Net Usage Policy

This constitutes a SMCHLI System-wide policy for the management of computer data networks and the resources they make available, as well as stand-along computers that are owned and administered by the System. The policy reflects the ethical principles of the System community and indicates, in general, what privileges and responsibilities are characteristic of the System computing environment. Because some networks may operate in environments in which specific items in this policy do not apply, system administrators are free to create policies that are at variance to this one, as long as the principles related to legal use and System mission are preserved. In such cases, it is the responsibility of the system administrators to make relevant variances known to their users.


System: The Saint Michael College of Hindang Leyte Inc. network (SMCnet) is a connection of networks of the member units of the Saint Michael College of Hindang Leyte Inc. (SMCHLI) (referred here as System) and affiliated units.

Network member: A System member or affiliated unit connected to the SMCnet is referred here as a network member.

The SMCHLI Information Technology Services Office (SMC-ITS) is responsible for the connection of the System members and affiliated units to SMCnet and for SMCnet to Internet.

System Administrator: A system administrator is a person or group who has system privileges and is responsible for the operation and security of one or more networked computing resources as determined by the network member.

User: A user is a person who is given exclusive access by the network member to an account on a computer system of the network member. When the phrase "your account" is used, this pertains to the account described above. The network member owns all accounts on its computer systems. A user should only use his/her account for the purposes which it has been issued.

Password: A password is an access code which must be a combination of letters, numbers and special symbols. Each user is responsible for using a good password. A poor password is one that is found in the dictionary or one that is easily related to the user (e.g., name, nickname, birthday, address, favorite food, and the like). A user must not write his/her password on a sheet of paper, notebook, electronic organizer, and the like.

The SMCnet aims to contribute to the realization of the SMCHLI Mission-Vision Statement and for the access to Internet to contribute broadly to educational, research, and economic development in the Philippines.

Acceptable Use
This represents a guide to the acceptable use of SMCnet. Any network member - in order to use the network or any other networks which are used as a result of their SMCnet connection - must comply with this policy and the stated purposes and Acceptable Use Policies of any other networks or hosts used. Each network member is responsible for the activity of its users and for ensuring that its users are familiar with the SMCnet Acceptable Use Policy or an equivalent policy. In addition, it is expected that each member will maintain and enforce its own Acceptable Use Policy. At a minimum, the System expects such policy will include:

  • To respect the privacy of other users.
  • For example, users shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to other users, or represent themselves as another user unless explicitly authorized to do so by that user.
  • To respect the legal protection provided by copyright and license to programs and data.
  • To respect the integrity of computing systems.
  • For example, users shall not intentionally develop programs that harass other users; infiltrate a computer or computing system; send bogus aliases/messages via electronic mail, newsgroups, or any Internet service; and/or damage or alter the software components of a computer or computing system.
  • Use by member units as a laboratory for research and experimentation in computer communications, where such use does not interfere with production usage. However, any experimental use requiring modification to router software or protocol layers below ISO layer 4 requires prior review by SMC-ITS.

Policies and Guidelines
The following policies and guidelines will be applied to determine whether or not a particular use of SMCnet is appropriate:

  • The intent of this policy is to make clear certain uses which are consistent with the purposes of SMCnet, not to exhaustively enumerate all such possible uses.
  • The System may at any time make determinations that particular uses are or are not consistent with the purposes of SMCnet.
  • Computing resource users are encouraged to practice cooperative computing. For example:
  • Regular deletion of unneeded files from one's accounts on shared computing resources
  • Refraining from overuse of connect time, information storage space, printing facilities, or processing capacity
  • Refraining from overuse of interactive network utilities
  • Refraining from use of sounds and visuals which might be disruptive to others
  • Refraining from use of any computing resource in an irresponsible manner
  • Refraining from unauthorized use of departmental or individual computing resources, such as a personal or departmental laser printer or modem.
  • Malicious use is not acceptable. Use should be consistent with the ethical standards accepted by the System community. SMCnet may not be used in ways that violate applicable laws or regulations. Use of SMCnet and any attached network in a manner that precludes or significantly hampers its use by others is not allowed. Examples of unacceptable use include, but are not limited to, the following:
    • Accessing or attempting to access the password of an account that does not belong to you
    • Harassment of other users
    • Libeling or slandering other users
    • Destruction of or damage to equipment, software, or data belonging to the System or other users
    • Disruption or unauthorized monitoring of electronic communications
    • Unauthorized copying of copyright-protected material
    • Violation of computer system security
    • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others
    • Use of bogus aliases
    • Use of SMCnet and Internet services to send information repeatedly (e.g., posting an article in numerous newsgroups; sending electronic mail to several users and/or mailing lists)
    • Use of SMCnet and Internet services to send or attempt to send information forming a chain, pyramid, or similar scheme or artifice
    • Use of computer communications facilities in ways that unnecessarily impeded the computing activities of others (such as randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, and so forth)
    • Academic dishonesty (plagiarism, cheating, et al)
    • Violation of software license agreements
    • Violation of another user's privacy
  • Connections which create routing patterns that are inconsistent with the effective and shared use of the network may not be established.
  • Unsolicited advertising is not acceptable. Advertising is permitted on some mailing lists and newsgroups if the mailing list or newsgroup explicitly allows advertising. Announcements of new products or services are acceptable.
  • Faculty, staff, and students may use them only for purposes related to their studies, their responsibilities for providing instruction, the discharge of their duties as employees, their official business with the System, and other System-sanctioned activities. The use of System computing resources for commercial purposes is permitted only by special arrangement with the appropriate System official or as defined in existing System policies.
  • Use of the network for recreational games is not acceptable when such use places a heavy load on scarce resources.

The System assumes that users are aware that electronic files are not necessarily secure. Users will be informed of methods available for protecting information on SMCnet from loss, tampering, unauthorized search, or other access. Levels of obtainable security will vary depending on the computer system. Information on procedures appropriate to each resource will be available from the SMC-ITS.

In general, the System will treat information stored on computers as confidential (whether or not that information is protected by the computer operating system). Requests for disclosure of information will be honored only under one of the following conditions:

  • when approved by the SMCHLI Administration;
  • when authorized by the owners of the information;
  • when required by the Philippine law.

Except when inappropriate, computer users will receive prior notice of such disclosures. (Viewing of information in the course of normal system maintenance does not constitute disclosure.)

Users of electronic mail systems should be aware that electronic mail in its present form cannot be secured and is, therefore, extremely vulnerable to unauthorized access and modification. Users must take caution in sending information via SMCnet and Internet.

Responsibility of Users
The user is responsible for the correct and sufficient use of the tools available for maintaining the security of information stored on each computer system. The following precautions are strongly recommended:

  • Computer accounts, passwords and other types of authorization that are assigned to individual users should not be shared with others.
  • The user should assign an obscure account password and change it frequently.
  • The user should understand the level of protection each computer system automatically applies to files and supplement it, if necessary, for sensitive information.
  • The microcomputer user should be aware of computer viruses and other destructive computer programs and take steps to avoid being a victim or unwitting distributor of these processes.

Ultimate responsibility for resolution of problems related to the invasion of the user's privacy or loss of data rests with the user. However, a reasonable effort will be made to lessen the impact of such loss or damage.

Account Expiration
Access to the network, especially to the mySMC account, will be discontinued only if a student has any unpaid dues past the payment deadlines at the end of each semester. The student may reactivate the expired online account online after payment.

Remedial Actions
When SMC-ITS learns of possible inappropriate use, SMC-ITS staff will notify the member responsible, which must take immediate remedial action and inform SMC-ITS of its action. In an emergency, in order to prevent further possible unauthorized activity, SMC-ITS may temporarily disconnect that member from SMCnet. If this is deemed necessary by SMC-ITS staff, every effort will be made to inform the member prior to disconnection, and every effort will be made to re-establish the connection as soon as it is mutually deemed safe. Violators of this policy will be subject to the normal disciplinary procedures of the System and, in addition, the loss of computing privileges may result. Violations of the policies described above for legal and ethical use of SMCnet will be dealt with in a serious and appropriate manner. Illegal acts involving SMCnet may also be subject to prosecution by the proper authorities. Any determination of non-acceptable usage serious enough to require disconnection shall be promptly communicated to every representative of the SMCnet member through an established means of publication.

As part of the services available through SMCnet, the System provides access to a large number of conferences, lists, bulletin boards, and information servers. Some of these may contain objectionable material. For those facilities for which the System has control, the policies described here apply. The System takes no responsibility for the content of those entities over which it has no control. Please be aware of the potentially offensive material found in those archives and use the system with the recognition that the System neither assumes responsibility for nor endorses any of the content found therein.

Use of This Document
This document may be used or copied without alteration for information dissemination. It may also be copied or modified to formulate an acceptable use policy for another institution.