Effective as of:
Policy for Publication
Policy Number: Number Not Yet Assigned
The Internet is accessed through proxy servers requiring authorization whenever a user tries to access Internet from a web browser. Proxy servers are connected to fast downlink channels providing fast Internet access. There is a possibility to access the Internet directly however that connection being slow is not recommended. There are three proxy servers: student's, faculty and staff's and AUAC tenants'. Web browsers must be correspondingly set to provide access through a proxy server.
The login name and password for authorization is the same as for network and email.
Users must keep their passwords confidential, as there is danger of abusing Internet by someone knowing the password of the other.
In case of having problems with Internet access an e-mail request must be sent the ICTS ( Request system ).
1.5.2. Available channels
The AUA has two downlink Internet channels. Whenever a channel is down a switching to alternative channel takes place. The switching between channels is done automatically.
During the switching the Internet may be inaccessible for 4-5 min.
1.5.3. Academic freedom
The Internet is an important tool for members of the AUA community to use in exercising their academic freedom. Academic freedom is a core value for the AUA, and the use of or access to the Internet shall not be restricted for any community member who uses it in the pursuit of learning or free exchange of ideas, and who does not commit violations qualifying as Internet abuse.
1.5.4. Violations Qualifying as Internet Abuse
The Internet at the AUA must be used in a manner that is lawful, consistent with the mission of the AUA, consistent with AUA codes of conduct, and that does not compromise the security and effective operation of the network.
Prohibited uses of the Internet include, but are not limited to:
- Use of the Internet in a manner that violates copyright or intellectual property rights. If the AUA determines that such a violation has occurred it may take action under the Actions section below;
- Use of the Internet to disseminate unsolicited, mass distributed e- mail (spam) that is clearly unrelated to the mission of the AUA (e.g. pursuing of academic goals, carrying out of job responsibilities, or otherwise contributing to the healthy life of the AUA);
- Use of the Internet in a fraudulent manner. Such use may include, but is not limited to, the alteration or forging of e-mail headers or someone's digital signature, impersonation of another, or other actions designed to deceive;
- Use of the Internet for commercial purposes;
- Intentionally compromising network security or integrity. Such compromising of security or integrity may include, but is not limited to, attempts to circumvent user authentication; attempts to intercept or interfere with others' use of the network; intentional transmission of virus, worm, Trojan horse, or other code with malicious intent;
- Excessive use of the Internet for non-job -related downloads.
18.104.22.168. Suspension or Termination of Internet and Network Access because of Internet Abuse
Abuse of the Internet could result in Computer Services Office reviewing of user's Internet usage log files in order to determine whether that usage is consistent with the Internet Use Policy. If the usage is found to be inconsistent with that policy, the Internet use may be suspended until the matter is resolved with the Director of Computer Services Office or for up to 10 days suspension if the matter is not resolved. The user is informed about that with an appropriate message. Repeated violations of the Internet Use Policy may result in longer suspensions or termination of Internet access rights.
If it is judged necessary by a supervisor for a user to continue accessing the network in order to perform job or academic functions, the supervisor may require continuation of a user's network privileges.
22.214.171.124. Internet and Network Security Protection Emergency Measures
Computer Services Office is allowed to take immediate action to preserve the security and integrity of the network should an acute threat arise. When such an emergency situation arises, Computer Services Office may suspend service, review log records, and take other actions as judged immediately necessary to protect the network. Great discretion must be observed in taking such measures, but the option is made available under this policy in order to allow Computer Services Office to preserve the network under exceptional circumstances.