In order to receive IT services at SLU-Madrid, students, faculty and staff are required to comply with the information technology rules and policies.
By accessing SLU-Madrid account, you agree to abide by the SLU-Madrid IT rules and policies. Noncompliance could result in disciplinary action or criminal proceedings.
All students are currently provided with access to the internet from any general purpose laboratory, and may use any of the internet facilities and resources relevant to their coursework. However, unauthorized access to, or attempts to access, any networks or systems that you do not have a properly authorized account on, or public internet access to, constitutes an offense under SLU-Madrid regulations and information technology rules. Unauthorized access, or attempts to access, may therefore result in disciplinary measures being taken.
- The laboratories are to be used solely for activities related to undertaking study at the University.
- Your accounts are strictly for your own use, and you must take all reasonable precautions to prevent anyone else from using them for any purpose.
- When you first log in, you should immediately change your initial password to a password that you will easily remember and that is not easy to guess or to break. Learn how to compose passwords.
- You may use your accounts only as necessary to fulfill the requirements of your course, even if you have the capability to do otherwise.
- The University reserves the right to access any student-owned files stored on University servers without prior notification. Also, the University can and will delete any data stored there that is deemed inappropriate.
- You may not use SLU provided computers to store any data that is not required to fulfill the requirements of your course.
- You may not make any attempt to use any other account or folder not intended and lawfully allocated for your personal use.
- You must provide proof of identification if requested to do so by any lab coordinator or staff member of the IT department.
- Students who are not part of a class must leave the laboratory at the request of a lecturer who has that laboratory booked for a class.
- Damaging, removing, making inoperative or making to appear inoperative equipment in any laboratory is prohibited.
- Smoking, eating or drinking in the laboratories is prohibited.
- Behaving in a way, which interferes with other users' reasonable access to, or use of, the equipment (such as by creating a disturbance, making excessive noise or entering during classes) is prohibited.
- You must comply with the discipline rules regarding harassment and intimidating behavior.
- Use of the laboratories for, or in relation to, behavior that constitutes sexual harassment including the gratuitous use or display of pictures or objects with sexual connotations is prohibited.
- Use of the laboratories for private gain is prohibited.
- The copying of any software or other data, which may be subject to copyright laws, or in contravention of licenses, under which SLU-Madrid is permitted to use the software is prohibited.
If a student violates any of these rules, IT staff or the lab coordinators may ask the person to leave the laboratories as a first disciplinary measure.
The following code sets out what is considered acceptable behavior for the use of your SLU email.
Your student email address is one of the ways by which the University communicates with you. Note that the University may use other forms of communication such as mail, but only uses a University email address for sending you email. Information concerning your courses and the SLU computing facilities may be sent to you throughout the year. It is your responsibility to check your email regularly or ensure that your SLU mail is forwarded to an email address you check regularly. In other words, if you don't use SLU mail you must forward your SLU mail to a mail service that you do check regularly. This type of forwarding can be done online by using the web mail interface.
Your use of the University mail facilities is restricted to bona fide purposes only, i.e. those which are consequent upon the teaching, study, research, administration or any related activity occasioned by your course of study at the University.
- Do not subscribe your University email address to list serv and newsgroups. Instead use your personal email address.
- Do not open any attachment without performing a virus scan before.
- Treat the security of email messages about the same as a message on a postcard.
- Clean your mailbox from unwanted emails to conserve disk space.
- Do not reproduce a message in full when responding to it. This is hard for the readers and a waste of resources.
- Do not broadcast email messages unnecessarily. It's very easy to do, but can be very annoying to recipients (and wastes resources). In particular, do not send or forward chain emails.
- Make sure that the 'subject' field of your message is meaningful. When someone receives many messages, it can be very confusing and frustrating not to be able to judge the subject matter correctly from its subject field.
- Do not send frivolous, abusive or defamatory messages. Apart from being discourteous or offensive, they may break the law.
- Remember that sending email from your University account is similar to sending a letter on a SLU letterhead, so don't say anything that might discredit or embarrass the University.
The SLU Network may not be used for any of the following:
- The creation, transmission or publication (other than for properly supervised and lawful research purposes) of any offensive, obscene or indecent images, data or other material, or any data capable of being turned into obscene or indecent images or material.
- The creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety.
- The creation or transmission of defamatory material.
- The importation and storage of offensive material in the form of Newsgroup items. This includes the following groups (and any similar groups which might emerge from time to time): alt.sex, alt.binaries.pictures.erotica, alt.binaries.multimedia.erotica and all subsidiary groups of the above.
- The transmission of material that infringes the copyright of another person.
- The transmission of unsolicited commercial or advertising material either to other User Organizations, or to organizations connected to other networks.
- Deliberate unauthorized access to facilities or services accessible via the SLU Network
- Deliberate activities with any of the following characteristics:
- wasting staff effort or network resources, including time on end systems accessible via the SLU Network and the effort of staff involved in the support of those systems;
- corrupting or destroying other user's data;
- violating the privacy of other users;
- disrupting the work of other users;
- using SLU Network in a way that denies service to other users (for example, deliberate overloading the network or switching equipment);
- The continued use of an item of networking software or hardware after IT department has requested that this use ceases because it is causing disruption to the correct functioning of SLU Network
- Other misuse of network resources, such as the introduction of viruses.
- When the SLU Network is being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of the SLU Network.
A student who commits an offense, repeats it or violates any of these rules is liable to a penalty set out below. If the director of the IT department finds that a student has committed an offense, the director may, in relation to the offence, decide to:
- reprimand the person committing the offence;
- suspend the person from the use of all, or part of, the Information Technology Services, including (but not limited to) disconnecting internet from the rooms in the residence, if it applies;
- close the relevant account or cancel the relevant service;
- impose a monetary penalty of not more than 500 euros on the person;
- determine compensation payable by the person to the University for damage to the Information Technology Services;
- take any action, being a combination of the actions specified in (a) to (e) (inclusive).