IT & Internet Usage Policy
1. Purpose & Scope
Riphah International University, Faisalabad, provides IT infrastructure, internet access, and digital services to support academic, research, and administrative activities. This policy ensures that all users utilize these resources responsibly, securely, and in alignment with Islamic ethical values.
2. Acceptable Use
- University IT resources, including computers, Wi-Fi, email, and online platforms, are for academic and administrative purposes only.
- Users must log in with their assigned university credentials and keep them confidential.
- Access to digital learning platforms, library databases, and research tools must comply with licensing agreements.
3. Prohibited Activities
- Accessing, downloading, or sharing inappropriate, unethical, or illegal content.
- Attempting to hack, disrupt, or bypass university network security.
- Installing unauthorized software or altering system configurations.
- Using IT resources for political campaigns, commercial ventures, or personal business.
- Sending spam, phishing emails, or engaging in online harassment.
4. Email & Communication Guidelines
- All official communication must be conducted via the university email account.
- Professional language and etiquette must be observed.
- Users must avoid sending bulk or unsolicited emails without approval.
5. Wi-Fi Access
- Campus Wi-Fi is available for all registered students, faculty, and staff.
- Sharing Wi-Fi credentials with non-registered individuals is strictly prohibited.
- Bandwidth usage should prioritize academic needs—downloading large non-academic files is discouraged.
6. Computer Labs & Equipment
- Labs are open during designated hours under staff supervision.
- Eating, drinking, and loud conversations are not allowed in computer labs.
- Users must log off after each session and ensure equipment is properly shut down.
7. Security & Privacy
- Users must install only approved security software on university devices.
- Storing personal data on public computers is discouraged; the university is not responsible for loss of personal files.
- Any suspected security breach must be reported immediately to the IT Department.
8. Violations & Consequences
Breaches of this policy may result in:
- Temporary or permanent suspension of IT access.
- Disciplinary action under the ovo88 Student Code of Conduct.
- Legal action in cases involving criminal activity.