Rules for use

Rules for use of your UCLN account.

Codes of conduct

Statutory

  • Leiden University respects the right to freedom of expression, within the bounds of the law.
  • The use of University facilities is governed by statutory codes of conduct (for example, relating to defamation).
  • Certain forms of computer misuse (such as hacking) are governed by criminal law.
      
Other
  • The University requires all users to observe Regulations on ICT and Internet Use
  • Electronic communication imposes strict demands in the areas of scrupulousness, politeness, etc.
  • Insulting, threatening or obscene language is not permitted.
  • The standard rules relating to written or spoken communication apply equally to electronic communication.

Use of University facilities

Objectives for use

  • It is expressly forbidden to use University facilities for purposes which are not compatible with the objectives of the University.
  • University facilities are primarily intended for teaching and research, which have priority over all other uses.
  • It is forbidden to use University facilities for commercial purposes, unless prior permission has been given.
 
Protecting the University’s reputation
  • External parties will associate your use of University facilities with the activities of Leiden University; they will assume that Leiden University has approved your activities.
  • The reputation of Leiden University may be damaged if you use the facilities provided for purposes not clearly related to teaching or research.
  • To avoid misunderstandings, you should indicate, if appropriate, that you are personally responsible for information disseminated by yourself.
      
Software and hardware
  • Use University facilities with care.
  • It is forbidden to disrupt the effective operation of University computers and networks.
  • The use of University computers or networks should not cause damage for other users.
  • Theft or destruction of University facilities will always be reported to the police.
  • Connecting your own equipment (laptop, USB stick) should not result in disruptions to the network.
  • Laptops may only be connected at those locations indicated. 

Security
  • It is forbidden to by-pass security measures installed by Leiden University.
  • It is forbidden to trace gaps in any security system and/or to make use of these.
  • It is forbidden to penetrate the security of computer systems or to ‘test’ these without prior permission.
  • It is forbidden to disseminate information on security leaks. Report these to the Helpdesk of the Computer Services Department. 
     
Accounts and passwords
  • Each user is personally responsible for the use of accounts and passwords provided to him or her by Leiden University.
  • Passwords are considered to be the private property of a user.
  • It is forbidden to divulge account details to third parties (such as colleagues, students, friends or family members).
  • It is forbidden to give third parties access to University facilities by means of the account  assigned to you personally.
  • It is forbidden, and in certain instances punishable by law, to gain access by unlawful means to secure identification information (such as passwords and PIN codes) of other persons.
  • Attempts to by-pass an account system or unlawful use of the account of another person will be regarded by the University as theft or attempted theft.
 
Communication
  • It is forbidden to send spam.
  • It is forbidden to send chain letters by mail.
  • It is forbidden to pose as another user (for example, by giving a different e-mail address as the sender). Anonymous communication is generally not customary in an academic environment.

Confidentiality

Confidential information

  • Treat all information as confidential (files, mail, log-in information and back-ups).
  • It is forbidden to view or use information, even if the information in question is inadequately protected by the owner.
  • It is forbidden to use unprotected person-related information (such as user name, mail address and opened files) if this involves a breach of privacy.
  • Systematic monitoring of or eavesdropping on computer use is forbidden.
  • It is forbidden to make information from University address books available to third parties.
     
Authorized breaching of confidentiality
Authorized persons may view confidential information in the following cases:
  • Investigation into a punishable circumstance
  • If the rules on usage are broken
  • If legally required to do so
  • If a user calls on the helpdesk for assistance In order to prevent or repair damage

Intellectual property rights

Academic products (computer programs and documents) are protected by copyright. Permission from the author is required before such products can be duplicated, used or distributed. Applying for, viewing, gathering, collating or using such information without the permission of the legal owner may be a breach of the owner’s rights.

Violating the rules for use

Misuse of computer or network facilities will be reported immediately to the Faculty Board or the management of the unit in question, followed by further investigation and/or disciplinary measures. Access to University facilities will be temporarily suspended, pending the investigations.

Liability

Leiden University is not liable for loss of information and time resulting from computer and network disruptions. Leiden University will not provide compensation for loss of personal files, software or hardware resulting from the use of University facilities.

Last Modified: 01-04-2015