Information, Network and Internet Usage policy

Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
This policy is intended to provide a framework for the use of NGU's IT department resources. It has the widest application and covers new and evolving technologies and uses. NGU seeks to promote and facilitate the active and widespread use of information technology with a view to supporting learning, teaching, innovation, and research to the highest possible standards.
It also requires lawful and legal use of the technologies and facilities available to students, staff, and university partners. As a user of these services and facilities, you have access to valuable University resources and internal and external networks. Therefore, it is important that you behave responsibly, ethically, and legally.
In general, individuals should ensure that the information resources and technology of the university are used for their intended purposes while respecting the rights of other computer users, the integrity of facilities, and all relevant licenses and contractual agreements.
If an individual is found to be in violation of the Internet Use Policy, the university may take disciplinary action, including restriction and possible loss of network privileges or more serious consequences, up to and including '' suspension, termination or expulsion from the university.

This policy applies to all users of computing resources owned or managed by NGU.

Individuals covered by the policy include (but are not limited to) University faculty and visiting faculty, physicians, staff, students, alumni, contractors, volunteers, guests or agents of the administration, and external individuals and organizations accessing network services via the University’s computing facilities.

Computing resources include all University-owned, licensed, or managed hardware and software, University assigned user accounts, and use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

These policies apply to personally owned computers and devices connected by wire or wireless to the University network, and to off-site computers that connect remotely to the University’s network services.


In making acceptable use of resources, individuals covered by this policy must:

  • Use resources only for authorized purposes.
  • Protect their user-id(s) and system from unauthorized use. Each individual is responsible for all access to university information resources and technology by their user-id(s) or any activity originating from their system. An individual’s user-id and password act together as their electronic signature.
  • Access only information to which they have been given authorized access or that is publicly available.
  • Use only legal versions of copyrighted software in compliance with vendor license requirements.
  • Be considerate in the use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connection time, disk space, printer paper, manuals, or other resources.
  • Restrict personal use of the university’s information resources and technology to incidental, intermittent, and minor use that is consistent with university Policy
  • Include only material germane to university matters in university, school, or departmental electronic communications, such as e-mail, websites, blogs, etc.**
Personal web sites, chat rooms, weblogs (also known as blogs), and other forms of publicly available electronic communications hosted on or linked from University information resources and technology must comply with this Acceptable Use Policy and prominently include the following disclaimer: “The views, opinions, and material expressed here are those of the author and have not been reviewed or approved by New Giza University.”
Must Not

In making acceptable use of resources, individuals covered by this policy must not:

  • View any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
  • Use unlawful material, or material that is defamatory, threatening, discriminatory, extremist or which has the potential to radicalize themselves or others;
  • Use unsolicited “nuisance” emails;
  • Access material which is subsequently used to facilitate harassment, bullying and/or victimization of a member of the university or a third party;
  • Use material that promotes discrimination on the basis of race, gender, religion or belief, disability, age or sexual orientation;
  • Use material with the intent to defraud or which is likely to deceive a third party;
  • Use material which advocates or promotes any unlawful act;
  • Use material that infringes the intellectual property rights or privacy rights of a third party, or that is in breach of a legal duty owed to another party;
  • Use material that brings the university into disrepute.
  • Waste staff effort or other university resources;
  • Corrupt, alternate or destroy another User’s data without their consent;
  • Disrupt the work of other users or the correct functioning of the university Network;
  • Deny access to the university network and its services to other users.
  • Pursue commercial activities (even if in support of university business).
  • Introduce data-interception, password-detecting, or similar software or devices to the university’s network;
  • Seek unauthorized access to restricted areas of the university’s network;
  • Access or try to access data where the user knows or ought to know that they should have no access;
  • Carry out any hacking activities.
  • Intentionally or recklessly introduce any form of spyware, computer virus, or other potentially malicious software.

In the event of a breach of this Acceptable Use Policy by a User the University may in its sole discretion:

  1. Restrict or terminate a User’s right to use the University Network;
  2. Withdraw or remove any material uploaded by that User in contravention of this Policy; or
  3. Where appropriate, disclose information to law enforcement agencies and take any legal action against a User for breach of this Policy, including but not limited to claiming all costs, fees, and disbursements (including but not limited to legal fees) connected therewith.

In addition, where the User is also a member of the University community, the University may take such action, disciplinary or otherwise as it deems appropriate and which is in accordance with its Charter, Statute, Ordinances, and Regulations.

University Network

All computing, telecommunication, and networking facilities provided by the University, with particular reference to all computing devices, either personal or University owned, connected to systems and services supplied.