Acceptable Use Policy for the Public Network
-
Rhodes University makes limited Internet access available
to some schools, organisations, groups, conference
delegates, workshop participants, and other temporary or
transient visitors to its campus. This acceptable use
policy governs the use of those parts of the University's
network that are specifically designated as being for the
use of such individuals or groups (the "Public Network").
Acceptance of this policy is a precondition of being
granted access to the such networks.
-
The majority of the University's telecommunications
networks, computer laboratories, and other network and
computing facilities are governed by a separate, more
comprehensive acceptable use policy.
Acceptance of the full policy is one of
the preconditions of being granted access to such
facilities.
-
Access to the Public Network is limited to properly
authorised individuals. Any attempt to gain unauthorised
access to this network or any other Rhodes University
network will be prosecuted to the full extent of the law.
-
Any username, password, or other access token that may be
allocated to enable access to the Public Network is for
the personal and exclusive use of the person or group to
whom it is allocated. Divulging, sharing, or otherwise
providing a third party with access to the Public Network
is prohibited.
-
Acceptable uses of the Public Network
include (and may be limited to):
-
sending and receiving e-mail from your own e-mail
account via POP3, IMAP or SMTP on standard ports
(110, 995, 143, 993, 465 and 587).
-
browsing the web using standard ports (80, 443).
-
establishing a VPN connection to your home network (using IPSec, L2TP, OpenVPN, L2TP or SSTP).
-
Unacceptable uses of the Public Network
include:
-
any activity that, intentionally or unintentionally,
would violate any law, by-law or regulation of the
Republic of South Africa or any other relevant
jurisdiction.
-
sending bulk or mass e-mail of any form, whether
solicited or unsolicited.
-
any activity that, intentionally or unintentionally,
results in excessive use of Internet bandwidth or
other resources, or the denial of legitimate service
to other users.
-
making any form of network service publicly
available.
-
making use of peer-to-peer file sharing services.
-
sending an electronic communication where any part of
the header information of that communication is
forged or otherwise misrepresents the communication.
-
propagating, or attempting to propagate, whether
through action or inaction, any virus, worm, Trojan
horse, malware, spyware, or other malicious program
or script.
-
any activity that circumvents, or attempts to
circumvent, bona fide network restrictions,
user authentication or the security of any host,
network or account.
-
extending or modifying the Public Network in any way
(including but not limited to the installation of
hubs, switches, routers, wireless access points, or
bridges).
-
any activity that may contravene the acceptable use
policies of any of Rhodes University's upstream
Internet service providers.
-
Exceptions to these acceptable and unnacceptable uses
must be authorised in advance and in writing by the
Director: Information Technology or his/her nominee.
-
Internet access provided via the Public Network may be
throttled, rate-limited, proxied, or subject to other
restrictions at the University's sole discretion.
-
Whilst the University endeavours to respect individuals'
right to privacy, it reserves the right to monitor,
record, or intercept any communication to, from, or via
the Public Network in the event that it has any reason to
believe that any part of this policy may have been
breached.
-
The Public Network service is made available as-is and on
a best-effort basis. No end-user support whatsoever is
available or will be provided by the University.
-
In no event shall Rhodes University nor any of its
representatives be liable for any direct, indirect,
incidental, special, exemplary, or consequential damages
(including, but not limited to, procurement of substitute
goods or loss of use or data) however caused and on any
theory of liability, whether in contract, strict
liability, or tort (including negligence or otherwise)
arising in any way out of the use of this service, even
if advised of the possibility of such damage.