The centre provides facilities to support and enhance the educational mission of the institute; for enriching the educational experience of the students, faculty and the staff and supporting their research and academic activities; and for providing automation support to the institute. This facility is needed for your day to day research activities as well as courses and assignments.
A computer account is created for every individual on admission to the institute. The account allows you to browse the web, send and receive e-mail, use the computational and interactive facilities of the centre. You can use the state of the art services of the computer centre with freedom. This freedom, you will find, is unsurpassed, when compared with elsewhere. Hence it is expected that you have to use the services in a responsible manner. Your conduct and use should be tempered with propriety and a spirit that respects the right of everyone. Any abuse of the facility may have serious implications on the reputation and the standing of the institute as well as can bring the facility of the institute into disrepute. Such misuse of the facility will not be tolerated.
Certain guidelines that should be followed in the use of the computer centre and its facilities have been formulated. The compliance with the guidelines and the do's and the don'ts are necessary for the continued use of your freedom. Not only should users stick to the use of the facility in accordance with the guidelines, but also report any use that is against these guide lines or the spirits of these guide lines. Failure to report infractions of the guide lines shall also be construed as an act of omission in following the guidelines.
Following activities amount to unethical use of computing facilities and will attract punishment from the Institute authorities. You should read the following list of activities that amount to unethical use of computing facilities and the previous discussion carefully and then sign your declaration of acceptance of the policies.
The Institute, whenever possible, gives all legitimate users the discretion to determine how to best use the computing resources and facilities within the guidelines of this policy. Users are responsible for their actions, the consequences of those actions, and the consequences of negligent inaction. As such, users whose judgment leads to activities inconsistent with the guidelines of this policy risk disciplinary action and possible imposition of restrictions to enforce the guidelines of this policy. Also the guidelines should be met with letter and the spirit of the guidelines as no set of ethical/unethical guidelines can be exhaustive.
Thanking you and wishing you a very happy stay at IIT Kanpur