ICT Training and Awareness
The University’s mission can be understood broadly as including education, research, self-training, and discussion on a wide range of subjects, not just those immediately necessary for a person’s job or course of study. In this context, University employees are still accountable for how they use time and equipment at work. The University’s ICT Resources are provided to departments, faculty and schools in support of their academic mission. ICT Services department encourages the use of these resources and makes them widely available to the University community. Nonetheless, their use constitutes acceptance of this policy and is subject to the following requirements.
- Users must comply with all applicable Acts of Parliament and jurisdiction by laws as they may apply.
- All users shall share ICT resources in accordance with policies set for the ICT resources involved, giving priority to more important work and cooperating fully with the other users of the same resources.
- All users in designated departments will be subjected to staff employment termination procedures as prescribed by the University under HR Management regulations.
- Users must seek permission or have approval from the owner of an ICT resource or head of department concerned to read, alter, or delete another person’s computer files or electronic mail. Where this is not possible, the approval may be obtained from the ICT Director in consultation with a senior member of University Management. Preferably a member of the Management Board.
- Various policies permit members of the University community to earn additional income by writing books and articles related to their academic work, and to use University resources for this purpose, including ICT resources. Staff shall be permitted to use these Resources for outside consulting jobs provided the University is reimbursed for costs incurred. All such uses must be approved by their head of department.
- Whilst the University network is being used to access outside networks, any abuses against such networks will be regarded as an unacceptable use.
- Users are responsible for the security of their files in the University computers. This includes ensuring its privacy, confidentiality, integrity and availability of the files. ICT Services department provide security control mechanisms to secure files and information in the university’s systems and computers. However, for the controls to be effective it is expected that users shall observe security control procedures and directives.
- Users shall take full responsibility for information that they transmit through the University ICT Resources. The Management Board reserves the right to order the screening and eventual filtering or blocking of users’ access privileges to ICT resources whenever the need arises.su
The University grants the use of its ICT Resources to numerous organizations whose activities contribute to its mission, such as student organizations, professional societies, and the campaign for charities.
- The University ICT Resources must not be provided to individual consumers or organizations that do not support the mission of the University. In this respect any other use of ICT Resources must have been granted permission by the ICT Director acting on behalf of the Management Board.
- Users shall not modify or reconfigure software or hardware on any University computer or network facility without proper authorization.
- Users must not move any ICT Resources without prior permission of the designated owner and/or the Director of ICT Services.
- No user shall copy, install, or use any software or data files without authorization from the Director of ICT Services or in violation of applicable copyrights or license agreements.
- The University ICT Resources must not be used for the following activities:
- The creation, dissemination, storage and display of political campaigns, personal fund-raising, commercial enterprises, mass mailings.
- The creation, dissemination, storage and display of obscene or pornographic material; indecent images; hate literature; defamatory materials or materials likely to cause offense to others; and any data that is illegal.
- The downloading, storage and disseminating of copyrighted materials including software and all forms of electronic data without the permission of the holder of the copyright or under the terms of the licenses held by the University.
- Any activities which do not conform to the Kenyan Laws and other University guidelines and policies regarding the protection of intellectual property and data.
- The deliberate interference with or gaining illegal access to user accounts and data including viewing, modifying, destroying or corrupting the data belonging to other users.
- Use of a username and password belonging to another user.
- Attempts to falsify your identity, or to pretend of having a different affiliation with the University when using University ICT Resources.
- Attempts to crack capture passwords or decode encrypted data unless supported by genuine business needs as authorized by the Director, ICT Services
- Any other use that may bring the name of the University into disrepute or expose the University to the risk of civil action.
- Intentional creation, execution, forwarding or introduction of any viruses, worms, trojans or software code designed to damage, self-replicate or hinder the performance of the University network.
- Deliberate actions that might reduce the effectiveness of any antivirus or other ICT security controls installed by authorized University staff.
- Purposefully scanning internal or external machines in an attempt to discover or exploit known computer software or network vulnerabilities.
- Engaging in commercial activities that are not under the auspices of the University.
- Using computing resources (cpu, time, disk space, bandwidth) in such a way that it causes excessive strain on the computer systems or disrupts, denies or create problems for other users.
- Connecting any computing device to the University network unless it meets the security standards established by University ICT Services department.
- Administrative Computing systems are those system applications that deal with financial, academic, administrative, or other business information that is an integral part of running the business of the University.
- Administrative systems may constitute all applications developed at Strathmore University, acquired from external vendors, built from open-source components, as well as those extended from existing or purchased applications, whether the systems are developed in central offices, in schools or in departments.
- Every administrative computing system at Strathmore University must have a designated Business Owner who ensures that the system meets the business needs of the University and is appropriately available, secure and sustainable.
- System owners have the responsibility to ensure that each system meets its functional requirements, is appropriately documented, is secure and controlled, has been adequately tested, and is maintainable.
- This policy applies to any application that affects more than one person’s job responsibilities.
- Standards do apply for the development and/or acquisition of Administrative Computer Systems and Applications in the University.
© 2023 Strathmore University ICT Services
CONTACT US
Central Building
support@strathmore.edu
Ext 2236, 2251, 2157, 2437
+254 703 034000/236