystemortointroduce
viruses.UsersareremindedthatalloftheforegoingactsconstitutethecrimeofHackingunderSection
33(a)oftheElectronicCommerceActandarepunishablebymandatoryimprisonmentand/orafine.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsionordismissal.The
penaltyshallcarrywithitpermanentwithdrawalofallITprivileges.

UsesInconsistentWithThePurposesOfTheUPSystem
1.

Cheating.UsersmaynotusetheITSystemtoengageincheatingoracademicdishonesty.Acts
prohibitedunderthisprovisionincludebutarenotlimitedtothefollowing:
a.

Copyingacomputerfilethatcontainsanotherperson'sworkandsubmittingitforone'sown
credit

b.

Copyingacomputerfilethatcontainsanotherperson'sworkandusingitasamodelforone'sown
work

c.

Collaboratingonawork,sharingthecomputerfilesandsubmittingthesharedfile,ora
modificationthereof,asone'sindividualwork,whentheworkissupposedtobedoneindividually
and

d.

Communicatingwithanotherpersononlineduringtheconductofanexamination.Violatorsshall
sufferapenaltyofsuspensionfornotlessthanonesemester.Studentsfoundguiltyofcheating
shallbebarredformgraduatingwithhonors,eveniftheirweightedaverageiswithinthe
requirementforgraduationwithhonors.

2.

Politicaluse.UsersmaynotusetheITSystemforanypartisanpoliticalactivities.Violatorsshallsuffer
apenaltyrangingfromsuspensionforonemonthtooneyear.

3.

UnauthorizedCommercialuse.
a.

UsersmaynotusetheITSystemforcommercialpurposes,exceptaspermittedunderother
writtenpoliciesoftheUPSYSTEMorwiththewrittenapprovalofacompetentauthority.

b.

Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtooneyearwithfine.If
theviolatorisastudent,thefineshallbeP1,000.00ortheamountequivalenttotheearnings,
whicheverishigher.Iftheviolatorisafacultymemberoranemployee,thefineshallbeonehalf
ofhismonthlysalaryortheamountequivalenttotheearnings,whicheverishigher.

4.

Personaluse.UsersmaynotusetheITSystemforpersonalactivitiesnotrelatedtoappropriate
Universityfunctionsexceptinapurelyincidentalmanner.Violatorsshallsufferapenaltyrangingfrom
suspensionforonemonthtooneyear.

5.

Unauthorizedgamingorentertainment.Usersmaynotplaygamesoruseentertainmentsoftwareonor
throughtheITSystemunlessauthorizedinwritingbycompetentauthorities.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneweektooneyearprovided,thatthepenaltyforhabitual
offenseshallbeexpulsionordismissal.Thepresenceofgamesoftwareoranypartthereofmaybe
presumptiveevidenceofunauthorizedgamingorentertainment.

6.

UsecontrarytoUniversitypolicyorcontract.UsersmaynotusetheITSysteminviolationofother
policiesoftheUniversity,orinanymannerinconsistentwiththecontractualobligationsofthe
University.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyearinaddition
tothepenaltyoftheoffensefacilitatedthroughITnetwork.

mail.up.edu.ph/local/files/aup.html

2/5

4/10/12

Acceptable Use Policy

(iii)

(iv)

UsesThatDamageTheIntegrity,Reliability,ConfidentialityAndEfficiencyOfTheITSystem
1.

Softwareandhardwareinstallationandremoval.Unlessproperlyauthorized,usersmaynotdestroy,
remove,modifyorinstallanycomputerequipment,peripheral,operatingsystem,diskpartition,
software,database,orothercomponentoftheITSystemorconnectanycomputerunitorexternal
networktotheITSystem.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthto
expulsion.

2.

Unauthorizedordestructiveprograms.Unlessproperlyauthorizedandpartofher/hisadministrativeor
academicduties,usersmaynotdeveloporuseprogramsontheITSystemthatmayorareintendedto:
interferewiththeabilityoftheUPSYSTEMtoenforcethesepolicies

b.

damageanysoftwareorhardwarecomponentofthesystem

c.

modifynormallyprotectedorrestrictedportionsofthesystemoruseraccounts

d.

accessprivateorrestrictedportionsofthesystemor

e.

interferewithordisruptothercomputerusers.Violatorsshallsufferapenaltyrangingfrom
suspensionforoneyeartoexpulsion.

3.

Destructiveacts.Usersmaynotattempttocrash,tieup,ordenyanyserviceon,theITSystem.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsion.

4.

Unauthorizedaccess.Usersmaynotattempttogainunauthorizedaccess,exceedauthorizedaccess,or
enableunauthorizedaccesstotheITSystem,ortoothernetworksorsystemsofwhichtheITSystemis
apart.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtooneyear.

5.

Passwordprotection.Auserwhohasbeenauthorizedtouseapasswordprotectedaccountmaynot
disclosesuchpasswordorotherwisemakestheaccountavailabletootherswithoutpermissionofthe
systemadministrator.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyear.

6.

Concealingaccess.Usersmaynotconceal,delete,ormodifyinformationorrecordspertainingtoaccess
totheITSystematthetimeofaccess,oraltersystemlogsaftersuchaccessforthepurposeof
concealingidentityortohideunauthorizeduse.Usersmaynotconcealtheirownidentityormasquerade
asotheruserswhenaccessing,sending,receiving,processingorstoringthroughorontheITSystem.
Violatorsshallsufferapenaltyrangingfromsuspensionforoneyeartoexpulsion.

7.

Prohibitedmaterial.Usersmaynotpublish(onmailinglists,bulletinboards,andtheWorldWideWeb)
ordisseminateprohibitedmaterialsover,orstoresuchinformationon,theITSystem.Prohibited
materialsunderthisprovisionincludebutarenotlimitedtothefollowing:
a.

Anycollectionofpasswords,personalidentificationnumbers(PINs),privatedigitalcertificates,
creditcardnumbers,orothersecureidentificationinformation

b.

Anymaterialthatenablesotherstogainunauthorizedaccesstoacomputersystem.Thismay
includeinstructionsforgainingsuchaccess,computercode,orotherdevices.Thiswould
effectivelyprecludedisplayingitemssuchas'HackersGuides',etc.

c.

Anymaterialthatpermitsanunauthorizeduser,whohasgainedaccesstoasystem,tocarryout
anymodificationofthecomputerprogramsordatastoredinthesystemand

d.

Anymaterialthatincitesorencouragesotherstocarryoutunauthorizedaccesstoormodification
ofacomputersystem.Violatorsshallsufferapenaltyrangingfromsuspensionforoneyearto
expulsion.

UsesThatEncroachOnTheRightsOfTheUsers
1.

2.

3.

(v)

a.

Wastefulanddestructivepractices.Usersmaynotencroachonothers'accessanduseoftheITSystem
throughwastefulanddestructivepracticessuchasbutnotlimitedtothefollowing:
a.

Sendingchainlettersorexcessivemessagesincludingspamming,eitherlocallyoroffcampus
violatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonthspamming,
includestheactof(1)repeatedcrosspostingthesamemessagetoasmanynewsgroupsor
mailinglistsaspossible,whetherornotthemessageisgermanetothestatedtopicofthe
newsgroupsormailingliststargeted,(2)maliciouslysendingoutofunsolicitedemailinbulk,or
(3)sendinglargeunwantedorunnecessaryfilestoasingleemailaddress.

b.

Printingexcesscopiesofdocuments,files,data,orprogramsviolatorsshallsufferapenalty
rangingfromsuspensionforoneweektoonemonth

c.

Runninggrosslyinefficientprogramswhenefficientalternativesareknownbytheusertobe
availableviolatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonth

d.

Usingmorethanonecomputerterminalatatime,unlessspecificallyauthorizedbycompetent
authority.Facultymemberswhosedutiesrequiretheuseofmorethanonecomputershallbe
exempted.Violatorsshallsufferapenaltyrangingfromsuspensionforoneweektooneyear

e.

Lockingpublicaccesscomputersusingscreensaversorotherwise,unlessspecificallyauthorized
bycompetentauthorityviolatorsshallsufferapenaltyrangingfromsuspensionforoneweekto
onemonth

f.

Notloggingoutofthesystemtoallowotheruserstomakeuseofthepublicaccesscomputer
violatorsshallsufferapenaltyrangingfromsuspensionforoneweektoonemonthand

g.

UsingaservicewhichhasbeenidentifiedbytheSystemAdministratorascausinganexcessive
amountoftrafficontheITSystemoritsexternalnetworklinksviolatorsshallsufferapenalty
rangingfromsuspensionforoneweektooneyear.

Offensivematerial.
a.

UsersmaynotusethefacilitiesoftheITSystemtoproduce,disseminate,ordisplaymaterial
thatcouldbeconsideredoffensive,pornographic,raciallyabusive,orlibelousinnature.

b.

Usersmaynotuseelectroniccommunicationfacilities(suchasmail,chat,orsystemswithsimilar
functions)tosendmessageswhicharefraudulent,maliciouslyharassing,obscene,threatening,or
inviolationoflaws,administrativerulesandregulations,orotherpoliciesoftheUniversity
Systemoritsconstituentuniversities(CU).Violatorsshallsufferapenaltyrangingfrom
suspensionforonemonthtoexpulsionordismissal.

Inappropriatemessages.Usersmaynotsendtoamailinglist,includinglocalornetworknewsgroups
andbulletinboards,anyunsolicitedmaterialinconsistentwiththelist'spurpose.Usersofanelectronic
mailinglistareresponsiblefordeterminingthepurposeofthelistbeforesendingmessagestoor
receivingmessagesfromthelist.Subscriberstoanelectronicmailinglistaredeemedtohavesolicited
anymaterialdeliveredbythelistthatisconsistentwiththelist'spurpose.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneweektoonemonth.

UseswhichViolatePrivacy
1.

Confidentialinformation.
a.

mail.up.edu.ph/local/files/aup.html

Unlessproperlyauthorized,usersmaynotattempttogainaccesstoarchivesorsystemsthat
contain,process,ortransmitconfidentialinformation.Authorizedusersmaynotexceedtheir
approvedlevelsofaccess,norshouldtheydiscloseconfidentialinformationtoothers.
3/5

4/10/12

Acceptable Use Policy

b.

Usersshalltreatasconfidentialsuchinformationwhichmaybecomeavailabletothemthrough
theuseoftheITSystem,whetherintentionallyoraccidentally.Usersmaynotcopy,modify,
disseminate,orusesuchinformation,eitherinwholeorinpart,withoutthepermissionofthe
personorbodyentitledtogiveit.Violatorsshallsufferapenaltyrangingfromsuspensionforone
yeartoexpulsionordismissal.

2.

Encryptedinformation.Usersshallconsiderasconfidentialallencryptedinformation.Thisincludesbutis
notlimitedtopasswords,digitalkeysandsignatures.Usersmaynotdecrypt,attempttodecrypt,or
enableotherstodecryptsuchinformationiftheyarenottheintendedrecipient.Violatorsshallsuffera
penaltyrangingfromsuspensionforoneyeartoexpulsionordismissal.

3.

Informationbelongingtoothers.Usersmaynotintentionallyseekorprovideinformationon,obtain
copiesof,ormodifyfiles,programs,orpasswordsbelongingtootherusers,withoutthepermissionof
thoseotherusers.Violatorsshallsufferapenaltyrangingfromsuspensionforonemonthtoexpulsionor
dismissal.

4.

Wiretapping,trafficcaptureandsnooping.Unlessproperlyauthorized,usersmaynotrerouteorcapture
datatransmittedovertheITSystem.Violatorsshallsufferapenaltyrangingfromsuspensionforone
yeartoexpulsionordismissal.

vi

Inadditiontothepenaltiesprovided,allITprivilegesoftheoffendermaybesuspendedforamaximumofthe
periodofthepenalty.Iftheviolationamountstoapenaltypunishablebyexpulsionordismissal,ITprivileges
mayberevokedpermanently.

vii

repeatedviolationsofanyoftheactsproscribedunderthispolicyshallbeconsideredasgrossmisconduct.

Section7.ToleratedUse
Fromtimetotime,theUPSYSTEMoritsconstituentuniversitiesmayissuealistclassifyingcertaintypesofuseunderthe
categoryoftolerateduse.ThislistshallformpartofthisPolicyandwillbeconsideredbindingonallusers.Usersshould
consulttheirsystemandnetworkadministratorsiftheyarenotsurewhetheracertaintypeofuseisconsideredallowed,
tolerated,unacceptableorprohibited.
Section8.EnforcementProcedures
(a)

Monitoring.TheUPSYSTEMoritsconstituentuniversitiesmaymonitoralluseoftheITSystematalltimesasmay
benecessaryforitspropermanagement.ActivitiesontheITSystemmaybeautomaticallyand/orcontinuously
logged.Systemandnetworkadministratorsmayexaminetheselogsanytime.Alllogsshallbeconsidered
confidential.

(b)

AccesstoPrivateFiles.TheUPSYSTEMmayaccessallaspectsoftheITSystem,includingprivatefiles,withoutthe
consentoftheuser,inthefollowinginstances:
(i)

Whennecessarytoidentifyordiagnosesystemsorsecurityvulnerabilitiesandproblems,orotherwisepreserve
theintegrity,reliability,availability,confidentialityandefficiencyoftheITSystem

(ii)

WhensuchaccesstotheITSystemisrequiredtocarryoutessentialbusinessfunctionsoftheUPSYSTEM

(iii)

WhennecessarytoavoiddisreputetotheUPSYSTEM

(iv)

WhentherearereasonablegroundstobelievethataviolationoflaworasignificantbreachofthisPolicyor
anyotherpolicyoftheUPSYSTEMmayhavetakenplace,andthataccessandinspectionmayproduce
evidencerelatedtothemisconduct

(v)

Whenrequiredbylaworadministrativerulesorcourtorderor

(vi)

Whenrequiredtopreservepublichealthandsafety.TheUPSYSTEMwillaccessprivatefileswithoutthe
consentoftheuseronlywiththeapprovaloftheChancellorexceptwhenanemergencyentryisnecessaryto
preservetheintegrity,reliability,availability,confidentialityandefficiencyoftheITSystemortopreserve
publichealthandsafety.TheUPSYSTEMthroughthesystemandnetworkadministratorswilldocumentall
instancesofaccesswithoutconsent.

(c)

ReportingProblemsandmisuse.Usersmustreporttotheappropriatesystemadministratorsanydefectsdiscoveredin
systemaccountingorsystemsecurity,allknownorsuspectedabuseormisuseoftheITSystem,andespeciallyany
damagetoorproblemswiththeirfacilitiesorfiles.

(d)

UserCooperation.Users,whenrequested,areexpectedtocooperatewithUPSYSTEMinanyinvestigationofIT
systemabuse.

(e)

GuidelinesforImmediateAction.

(f)

(i)

Notification.Whenanysystemadministratorormemberofthefacultyorstaffhaspersuasiveevidenceof
abuseormisuseoftheITSystem,andifthatevidencepointstotheactivitiesorthefilesofanindividual,he
orsheshall,within24hoursofthediscoveryofthepossiblemisuse,notifytheChancellororhis/herduly
designatedauthority.

(ii)

Suspension.Insuchcases,thesystemadministratormaytemporarilysuspendorrestricttheuser'saccess
privilegesforaperiodnotexceeding72hours.Ausermayappealsuchsuspensionorrestrictionandpetition
forimmediatereinstatementofprivilegesthroughtheChancellororhis/herdulydesignatedauthority.The
Chancellormayextendthesuspensionforthirty(30)days.

(iii)

Removal.Inaddition,insuchcases,thesystemadministratormayimmediatelyremoveoruninstallfromthe
ITSystemanymaterial,softwareorhardwarewhichposesanimmediatethreattotheintegrity,reliability,
availability,confidentialityandefficiencyoftheITSystemoranyofitscomponentsoriftheusemightbe
contrarytothisPolicy.Theusershallbenotifiedoftheactiontaken.Ausermayappealsuchremovaland
petitionforreinstatementofthematerialwithinfifteen(15)daysfromremoval.

Investigation.Theinvestigationandprosecutionofacademicandadministrativepersonnelandstudentsshallbein
accordancewiththeregulationsoftheUPSYSTEM.Theinvestigatingcommittee,bodyortribunalmusthaveatleast
onememberknowledgeableaboutIT.Theactionstheproperofficermayundertakeincludebutarenotlimitedtothe
following:
(i)

Extendthesuspensionorrestrictionofauser'sprivilegesforthedurationoftheinvestigation,orasmaybe
deemednecessarytopreserveevidenceandprotectthesystemanditsusers

(ii)

Callandinterviewpotentialwitnessesand

(iii)

Summonthesubjectofthecomplainttoprovideinformation.

(g)

FilingofCriminalCharges.Incaseswherethereisevidenceofseriousmisconductorpossiblecriminalactivity,the
Chancellorshallfiletheappropriatecriminalchargeswiththepropercourts.Whereproceedingshavebeeninstituted
againstauserforviolationofthisPolicy,theChancellormayindefinitelysuspendorrestricttheuser'saccess
privilegesforthedurationofsuchproceedings.

(h)

CumulativeRemedies.TheproceduresunderthisPolicyshallnotexcludeanyotherremedyavailabletoanyinjuredor
interestedpartyunderanyrelevantlaw,administrativeruleorregulation,orotherpolicyoftheUPSYSTEM.

(i)

ExternalLegalProcesses.TheUPSYSTEMshallcomplywithanylawfulordertoprovideelectronicorotherrecordsor
otherinformationrelatedtothoserecordsorrelatingtouseoftheITSystemwhichmayresultfromcoercive
processesinadministrativeinvestigations,orjudicialactionsorproceedings.

Section9.Waiver
(a)

LossofData.Usersrecognizethatsystemsandnetworksareimperfectandwaiveanyclaimforlostworkortime

mail.up.edu.ph/local/files/aup.html

4/5

4/10/12

Acceptable Use Policy

thatmayarisefromtheuseoftheITSystem.TheUPSYSTEMshallnotbeliablefordegradationorlossofpersonal
data,software,orhardwareasaresultoftheiruseoftheITSystem.
(b)

Authorization.UsersrecognizethattheUPSYSTEMprovidesaccesstotheITSystemonlyasaprivilegeandnota
rightthattheyhavenorighttouseitforanypurposeotherthanthosedirectlyconnectedwiththeworkoftheUP
SYSTEMandthattheUPSYSTEMmaytakewhatevermeasuresitdeemsnecessarytoenforcethis.Userstherefore
waiveanyactiontheymayhaveagainsttheUPSYSTEMunderanylaworadministrativeruleorregulationforanyact
theUPSYSTEMundertakesunderthisPolicy,specificallyincluding,butnotlimitedto,thoseactsenumeratedunder
Section7hereof.

mail.up.edu.ph/local/files/aup.html

5/5

Das könnte Ihnen auch gefallen