NEU Dormitory Computer Network Usage Rules

NEU Dormitory Computer Network Usage Rules

1. Establishment and investments of computer network systems of the university have been made in order to serve and give priority for the aims and primary needs of academic, administrative, educational and research issues. The use of network systems for private purposes must never prevent others to access network for their urgent and important needs. In this respect, the rules and forbidden acts in using the network systems are specified as follows:
a. Students who wish to use the internal computer network systems of the university via their laptops or desktops must register their MAC (Media Access Control) address to the Innovation and Information Technologies Center along with their personnal information, otherwise access to network from their computers will not be activated.
b. “Peer-to-peer” (P2P – from location to another location) file sharing programs not only violate copyrights and licences but also entirely occupy the network system so that it cannot be used for primary needs. Therefore, it is forbidden to use the following “peer-to-peer” file sharing programs or devices, or other similar programs or devices:
KaZaA, iMesh, eDonkey2000, Gnutella, Napster, Aimster, Madster, FastTrack, Audiogalaxy, MFTP, eMule, Overnet, NeoModus, Direct Connect, Acquisition, BearShare, Gnucleus, GTK-Gnutella, LimeWire, Mactella, Morpheus, Phex, Qtella, Shareaza, XoLoX, OpenNap, WinMX, DC++, BitTorrent, and so on.
c. Use of network systems for private commercial purposes is forbidden.
d. Use of network systems for mass-mailing, spam mailing, mail bombing and so on is forbidden.
e. In dormitory premises, keeping in possession or using computers or devices which can provide web hosting services, e-mail services, dhcp services and so on is forbidden.
f. Activities, operations, or services that will lead to unauthorized or illegal use of university network systems and sources outside the university by other people, or actions that will enable computer users introduce or present themselves as if they are using their computers in the university or over the network system of university (proxy, relay, IP sharer, NAT, and so on) are forbidden.
g. It is forbidden to carry out activities or facilities that can cause a threat for network security.
h. It is forbidden to keep or use wireless network sources or devices, or send wireless signals from inside the dormitory premises.

2. Students who are found to be disobeying or breaking the dormitory rules are subject to disciplinary procedures, and the Directorate of Housing and Dormitories carry out the disciplinary procedures. The mode of punishment is decided in accordance with the Disciplinary Regulations followed by the Directorate of Housing and Dormitories.
3. If necessary, the content of this text can be altered in accordance with the needs. The finalized version of this text can be found at www.neu.edu.tr , under section of Regulations.