Security Policies Incident Response Plans

Acceptable Use Policy for Information Systems

Purpose

The purpose of this policy is to define acceptable guide rules for the information systems at the UTAS-Sur to ensure their security, integrity, and appropriate utilization. 

Scope of the Policy

This policy applies to all members of UTAS-Sur, whether on a temporary or permanent basis as well as any third parties working with or contracted by the university, it covers all environments where the university’s information systems are operated.  

 

Executive Responsibility

Information Systems and Educational Technologies Center.

Policy Custodian

‏Assistant Vice Chancellor for UTAS – Sur.

Enforcement

Any violation of this policy by all members or third parties (suppliers, contractors, business partners, etc.) will be subject to disciplinary and legal actions in accordance with the laws of the Sultanate of Oman, including regulations related to cybersecurity, university’s policies, labor laws, and electronic transactions.

Policies and Controls

 General Policies: 

  • Members are allowed to use university information resources strictly for authorized work purposes. 
  • Any unauthorized use, such as personal gain, political activities, or third-party representation, is strictly prohibited. 
  • All data generated, received, or stored using university information systems are the property of the UTAS-Sur 
  • The university reserves the right to monitor and inspect all data, devices and systems without prior notice. 

 

Intellectual Property and Licensing: 

  • UTAS-Sur respects intellectual property rights, including copyrights, trademarks, and software licenses. 
  • Unauthorized copying, distribution, or use of proprietary software or copyrighted materials is prohibited. 
  • The university must maintain records of all software licenses and intellectual property agreements. 

 

Network and System Misuse: 

  • Malicious software, such as viruses or Trojans, into UTAS-Sur systems is strictly prohibited. 
  • Downloading or installing unauthorized or unapproved software is prohibited. 
  • Members must not engage in activities that could be deemed discriminatory, harassing, or politically biased. 
  • Unauthorized access to accounts, sharing passwords, or attempting to bypass security measures is prohibited. 
  • Scanning, monitoring, or attempting to intercept data on the university network without authorization is forbidden. 
  • The passwords should be changed periodically.  
  • It is prohibited to leak any data of students, employees or contractors with the university in any way or under any circumstances without written authorization from the university. 

 

Email and Communication Policy: 

  • Users must not send unsolicited bulk emails (spam) or chain letters. 
  • Email headers must not be altered or forged to misrepresent identity or intent. 
  • Employees should not use personal email accounts for university-related communication. 
  • The university reserves the right to monitor email content to ensure compliance with policies without prior notice. 

 

 Internet Usage Policy: 

  • The university monitors and restricts access to certain categories of websites, such as adult content or illegal sites. 
  • Any misuse of the internet that leads to legal consequences will be subject to disciplinary action. 
  • Users must not assume that access to a website implies endorsement by UTAS. 
  • Users should not store, download, or distribute illegal or unauthorized content. 

Effective Date of the Policy

This policy shall take effect from the approval date.