Professional Documents
Culture Documents
Student Computer Facilities Rules2
Student Computer Facilities Rules2
1. Introduction
any other person making use of the University's computer facilities. These
your continued benefit as well as to protect the rights of other users. Breach of
these regulations will be subject to users being banned from using the facilities,
aspect of the regulations is not understood, please approach the Lab Consultant
The actions of users must be in compliance with the South African law and the
2. General rules
2.1 University computer facilities, including printers, may only be used for official
2.2 Users may not create a disturbance or interfere with other users.
2.4 Users shall not litter, cause any mess or leave the laboratories in an untidy state.
3. Rights of Use
3.1 Users shall only gain access to the computer facilities by producing a UKZN
3.2 Users shall produce proof of identity at the request of the Lab Consultant or a
University official.
3.3 Users shall not share, distribute or use access identifications or passwords other
responsible for whatever purpose the computer is used for whilst being left
active.
4. Use of Hardware
4.1 Users must treat all computer facilities and equipment with due care and
4.2 No equipment may be removed from computer facilities or tampered with in any
way.
5.1 Users shall not use any software other than official University software without
5.2 Users shall not make use of University computer facilities to access or copy any
computer games, pornography, viruses, movies and music for personal use.
5.3 Users shall not play computer games on University computer facilities unless
authorised by a lecturer.
5.4 Users shall not interfere or tamper with software configurations or any system
data files.
5.5 Users shall respect all copyright and licensing requirements and intellectual
property rights. Users shall not copy software or other files from the University
5.6 Users are responsible for resources under their control. Any file found on a disk
5.7 Users shall not access or in any way alter other user's files without authorisation.
6. Use of Networks
6.1 Users may not attempt to bypass or undermine the system security. Thus the
authorised to use. Users shall not access or attempt to access any other facilities,
equipment, systems or data that they are not specifically authorised to.
6.4 Only material relating to users courses and duties at the University may be
6.5 Users shall not send messages using E-mail facilities to an individual or a large
Breaching these rules could, apart from possible disciplinary action in terms of
ranging from a verbal warning, at one end of the scale, to removal of the user
subsequent offence under any of these rules can result in a recommendation for
a formal student disciplinary procedure. It must be noted that removal from the
Labs means that a student cannot continue with his or her computer-related
work in a course, which can have a negative impact on his or her academic
studies.
8. Departmental Appeals
Appeals may be put in writing to the ICS Lab Manager, giving full details of the
reason for the appeal. Student disciplinary matters are not dealt with by ICT and
9. Policy Duration
This policy is effective from the underlying date and will be in force until official notice