Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 2

Muhammadan Institute of Computer Science Jhang

Address: Main Gojra Road, Jhang


Ph. # 047-7631200, +923444647504
Email: muhammadaninstitute@gmail.com

Computer Lab Rules and Regulations


1. Computers are available for student use on a first-come, first-serve basis.

2. Lab is only to be used for academic purposes (assigned coursework) or academic research prior to
6:00pm, or when lab is full.

3. Playing GAMES is not permitted in the Lab.

4. Absolutely NO food is permitted in the lab.

5. Please respect your fellow students and keep your noise to an absolute minimum.

6. Cell phones must be on "Silent Mode". No outgoing calls are permitted. Conversations must be taken
out of the lab.

7. Computer abuse/misuse WILL NOT BE TOLERATED. Individuals found abusing computing facilities may
be subject to immediate suspension of computing privileges. Examples of misuse/abuse are, but not
limited to:

a) Illegal copying of copyrighting software, music or videos

b) Unauthorized installation or removal of software or files

c) Tampering with system configuration

d) The unauthorized connection or disconnection of any computer or device to any network outlet,
cable or device other than those that are specifically designated as a student or public network access
points (Public "hardwired" ports are available on the 2nd level)

e) Bypassing or attempting to circumvent security or software metering measures

f) Computer fraud, bullying, or harassment


g) Use of computer or network resources for commercial purposes

h) Activities that unnecessarily use network bandwidth or storage

i) Establishing servers, file sharing services or peer-to-peer file sharing applications

j) Installation or use of unauthorized network or telecommunications devices, including but not limited
to computers, wireless access devices, switches, routers, transceivers, media converters, modems, or
telephones

k) Installation or use of unauthorized network diagnostic, monitoring or eavesdropping equipment,


software or tools including but not limited to, packet capturing software or devices, cable analyzers,
traffic generators or network management tools or software

Violation of the above rules and etiquette guidelines will result in disciplinary action or termination of
privileges.

You might also like