-
All the information assets shall be used for business purposes only, and to serve the interests of the university in the context of normal operations.
-
All users shall exercise good judgment with respect to the reasonableness of personal use.
-
All users shall not participate in any illegal activities such as admission to the assets of unauthorized access personnel, and penetration, or causing the introduction of damaging software or the introduction of viruses, or any behaviour that would cause the disable of use of assets.
-
All staff shall understand their responsibilities regarding the protection of all assets owned by the King Abdul Aziz University and / or those that are in its custody.
-
Shall not use the information handling facilities for purposes not related to work. In the case of discovery of any fraud, it will be dealt with according to disciplinary action
as shown in the following link :press here.
-
Should not transfer personal information or disclose them to an external party.
-
Users may not, under any circumstances, exchange of user names and passwords with each other.
-
Must maintain the privacy, confidentiality and secure use of the username and password to systems.
-
All university staff shall implement rules and instructions of creating Passwords as shown in the following link :
press here
-
The use of the University network for the following purposes shall be prohibited:
-
Sending or downloading messages or pictures that contain malicious or threatening content.
-
Login to, download or store information, images and pornographic sites.
-
Download or install the non-licensed software.
-
Download or use the information or material protected by intellectual protection systems.
The use of the University Email system for the following purposes shall be prohibited:
-
Unapproved commercial activities.
-
Activities those are illegal and punishable by the system.
-
Terrorist or suspicious activities and all that is opposed to security regulations of the State.
-
Publicity and advertising.
-
Harassment and threats of all kinds.
-
Sending or helping to spread viruses or malicious software for computer equipment that might affect the University's network or its users.
-
Send promotional mailings or multiple (spamming).
-
Activities that contradict with the religion believe or impair the sanctity of Islam or scratching of public morals.
-
Activities those are contrary to the state and its regime.
-
Must act immediately to change the password in case there is any doubt of discloser and to inform the Manager of the Department
-
All users are allowed to take advantage of all electronic services in order to benefit them to serve the objectives of the official duty of the administrative and academic, research and community service.
-
Must not leave sensitive or critical information concerning the University to imaging devices, print or fax, because access to these devices might be allowed to unauthorized personnel.
-
All users should run the screen saver on password mode provided on personal computers, mobile computers and servers to prevent unauthorized access to them.
-
Must remove the papers, which contain sensitive or confidential information of the printers as soon as printed.
-
All employees are required to inform their manager of any direct threats or attacks, real or potential within the university environment.
-
All Employees must inform the relevant staff of all juveniles that are confirmed or potential, and who will in turn help in taking corrective action.
-
Should act immediately to inform the team dealing with the information security with the suspected incidents.
-
In cases of travel and working outside the organization, the devices and media, shall not be left without supervision in public places.
-
All mobile users are requested to make adequate care when using mobile computing facilities in public areas, meeting rooms and other unprotected areas.
-
In the event of loss of any mobile device that involves sensitive data, or for any other violation of the information security, management shall be immediately informed.
-
All staff is required to wear the evidence of their identity, and it should visible to others.
-
All university staff is prohibited from exchanging access cards to the university buildings among them.
-
Must obtain written authorization for equipment, information, and software that shall be transferred to outside the university premises.
-
Shall not enable any third party from entering university premises unless they sign a non-disclosure agreement.