You must read and agree to these terms and conditions before proceeding

The computing systems at the American University of Beirut (AUB) are to be used in a manner that supports the educational mission of the University and is conducive to the overall academic climate. The American University of Beirut’s computing systems refer to all computers owned or operated by the University and/or include hardware, software, data, and communication networks associated with these systems. The systems range from multi-user systems to single-user terminals and personal computers, whether free standing or connected to networks. Please refer to “AUBnet Residential Acceptable Use Policy” for in-room connection services and on-campus residences. Since AUB computing systems are vital to the programs of instruction, research, and administration of the University, the expectation of ethical conduct by users of computing systems is the same as in all other areas of University life. Users are expected to apply standards of normal academic and professional ethics and considerate conduct in economical use of all AUB computing systems and resources. In addition, users are expected to be aware that their use of the University computing systems is subject to all applicable University regulations, Internet Code of Conduct, and local, and international laws. Access to hardware, software and network is provided to members of the University for the primary purpose of enhancing the academic experience. Members of the University community may apply for the right to use computer facilities through authorized computer accounts. To be granted the use of a computer account, users must agree to abide by certain rules and regulations related to appropriate, legal, and ethical use of AUB computing systems.

Users are expected to use the computing systems in compliance with all applicable laws. Users are expected to:

  1. Enter the systems through an authorized AUBnet computer account.
  2. Limit the use of AUBnet computing systems to activities related to the mission of the University, including teaching, research, service and patient care. The unauthorized use of AUBnet computing systems for personal profit is prohibited.
  3. Use only licensed software and legally obtained data on AUB computing systems in compliance with license or purchase agreements and copyright or intellectual property laws.
  4. Respect the privacy of others by refraining from inspecting, broadcasting, or modifying personal data files without the consent of the individual or individuals involved.
  5. Understand that usage logs are performed on all backbone systems and that global statistical data is disseminated via AUB Web and/or any other type of media.
  6. Understand that computer activity will be monitored by authorized individuals for purposes of maintaining system performance and security. In instances when an individual is suspected of abuse of computer usage, the case will be reported to the University Administration for appropriate disciplinary actions. The University reserves the right to conduct a full audit that may include an inspection of the contents of the subject's user files.
In addition, users must not:
  1. Tamper with or obstruct the operation of AUBnet computing systems in any way, including disproportionate use of computer resources that hinders access to other users.
  2. Access or use another person's computer account or allow another person to use their account.
  3. Use AUBnet computing systems as a means of unauthorized access to computing accounts or systems inside of or outside of the University's systems.
  4. Use or create invasive software, such as worms or viruses.
  5. Use computer systems to act in what may be perceived of as an obscene or harassing manner.
Forgery or other misrepresentation of one's identity via electronic or any other form of communication is a Fundamental Standard violation. Prosecution under State and Judicial body may also apply.

Failure to abide by this Code may result in temporary or permanent denial of access to AUBnet computing systems and in actions being taken by the appropriate Administrative or Judicial body. (Additional rules may be in effect at specific labs at the discretion of computing facility directors.)

Download the PDF version