General Use and Misuse
Information technology has become an essential part of academic and administrative life at Effat University. Each department should plan ahead and think of how technology can best be used to advance the University’s Strategic Plan.
The challenge is to integrate and coordinate the efforts of all the departments to use technology effectively and efficiently to achieve their educational goals.
 
MIETS has responsibility for maintaining, configuring, networking, and managing all information technologies. Hardware, software, network, or security problems should be reported to MIETS personnel as soon as possible. Only authorized personnel may configure, alter, or repair information technologies systems/equipment. To insure adequate network performance, network traffic will be monitored. MIETS will take appropriate action if any computer on the network causes traffic problems, which interferes with the business of the University.
 
MIETS is responsible for securing its technological facilities to a reasonable and economically feasible degree against unauthorized access and/or abuse. This responsibility includes informing users of expected standards of conduct and the consequential measures for not adhering to them.
 
MIETS monitors the use of computers and will contact anyone discovered to be hindering normal operations. It is not appropriate to use computer resources in ways that are detrimental to the normal operation of the computer and its users.
 
Upon the detection of an apparent violation by a student, IETS will disable the account and submit pertinent information to the Dean of Students, as may be appropriate given the nature of the apparent violation, for possible disciplinary action.
 
Upon the detection of an apparent violation by a member of the faculty, MIETS will disable the account and submit pertinent information to the Dean of Faculty for possible disciplinary action.
 
Upon the detection of an apparent violation by an administrator or a member of the administrative staff, MIETS will disable the account and submit pertinent information to the person's supervisor or superior for possible disciplinary action.
 
Any attempt to violate the university’s provisions and policies, regardless of the success or failure of the attempt, will result in disciplinary action. Disciplinary actions may range from a reprimand to maximum penalties afforded under University policies.
 
 
Use Of Information Technologies Is A Privilege Which May Be Revoked At Any Time By:
  • Breaking into another user's electronic mail account or voice mailbox, sending forged electronic mail to intimidate or harass other users, sending chain messages or promotional mail
  • Obtaining, possessing, using, or attempting to use passwords or other information, sharing your account and/or assisting others in unauthorized access of campus or remote systems
  •  Attempting to read, inspect, modify, distribute, delete, or copy data, mail messages, or software without proper authorization
  • Introducing computer "viruses" or other disruptive/destructive programs into the University network or into external networks.
  • Evading or changing a resource quota; damaging or disrupting a computing or communications system, network or program
  • Using information technologies for recreational game playing, chatting and excessive music downloading