The following guidelines are supplementary to the state's laws and University's
regulations, and are not intended to cover all aspects of acceptable
use (i.e., you cannot assume that "everything not forbidden is allowed").
- Usage of the university computing and networking resources, including
computers, networks, communication equipment, hardware, software and
files, shall be subject to the following guidelines and to additional
guidelines published from time to time by the Authority for Computation
(Authority for Computation, Communication and Information), on its
- The term "computer" refers to any device capable of performing computations
or of being connected to a network.
- Computers will be used only for academic purposes, or for
administrative purposes directly related to the employee’s
assignments within the university. Authorization is required for
any usage not related to HUJI assignments.
- E-mail sent from any university computer is associated with the
university; therefore, you should avoid any content that might damage
the University or its reputation.
- The access authorization (passwords and/or OTP cards) is personal
and should be kept confidential. You must use your own personal
code when working on university computers. The personal code may not
be shared or transferred to anyone else.
- It is prohibited to use the university computing and networking
resources for any of the following:
- Private, commercial or political purposes.
- Running software or files obtained by illegal means or whose use breaches a copyright law or a third party’s property rights.
- Actions/downloads that breach intellectual property, i.e., copyrights,
patents or performers rights, for example, by installing Kazaa
- Promoting actions that violate the privacy protection law or
violate the criminal law, such as incitement, racism, terror encouragement,
libel, sexual harassment or threatening harassment, distribution
of pornography, etc.
- Writing messages with offensive, slandering or harassing content.
- Gaining unauthorized access to computing or networking resources.
- Network scanning and any other type of "door knocking".
Locating and/or using security holes on computers inside or outside
- Sending "junk mail" - E-mail messages that are not
of interest to the recipient, commercial information and advertisements,
or distribution to a large number of recipients who are not relevant
to the subject of the message (spamming), according to the law and
to the guidance of HUJI's Office for the Legal Advisor:
- Tapping or monitoring communication lines. This is a criminal offense!
- Actions which might damage hardware, software or data.
- Deploying servers that grant services to other users on the university
equipment, except those servers authorized by the Authority for
Computation, Communication and Information.
- Connecting any device to the university's network without prior
permission from the communication team of the Authority for Computation.
- Connecting communication lines to the university’s network.
Such connections will be implemented centrally by the Authority
for Computation only.
- Acceptable use of electronic resources licensed by HUJI:
Access to electronic resources is governed by license agreements
which restrict use to the Hebrew University community. It
is the responsibility of each user to ensure that he or she uses these
products only for individual, non-commercial use without systematically
downloading, distributing, or retaining substantial portions of information.
Acceptable use forbids downloading contents of entire issues of a given
The use of software such as scripts, agents, or robots, is prohibited on
these resources and on most other public or free government sites, and
may result in loss of access to these resources for the entire Hebrew
- Modems may be installed only if they do not allow incoming calls
(except in fax mode). Modems that need to answer incoming calls must
be authorized in advance by the Authority for Computation, Communication
and Information according to Administrative Regulation number 23-001.
- The Authority for Computation conducts checks to locate sources
of excessive traffic in the communication network. Users who
create excessive traffic will be requested to clarify whether their
use of the computing resources complies with section 3 above, and could
be subject to the sanctions described in section 12 below.
- The use of the university computing and networking resources should
be in accordance with the law and with the university regulations.
- A computer connected to the communication network (including connection
from home) must comply with minimum-security rules, which include an
updated operating system and updated antivirus software.
- Users will be held responsible for any loss and/or damage caused
to the university due to unlawful use.
- The Director of the Authority for Computation, as a representative
of the university, has the right to immediately disable or restrict
any account in case of infringement of any of the above guidelines.
- Privacy protection:
Access by university staff to information stored in its systems is
done according to the law and only when required for systems' regular
and proper operation.