Policy on Acceptable Use of Computing and Networking Resources | האוניברסיטה העברית בירושלים | The Hebrew University of Jerusalem
Skip to Hebrew
Skip to English
Skip to Arabic
Skip to Site Map

Policy on Acceptable Use of Computing and Networking Resources

 

The following guidelines are supplementary to the state's laws and University's regulations, and are not intended to cover all aspects of acceptable use (i.e., you cannot assume that "everything not forbidden is allowed").
 
1. Usage of the university *computing and networking resources, including computers, networks, communication equipment, hardware, software and files, shall be subject to the following guidelines and to additional guidelines published from time to time by the Authority for Computation, Communication and Information (Authority for Computation), on its Web site.
 
2. The term "computer" refers to any device capable of performing computations or of being connected to a network. 
 
3. Computers will be used only for academic purposes and for administrative purposes directly related to the employee's assignments within the university. Authorization is required for any usage not related to HUJI assignments. 
 
4. E-mail sent from any university computer is associated with the university; therefore, you should avoid any content that might damage the university or its reputation. 
 
5. The access authorization (passwords and/or OTP cards) is personal and should be kept confidential. You must use your OWN personal code when working on university computers. The personal code may not be shared or transferred to anyone else. 
 
6. It is prohibited to use the university computing and networking resources for any of the following:
  • Private, commercial or political purposes.
  • Running software or files obtained by illegal means or whose use breaches a copyright law or a third party's property rights.
  • Actions/downloads that breach intellectual property, i.e., copyrights, patents or performers rights, for example, by installing Kazaa software.
  • Promoting actions that violate the privacy protection law or violate the criminal law, such as incitement, racism, terror encouragement, libel, sexual harassment or threatening harassment, distribution of pornography, etc.
  • Writing messages with offensive, slandering or harassing content.
  • Gaining unauthorized access to computing or networking resources.
  • Network scanning and any other type of "door knocking". Locating and/or using security holes on computers inside or outside the university.
  • Sending 'junk mail' - email messages that are not of interest to the recipient, commercial information and advertisements, or distribution to a large number of recipients who are not relevant to the subject of the message (spamming).
  • Tapping or monitoring communication lines. This is a criminal offense!
  • Actions which might damage hardware, software or data.
  • Deploying servers that grant services to other users on the university equipment, except those servers authorized by the Authority for Computation.
  • Connecting any device to the university's network without prior permission from the communication team of the Authority for Computation.
  • Connecting communication lines to the university's network. Such connections will be implemented centrally by the Authority for Computation only.

7. Acceptable use of electronic resources licensed by HUJI: Access to electronic resources is governed by license agreements which restrict use to the Hebrew University community. It is the responsibility of each user to ensure that he or she uses these products only for individual, non-commercial use without systematically downloading, distributing, or retaining substantial portions of information. Acceptable use forbids downloading contents of entire issues of a given journal title. The use of software such as scripts, agents, or robots, is prohibited on these resources and on most other public or free government sites, and may result in loss of access to these resources for the entire Hebrew University community.

8. Modems may be installed only if they do not allow incoming calls (except in fax mode). Modems that need to answer incoming calls must be authorized in advance by the Authority for Computation according to Administrative Regulation number 23-001.
 
9. The Authority for Computation conducts checks to locate sources of excessive traffic in the communication network. Users who create excessive traffic will be requested to clarify whether their use of the computing resources complies with section 3 above, and could be subject to the sanctions described in section 12 below. 
 
10. The use of the university computing and networking resources should be in accordance with the law and with the university regulations. 
 
11. A computer connected to the communication network (including connection from home) must comply with minimum-security rules, which include an updated operating system and updated antivirus software. 
 
12. Users will be held responsible for any loss and/or damage caused to the university due to unlawful use. 
 
13. The Director of the Authority for Computation, as a representative of the university, has the right to immediately disable or restrict any account in case of infringement of any of the above guidelines.
 
14. Privacy protection: Access by university staff to information stored in its systems is done according to the law and only when required for systems' regular and proper operation.

 

 
Policy on Acceptable Use of Computing and Networking Resources