Monday, 16 January 2012

The Acceptable Use Policy: Your favourite Rule?

For today, you're supposed to read and sign the AUP. Having read the AUP, please name one rule of the AUP that strikes you most.

(Note: Don't use the same rule as your friend, with 32 rules and 23 or us, there's more than enough to go around.)

Have a nice week ahead! :D

24 comments:

  1. The one that strikes me the most is the one that states that we are not allowed to hack from any accounts in the LD.

    ReplyDelete
  2. We should not tell anyone our passwords our user ID for any school system to anyone.

    ReplyDelete
  3. The one that caught my eye is we should take care of our learning device and not place it somewhere else where it is unattended where it could be subjected to theft.

    ReplyDelete
  4. We should be responsible and accountable for all activities conducted via our own account~

    ReplyDelete
  5. The mac is not to be used to make any racist, religious or against the majority interest remarks

    ReplyDelete
  6. User shall use the ICT resources according to the purpose for which is provided, leaning, administrative and teaching

    ReplyDelete
  7. Users shall not forward messages containing general appeals or warnings like "virus warnings", "request for help", by mass mail or otherwise.

    ReplyDelete
  8. Users shall ensure that their systems are adequately protected before connecting to SST's network

    ReplyDelete
  9. Users shall not forge an identity

    ReplyDelete
  10. "Users should not indiscrimately issue search instructions and download data manually or via automated resources, or which may potentially consume large amount of network/ internet bandwith and ICT resources, or which may degrade the network performance"

    ReplyDelete
  11. Users shall not leave their computer unattended. If it is not possible, com shall be securely locked away or with a cable lock attaching to something immovable when not in use.

    ReplyDelete
  12. Users shall be mindful of the need to protect your own privacy.

    ReplyDelete
  13. Users shall ensure that their systems are adequately protected before connecting to SST's network.

    ReplyDelete
  14. 23. Users shall not upload or download, send or post, enter or publish any content to the internet that is against the public interest, public order, national interest, racial and religious harmony, or which offends good taste or decency, or is otherwise indecent obscene, pornographic or defamatory.

    ReplyDelete
  15. User shall not place their computer and portable electronic storage media near an external window or public access area where it could be subjected to physical theft.

    ReplyDelete
  16. Users shall not flood an individual, group or e-mail system with numerous or large email. (SORRY MY PREVIOUS COMMENT DIDN'T SHOW UP FOR SOME REASON :P

    ReplyDelete
  17. abiyyu arif rahman1/18/2012 4:30 am

    3. user shall use only softwares that meet legal requirements.

    ReplyDelete
  18. Users shall not install and operate their own wireless access points emulating or interrupting the performance of the school's network infrastructure wireless access points.

    ReplyDelete
  19. We cannot use devices or vurnerability software(eg:torrenting)as it will severly damage the school network system

    ReplyDelete
  20. Uers shall not install and operate thier own wireless internet point

    ReplyDelete
  21. 27. users shall be mindful of the need to protect your own privacy.

    ReplyDelete
  22. Users shall hand-carry their computer and portable electronic storage when travelling overseas. These shall not be checked in as check-in luggage.

    ReplyDelete
  23. Users shall not use ICT resources for financial gains or commercial purposes.

    ReplyDelete
  24. Thanks to all for the effort especially for those who reminded your peers. Appreciate it.

    ReplyDelete