Sl No. Policy Teaching Staff
    L2 L3 L4
1 Access restriction Only Preconfigured
sites ( white list ) will be available
Black lists denied Black lists denied
2 Web Access and download logging Yes Yes Yes
3 Content Filtering Full Full Limited
4 Internet access time Only on scheduled time Full time Full time
5 Downloads Restricted by size and type Restricted by size and type Restricted by Size
6 Messenger Services No No Yes ( If approved by higher authority)
7 P to P Applications No No Yes ( If approved by higher authority)
8 External E-Mail Access No No Only at scheduled time
9 Bandwidth Limit Limited bandwidth as per availability Fixed Bandwidth  Fixed bandwidth (May peak as per the availability)
10 SMTP/POP3/IMAP other than web mail No No No
11 Games, Entertainment, News papers, E-cards, web chat etc No No No
12 Music/Video Downloads No No Yes ( If approved by higher authority)
13 Ftp, telnet, ssh and other remote login services No No Yes ( If approved by higher authority)
14 File uploads  Restricted Restricted Restricted by size and type
  • The black lists contain the domain names as well as URL’s of objectionable sites.
  • In computer labs, ARL, ACET and other centers one or two computers will have downloading facility
     

Must not: 

  • Use the Internet Services to send out unsolicited e-mail, whether of a commercial nature or not, which degrades the performance of the network
  • Distribute chain letters or multi-level marketing scams;
  • Use the Internet Services to breach the security of another user, or to attempt to gain access to another person’s computer, software or data, without the knowledge and consent of that person or to attempt to circumvent the user authentication or security of any host, network or account, including accessing data not intended for your access, unauthorized logging into or making use of a server or account or probing the security of other networks;
  • Use the Internet Services to interfere with (or encourage others to interfere with) computer networking or telecommunication services to any user, host or network, including denial of service attacks, flooding of a network, overloading a service, or attempting to crash a host;
  • Distribute (or encourage others to distribute) spam-ware, mass e-mailing programs or technologies designed to overburden Internet operations;
  • Use or distribute tools designed for compromising security, such as packet sniffers, ping bombers, cracking tools, password guessing programs or network probing tools;
  • Transmit or disseminate any information or software which contains a virus, Trojan horse, worm or other harmful or disruptive component