Privacy & Policy

Information Systems Acceptable Usage Policy @ BITS Pilani Campuses

The INFORMATION PROCESSING CENTRE (IPC) / COMPUTER CENTRE (CC) at various BITS Pilani campuses provide facilities to support and enhance the educational vision and mission of the university. IPC / CC facilitates access to information Technology (IT) resources, communications networks, IT solutions and services to students, faculties and staffs within the culture of openness, trust, and integrity amongst the user community to carry out their research and academic activities with improved efficiency. IPC / CC provides full freedom to utilize its infrastructure efficiently. This comes with additional responsibility of not misusing the given freedom and respecting the rights of everyone. IT team is committed to protect itself, students, faculties, and staffs from unethical, illegal, or damaging actions by individuals. While IPC / CC advocates the concept of complete freedom in using IT services, it recommends certain restrictions towards bringing a healthier IT usage environment to meet the aspirations of user’s community at large. Any abuse of the facility may have serious implications on the reputation and the standing of the institute and can bring the facility of the institute into disrepute. Such misuse of the facility will not be tolerated. The campus wide network at each campus offers internet and intranet services to the entire campus community. Gigabit fiber channel with redundancy is implemented in the backbone of the communication channel. The campus network is protected by firewall. To offer high quality seamless internet experience to each user, each campus has multiple Internet Service Providers (ISPs) each having multiple ISP links. The optical fibre leased lines are used for the internet needs of users residing or mobile at places like hostels, academic buildings, faculty and staff quarters, guest house etc. Wireless access points are available in campus to facilitate wireless network connection. To improve security and fairness, all campuses use firewall authentication for protected access. It offers protection against worms, viruses, malwares, data loss, identity theft, etc. It also offers wireless security. A UTM account is created for every user (students, faculties and staffs) of the institute on joining. The number of concurrent devices allowed for a student, staff and faculty vary from campus to campus. Restriction on upload / download is imposed per campus basis depending on bandwidth availability and other constraints. The bigger download requirements which are of academic interest can be satisfied by sending a request to {,,,} for Pilani, Dubai, Goa and Hyderabad campus respectively. All IT resources provided by the institute are subject to monitoring, with cause, as determined through consultation with the BITS Pilani administration, when applicable. The monitoring may include aggregate bandwidth usage to effectively manage limited IT resources as well as monitoring traffic content in response to a legal or law enforcement request to do so. The access logs of individual user are collected and are maintained for a year. IPC / CC creates and manages official e-mail IDs for all students, staffs and faculties using Google’s centralized e-mail solutions. An e-mail account in the e-mail solution offers unlimited mail storage space, 5GB file storage space, collaboration tools, file sharing, personal web pages, calendaring etc. To improve the resource utilization of IPC / CC with maximum fairness, this document outlines policies to be followed for using BITS Pilani computing systems. Use of computing systems and facilities include any computer, server or network provided, supported or used by any of the BITS Pilani campuses. Use of computer facilities also includes the use of data / programs stored / processed / transmitted using storage media and network. The purpose of this policy is to ensure that all users (faculties, staffs, students and third party) use BITS Pilani computing facilities in an effective, efficient, ethical and lawful manner. This policy applies to all IT resources owned or leased by the institute and to any privately owned equipment connected to the campus network and includes, but is not limited to, computer equipment, software, operating systems, storage media, campus network, and the Internet. The compliance with the policies is necessary for the continued use of users’ freedom. Not only should users stick to the use of the facility in accordance with the policy, but also should report any use that is against these policies or the spirit of these policies. Failure to report infractions of the policy shall also be considered as an act of omission in following the policy. Security breaches could result in reporting to disciplinary committee when any individual is indulged in violating the IT policy or rules of the institute and Govt. regulations (IT Act 2000 / 2008 / Amendments in 2012). 1. The users are allowed to access BITS Pilani computing system and network only with their authorization credentials. DO NOT SHARE with or transfer to user id and passwords with others. These facilities are provided only for academic purposes, official institute purposes and other institute sanctioned activities as long as these a. Does not violate any law, institute policy or IT act of the Government of India. b. Does not interfere with the performance of institute duties or work of an academic nature (as judged by the Vice Chancellor / Campus Director) c. Does not result in commercial gain or profit other than that allowed by the institute. 2. Users are responsible for all the internet and intranet accesses happening through their account. It is the users' responsibility to protect their account from unauthorized use by changing passwords periodically and using passwords that are not easily guessed. Sharing of passwords for any purpose whatsoever is strictly prohibited. If a user lost / forgot his/her account password, please reset it at the earliest. Please approach IT support immediately for assistance, if required. It is strongly recommended to change the passwords once in every 15 days. Also, for an improved service delivery over the Internet, users should keep their end device (PC/Laptop/Mobile devices) with latest antivirus, and an up-to-date operating system. 3. Users are responsible for the content especially the shared content in their devices when they connect it to the network. They are responsible for the content stored in the designated workspace allocated to them (example: file storage area, web-pages, stored/archived emails, on Computer Centre or Department machines). Users are responsible for protecting any information used and / or stored on their personal system(s) as well. 4. Users are responsible for all the network traffic generated by their computer. Physically tampering with network connections / equipment(s), connecting additional (personal) network devices like Routers and Switches or making exclusive use of network resources is STRICTLY NOT ALLOWED in hostels and academic buildings. Users are not allowed to set up his/her own Wi-Fi network which is connected to the campus backbone using routers or software like Connectify/Hotspot etc. Users are not permitted to install proxy / torrent download / games download / direct download etc. Users are not allowed to engage in any activity with intent of degrading the performance of the network. 5. Gaining access to BITS Pilani systems for which proper authorization has not been given or attempting to gain more system access or privileges than allocated is STRICTLY NOT ALLOWED. Users are not allowed to deprive an authorized user from accessing BITS Pilani system. 6. Use of network for creating, sending, storing, uploading, accessing, using, soliciting, publishing or linking offensive, obscene, profane or indecent images or material is STRICTLY NOT ALLOWED. Users are not allowed to create, send, store, upload, access, use, solicit, publish or link material likely to cause annoyance, inconvenience, distress, discrimination, sexual harassment, defamation, misrepresentation, misleading to some individuals or cultures based on gender, race, religious beliefs, disability, political conviction, sexual preferences, age or otherwise. Users are not supposed to deal with material that infringes the intellectual property (including copyright) of another person or organization. Users are not allowed to download pirated software or any suspect malware from the internet and spread the same among other users. 7. Users are not allowed to use email services (or mail relays or fake emailers) and other network communication facilities to harass, offend, or annoy other users of the network, including impeding their computing systems, software, or data. Users are not supposed to involve in sending emails or messages masquerading as another person or to hide the sender's identity. They are not allowed to send CHAIN letters, JUNK emails and should not involve in Spamming, Tunneling, phishing, spoofing, accessing torrents (peer to peer connections) and recreational downloads. Any communications sent by electronic means will be legally binding on the user initiating the communication. The Designated system administrators have limited capability of account management and do not have access to individual mail boxes. However as a part of an investigation of any misdemeanor, the account in question can be accessed / blocked and user can be denied access to the email facility. Such investigations access typically require express approval from the Director in case of investigations against a faculty or a staff, or the Dean / Associate Dean of Students, in case of an investigation against a student. The email facility cannot be used for commercial gain or private profit other than that allowed by the Institute. 8. Users are not allowed to do security related misuse which includes attempting to bypass firewalls and access rules in place, breaking security of the systems, trying to capture passwords of other users, Damaging / Gaining access to the data of other users etc. Users are not allowed to setup servers of any kind (examples: web, mail, proxy) that are visible to the world outside BITS Pilani campuses. Users shall not download, install or run security programs or utilities that reveal security weaknesses. Users are not allowed to share information to third party which will allow circumvention of security systems by the third party. 9. Users are not allowed to cause physical damage to computing or networking facility or property of BITS Pilani. 10. Users are not allowed to install personal software for use on BITS Pilani’s computer systems except the ones leased to the user. Users are not allowed to download / install unauthorized / pirated software for use on BITS Pilani’s computer systems and their personal system when it is connected with BITS Pilani’s network. 11. Users shall not make unauthorized copies of copyrighted software and documents, except as permitted by law or by the owner of the copyright. Copyrighted materials belonging to the entities other than BITS Pilani may not, subject to the allowable exemptions, be transmitted by faculties, staffs or students on BITS Pilani mail / internet system. Setting up a file sharing service (within LAN) which violates Intellectual property rights is not allowed. All users obtaining access to other companies’ or individuals’ materials must respect all copyrights and may not copy, retrieve, modify or forward copyrighted materials, except with permission of copyright owner or as may be permitted under the appropriate law. Each user shall observe all terms and conditions of the license agreement, under which the license to use any copyrighted work has been obtained. 12. BITS Pilani routinely monitors usage pattern for its internet and intranet services. The reasons for this monitoring are many, including cost analysis / allocation and management of the internet and intranet facilities etc. 13. Users are STRICTLY NOT ALLOWED to indulge in cyber-crime / cyber-vandalism. IPC / CC cannot enumerate all the cases. Any activity which causes inconvenience to users, depletes the IPC / CC resources, or jeopardizes the security of the systems, amounts to unethical use. The Institute, whenever possible, gives all legitimate users the discretion to determine how to best use the computing resources and facilities within the guidelines of this policy. Users are responsible for their actions, the consequences of those actions, and the consequences of negligent inaction. As such, users whose judgment leads to activities inconsistent with the policy risk disciplinary action and possible imposition of restrictions to enforce the guidelines of this policy. The policy may change as and when it is considered appropriate and new policies or the changes in policy will take effect immediately after a brief announcement by any means, email, printed notices, or through the news groups. BITS Pilani may take any breach of this policy as a sign of misconduct by the user and use may be subject to the following: (A)Verbal warning (B) Written warning (C) Withdrawal of access and system privileges in part or whole (D)Any combination of above Serious or repeated breaches of this policy can be constructed as serious or gross misconduct and disciplinary actions may include: (A)Counseling (B) Dismissal / Semester debarring / Year debarring / Drop Program (C) Loss of benefits (D)Legal proceedings in accordance with State and Federal Law (E) Any combination of the above