Acceptable Use Policy for the Public Network

  1. Rhodes University makes limited Internet access available to some schools, organisations, groups, conference delegates, workshop participants, and other temporary or transient visitors to its campus. This acceptable use policy governs the use of those parts of the University's network that are specifically designated as being for the use of such individuals or groups (the "Public Network"). Acceptance of this policy is a precondition of being granted access to the such networks.
  2. The majority of the University's telecommunications networks, computer laboratories, and other network and computing facilities are governed by a separate, more comprehensive acceptable use policy. Acceptance of the full policy is one of the preconditions of being granted access to such facilities.
  3. Access to the Public Network is limited to properly authorised individuals. Any attempt to gain unauthorised access to this network or any other Rhodes University network will be prosecuted to the full extent of the law.
  4. Any username, password, or other access token that may be allocated to enable access to the Public Network is for the personal and exclusive use of the person or group to whom it is allocated. Divulging, sharing, or otherwise providing a third party with access to the Public Network is prohibited.
  5. Acceptable uses of the Public Network include (and may be limited to):
    1. sending and receiving e-mail from your own e-mail account via POP3, IMAP or SMTP on standard ports (110, 995, 143, 993, 465 and 587).
    2. browsing the web using standard ports (80, 443).
    3. establishing a VPN connection to your home network (using IPSec, L2TP, OpenVPN, L2TP or SSTP).
  6. Unacceptable uses of the Public Network include:
    1. any activity that, intentionally or unintentionally, would violate any law, by-law or regulation of the Republic of South Africa or any other relevant jurisdiction.
    2. sending bulk or mass e-mail of any form, whether solicited or unsolicited.
    3. any activity that, intentionally or unintentionally, results in excessive use of Internet bandwidth or other resources, or the denial of legitimate service to other users.
    4. making any form of network service publicly available.
    5. making use of peer-to-peer file sharing services.
    6. sending an electronic communication where any part of the header information of that communication is forged or otherwise misrepresents the communication.
    7. propagating, or attempting to propagate, whether through action or inaction, any virus, worm, Trojan horse, malware, spyware, or other malicious program or script.
    8. any activity that circumvents, or attempts to circumvent, bona fide network restrictions, user authentication or the security of any host, network or account.
    9. extending or modifying the Public Network in any way (including but not limited to the installation of hubs, switches, routers, wireless access points, or bridges).
    10. any activity that may contravene the acceptable use policies of any of Rhodes University's upstream Internet service providers.
  7. Exceptions to these acceptable and unnacceptable uses must be authorised in advance and in writing by the Director: Information Technology or his/her nominee.
  8. Internet access provided via the Public Network may be throttled, rate-limited, proxied, or subject to other restrictions at the University's sole discretion.
  9. Whilst the University endeavours to respect individuals' right to privacy, it reserves the right to monitor, record, or intercept any communication to, from, or via the Public Network in the event that it has any reason to believe that any part of this policy may have been breached.
  10. The Public Network service is made available as-is and on a best-effort basis. No end-user support whatsoever is available or will be provided by the University.
  11. In no event shall Rhodes University nor any of its representatives be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or loss of use or data) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this service, even if advised of the possibility of such damage.