Usage Policy

IACS Computing & Wireless Facilities


Policy Guidelines
Purpose : computing facilities are to be provided by IACS and its centres, departments and units in support of the research, teaching, administration and public services according to the mission of the institute.

Users : users of IACS computing facilities are to be limited primarily to IACS's academic and other staff, students and visitors for purposes that conform to the requirements of the item above.
The following items describe general policies for usage and administration of IACS's computing facilities.

Any usage which contravenes local, state and central government laws or violates norms of IACS usage will be treated as misuse. Two specific categories of misuse are listed below. All listed actions and others which effectively amount to the same are considered to be misuse of IACS computing, communications and network facility.

Misuse involving or amounting to attack on any devices, systems and/or networks
Using the network to gain unauthorised access to any computer system.
Tapping phone or network transmissions (e.g. running network sniffers without authorisation).
Knowingly performing an act which will interfere with the normal operation of computers, terminals, peripherals or networks.
Knowingly running, installing and/or giving to another user a program intended to damage or place excessive load on a computer system, network device or network. This includes, but is not limited to, programs known as computer viruses, Trojan horses and worms.
Attempting to circumvent data protection schemes or uncover security loopholes.
Masking the identity of an account or machine.
Releasing a virus, worm or other program that damages or otherwise harms a device, system or network
Using IACS resources for unauthorised purposes (e.g. using personal computers connected to the campus network to set up web servers for commercial or illegal purposes).
Unauthorised access to data or files even if they are not securely protected (e.g. breaking into a system by taking advantage of security holes, or defacing someone else's web page)

Other categories of misuse
Using an account that the user is not authorised to use, or obtaining a password for a computer account without the consent of the account owner.
Providing any assistance to any person to facilitate unauthorised access to one or more files, accounts, computers, network devices or network segments. Deliberately wasting computing resources.
Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing or deleting another user's files or software without explicit agreement of the owner.
Preventing others from accessing services. Use of services and facilities other than academic and official purposes.
Sending forged messages under someone else's name.
Employing a false identity for e-mail or other purposes.
Using email to harass others.
Charging the services availed of by a person to the account of another.

It is MANDATORY for departments deploying wireless network in IACS to implement secured access using one of the methods. Access to network/internet via wireless routers must be using one of the methods.
Wi-Fi Protected Access (WPA) OR Wired Equivalent Protection (WEP)
Media Access Control (MAC) Filtering enabled access

General guidelines to be followed are as below:

The following actions will be taken in case of infractions of the IACS policies: