The University provides Computer/Internet access for learning, research, and informational purposes. All users of computers and other University resources/materials are expected to use them in a responsible manner and to follow the University’s basic rules and regulations set forth in this this university policies.
University students wishing to use MUT provided access to the Internet must obtain a user Computer & Internet access account at the University computer center service desk located at the Dernaika Bldg. 1st Floor. Each Computer & Internet access account is issued to an individual patron and is keyed to an approved level of Internet access.
All users must sign and agree to abide by the rules set forth in the University’s “Computer and Internet Access Computer & Internet access account” form.
Internet Access Use
All students must have their Computer & Internet access account in their possession, in order to use any computer that provides access to the Internet, Staff cannot and will not override or make exceptions for those students who lose or forget to bring their Computer & Internet access account with them.
Computer & Internet access accounts remain the property of the University. Students who acquire a Computer & Internet access account agree to obey all University rules and regulations. Students who possess a Computer & Internet access account agree to use it only for their personal access and not loan or give the Computer & Internet access account to another individual. Inappropriate use or misuse of a Computer & Internet access account may result in the revocation of Internet access privileges and/or the loss of other University privileges. Persons issued a Computer & Internet access accounts agree to immediately report its loss to Computer Center staff. Although the initial Computer & Internet access account is free, there is a charge for replacement Computer & Internet access accounts.
Conditions of Use
- Use of computer workstations is on a “first come, first serve” basis. However, individual computer time may be limited if others are waiting.
- The University reserves the right to establish sign-up procedures and time limits for use of computer workstations.
- The University will not compromise its computer network security, either internal or external, by incapacitating its security system to allow users to down load files off the Internet.
- If a user feels that a particular site should be blocked, user may request the University to consider blocking said site.
- Printers are linked to each public access computer workstation. Users must receive authorization from University Staff at the circulation desks before printing.
- Damaging or tampering with computer hardware or software is prohibited.
- Attempting to gain unauthorized access to or cause disruption of the University’s computer system or any other computer system is prohibited.
- Violating copyright laws or software licensing agreements is prohibited.
- Displaying or sending obscene images, messages, or files is prohibited.
- Violating Lebanese laws and regulations.
- Submitting messages to, receiving messages from, or otherwise engaging in the use of chat rooms.
- Using Internet workstations to play or participate in electronic games, game rooms, or game sites.
- The University reserves the right to change these restrictions as it finds necessary or appropriate.
Computer/Internet Use Orientation
MUT reserves the right to require all prospective users to attend an orientation session as a condition for the use of the MUT’s computers and/or access to the Internet.
Violation of Policy
Failure to use the Internet appropriately and responsibly as defined in this policy, and/or failure to comply with this or other University rules may result in the suspension of University privileges. Illegal use of University computers may result in criminal prosecution as well.
University staff will ask violators of the University’s Computer/Internet rules to either exit sites or leave the University. Failure to comply with University staff request or confrontation will result in police assistance being requested. If a user subsequently