Introduction
This access policy has been developed for the general good of all users, and is aimed at ensuring that the University Information and Communication Technology (ICT) resources are utilised efficiently and for the sustainable benefit of all students and staff. All users are urged to study the access policy and raise queries with the Help Desk at helpme@dicts.mak.ac.ug or to call 041531343 as necessary.
Before being permitted access, all users shall be required to confirm in writing that they have read the policy, fully understood ?it, and accept its terms and conditions.
1. Categories of Users
Access policy will apply to all users in four categories: undergraduate students; postgraduate students; administrative staff; academic staff.? User accounts will be defined according to these categories.? Only students registered at Makerere University and staff who are current employees of Makerere University will be permitted access to the ICT resources.? The only exception to this will be official visiting academics, students, or administrative staff who may be granted guest accounts
2. Applications for Mak-Net Access Accounts
Before the main university information systems are in place, users will be required to apply formally to the Help Desk for an account through the Deans/ Directors of their faculties/ institutes or Heads of administrative units.? The objective is verification that the applicant is a bona fide member of the university (student or staff).
After establishment of the information systems, all students and staff will automatically be given accounts based on the information system databases.
Students and staff ?who are no longer bona fide members of the university may be given up to seven days (email access) only) to transfer their email accounts to other service providers.
3. ICT Resources Users to have a Minimum Proficiency
Before being permitted independent access to ICT resources, users will be required to demonstrate a level of basic computer literacy as will be defined from time to time.? The required level of basic training will be offered through formal university wide courses in basic computer literacy.? Users who do not meet this requirement will only be permitted access under the supervision of an instructor, and only from specific training areas.
This measure is necessitated by the need to eliminate accidental disruption of services or damage to resources by beginners.? Prior training also means that users can be more efficient for their benefit and the benefit of other users.
4. Authorisation Levels
Authorisation levels will be defined by the Council ICT Committee (ICT Implementation Committee in the interim) according to the University Information Policy, and administered by the Network Manager according to the function and/ or category of the users.
5. Cost Recovery
While the University will centrally budget for some aspects of the cost of providing services to users, users may be required to meet part of the cost of services at levels to be defined from time to time by the ICTIC Board. Such costs will be recovered through Deans, Directors or Heads of Administrative and service units. This is aimed at ensuring a sustainable provision of services.
Computer usage, email and Internet access may be considered under different cost categories
6. Booking Usage
Because of the limited number of computer terminals, users will normally be required to make a time slot reservation according to a publicised procedure. The actual practice may vary from unit to unit, depending on the sufficiency of available ICT resources
7. Use of Passwords
All accounts shall be password protected.?
8. Privacy of Users
While the privacy of users will be respected, users are advised that monitoring of transactions shall be carried out in the interests of system security and ensuring only authorized utilization of resources.
9. Resources meant for Academic and Administrative Purposes
All ICT resources are meant for only academic and administrative purposes.? This does not exclude reasonable usage for personal non-commercial email and paid internet access.?
10. Intellectual Property Rights
It is the policy of the University to permit and use only freeware or licensed software
11. Safety
Before using ICT resources, all users must familiarise themselves with the emergency procedures in case of fire that are separately published by the university
- Users should note that all equipment operates at voltages that can lead to fatalities.? The attention of users is drawn to the safety procedures relating to the use of mains electricity that are separately published by the University
- No drinks and food of whatever description is permitted in computer rooms.
- Users should note that drinks or food particles are likely to splash into equipment, leading to damage.
12. Physical Security of Resources
- All users will have to register with the supervisor on duty as they enter or leave any computer room.
- Equipment may be taken into or removed from any computer room only with the express written permission of relevant Network Administrator or her/his designated representative.?
13. Offensive, Malicious, and Illegal Application of Facilities
The following will be considered offences and shall lead to suspension or termination of access and disciplinary proceedings by the University Student or Staff disciplinary committees. Users must note that these sanctions do not in any way replace other actions that may result through the due process of the law of Uganda.
- Any deliberate attempt to bypass system security
- Deliberate dissemination or transmission of viruses or other code designed to stop or downgrade the operation of the university or other networks
- Permitting another or other persons to gain access to the resources using one's account
- Unauthorised removal of ICT equipment from any location
- Use of resources for commercial purposes, unless formally sanctioned at an agreed cost by DICTS.
- Using the resources to access sites that publish pornographic material.
- The generation and/or transmission of offensive or harassing materials.
- The deliberate undermining or compromising of the security and/ or integrity of other sites
- Violation of intellectual property rights.? This includes use of unlicensed software that is subject to intellectual property rights protection, or generating unlicensed copies of software using University ICT resources.?
- The taking of any action that contravenes the law; and other actions that can be interpreted in this general category;
- The deliberate undermining or compromising of the security and/ or integrity of other sites;
- Violation of intellectual property rights.? This includes use of unlicensed software that is subject to intellectual property rights protection, or generating unlicensed copies of software using University ICT resources.?
- The taking of any action that contravenes the law; and other actions that can be interpreted in this general category;? The deliberate undermining or compromising of the security and/ or integrity of other sites;