In order to receive IT services at SLU-Madrid, students, faculty and staff are required
to comply with the information technology rules and policies.
By accessing SLU-Madrid account, you agree to abide by the SLU-Madrid IT rules and
policies. Noncompliance could result in disciplinary action or criminal proceedings.
Computer Laboratories Code of Conduct
All students are currently provided with access to the internet from any general purpose
laboratory, and may use any of the internet facilities and resources relevant to their
coursework. However, unauthorized access to, or attempts to access, any networks or
systems that you do not have a properly authorized account on, or public internet
access to, constitutes an offense under SLU-Madrid regulations and information technology
rules. Unauthorized access, or attempts to access, may therefore result in disciplinary
measures being taken.
- The laboratories are to be used solely for activities related to undertaking study
at the University.
- Your accounts are strictly for your own use, and you must take all reasonable precautions
to prevent anyone else from using them for any purpose.
- When you first log in, you should immediately change your initial password to a password
that you will easily remember and that is not easy to guess or to break. Learn how to compose passwords.
- You may use your accounts only as necessary to fulfill the requirements of your course,
even if you have the capability to do otherwise.
- The University reserves the right to access any student-owned files stored on University
servers without prior notification. Also, the University can and will delete any data
stored there that is deemed inappropriate.
- You may not use SLU provided computers to store any data that is not required to fulfill
the requirements of your course.
- You may not make any attempt to use any other account or folder not intended and lawfully
allocated for your personal use.
- You must provide proof of identification if requested to do so by any lab coordinator
or staff member of the IT department.
- Students who are not part of a class must leave the laboratory at the request of a
lecturer who has that laboratory booked for a class.
- Damaging, removing, making inoperative or making to appear inoperative equipment in
any laboratory is prohibited.
- Smoking, eating or drinking in the laboratories is prohibited.
- Behaving in a way, which interferes with other users' reasonable access to, or use
of, the equipment (such as by creating a disturbance, making excessive noise or entering
during classes) is prohibited.
- You must comply with the discipline rules regarding harassment and intimidating behaviour.
- Use of the laboratories for, or in relation to, behavior that constitutes sexual harassment
including the gratuitous use or display of pictures or objects with sexual connotations
- Use of the laboratories for private gain is prohibited.
- The copying of any software or other data, which may be subject to copyright laws,
or in contravention of licenses, under which SLU-Madrid is permitted to use the software
If a student violates any of these rules, IT staff or the lab coordinators may ask
the person to leave the laboratories as a first disciplinary measure.
SLU Email Policy
The following code sets out what is considered acceptable behavior for the use of
your SLU email.
Your student email address is one of the ways by which the University communicates
with you. Note that the University may use other forms of communication such as mail,
but only uses a University email address for sending you email. Information concerning
your courses and the SLU computing facilities may be sent to you throughout the year.
It is your responsibility to check your email regularly or ensure that your SLU mail
is forwarded to an email address you check regularly. In other words, if you don't
use SLU mail you must forward your SLU mail to a mail service that you do check regularly.
This type of forwarding can be done online by using the web mail interface.
Your use of the University mail facilities is restricted to bona fide purposes only,
i.e. those which are consequent upon the teaching, study, research, administration
or any related activity occasioned by your course of study at the University.
- Do not subscribe your University email address to list serv and newsgroups. Instead
use your personal email address.
- Do not open any attachment without performing a virus scan before.
- Treat the security of email messages about the same as a message on a postcard.
- Clean your mailbox from unwanted emails to conserve disk space.
- Do not reproduce a message in full when responding to it. This is hard for the readers
and a waste of resources.
- Do not broadcast email messages unnecessarily. It's very easy to do, but can be very
annoying to recipients (and wastes resources). In particular, do not send or forward
- Make sure that the 'subject' field of your message is meaningful. When someone receives
many messages, it can be very confusing and frustrating not to be able to judge the
subject matter correctly from its subject field.
- Do not send frivolous, abusive or defamatory messages. Apart from being discourteous
or offensive, they may break the law.
- Remember that sending email from your University account is similar to sending a letter
on a SLU letterhead, so don't say anything that might discredit or embarrass the University.
SLU Network Policy
The SLU Network may not be used for any of the following:
- The creation, transmission or publication (other than for properly supervised and
lawful research purposes) of any offensive, obscene or indecent images, data or other
material, or any data capable of being turned into obscene or indecent images or material.
- The creation or transmission of material which is designed or likely to cause annoyance,
inconvenience or needless anxiety.
- The creation or transmission of defamatory material.
- The importation and storage of offensive material in the form of Newsgroup items.
This includes the following groups (and any similar groups which might emerge from
time to time): alt.sex, alt.binaries.pictures.erotica, alt.binaries.multimedia.erotica
and all subsidiary groups of the above.
- The transmission of material that infringes the copyright of another person.
- The transmission of unsolicited commercial or advertising material either to other
User Organizations, or to organizations connected to other networks.
- Deliberate unauthorized access to facilities or services accessible via the SLU Network
- Deliberate activities with any of the following characteristics:
- wasting staff effort or network resources, including time on end systems accessible
via the SLU Network and the effort of staff involved in the support of those systems;
- corrupting or destroying other user's data;
- violating the privacy of other users;
- disrupting the work of other users;
- using SLU Network in a way that denies service to other users (for example, deliberate
overloading the network or switching equipment);
- The continued use of an item of networking software or hardware after IT department
has requested that this use ceases because it is causing disruption to the correct
functioning of SLU Network
- Other misuse of network resources, such as the introduction of viruses.
- When the SLU Network is being used to access another network, any abuse of the acceptable
use policy of that network will be regarded as unacceptable use of the SLU Network.
A student who commits an offense, repeats it or violates any of these rules is liable
to a penalty set out below. If the director of the IT department finds that a student
has committed an offense, the director may, in relation to the offence, decide to:
- reprimand the person committing the offence;
- suspend the person from the use of all, or part of, the Information Technology Services,
including (but not limited to) disconnecting internet from the rooms in the residence,
if it applies;
- close the relevant account or cancel the relevant service;
- impose a monetary penalty of not more than 500 euros on the person;
- determine compensation payable by the person to the University for damage to the Information
- take any action, being a combination of the actions specified in (a) to (e) (inclusive).