Terms of Use
Your use of the Qassim University website signifies your acceptance of these terms. If you do not fully accept them, your entry into this website or any sub-site is unauthorized, and you must cease using it immediately.
You agree to use Qassim University's website only for lawful purposes, and that you will not send or broadcast any material through this website that infringes or violates the rights of others, restricts or prevents their use of this website, or is unlawful, threatening, abusive, defamatory, an invasion of privacy, copyright infringement, obscene, offensive to religions and holy sites or violates their sanctity, is otherwise unacceptable for any reason, or encourages the commission of a crime or involves a civil liability, or violates any law.
The Qassim University website and any person involved in the preparation, production, or distribution of any material on this site shall not be held responsible for any direct or indirect material or moral damages arising from the use of this site, the inability to use it, any errors, omissions, or defects contained therein, the inaccuracy of the information provided, or any delay or interruption in its transmission.
– You expressly agree that your use of this site is at your sole risk, and that you assume all risk associated therewith. You agree that Qassim University website does not warrant that the service contained in this site will be uninterrupted or error-free, or that any defects which may exist therein will be corrected, or that the site on which it is provided or the means of its provision are free of viruses or pests of software.
Qassim University website does not bear any financial or legal responsibilities resulting from the use of information contained on the website.
– The services provided by the Qassim University website relate, among other things, to third parties, and the website shall not be responsible for any act or omission by a third party, nor shall it be liable for any damage and/or loss and/or expense incurred by a user and/or any third party as a result of and/or in connection with any act or omission as indicated.
Browsing the site and using its services constitutes your implicit consent that the site may conduct computerized monitoring of your use of its services through “cookies” and/or similar measures. The site may use any of this information for the purpose of monitoring, supervision, development, maintenance of the quality, level, and integrity of services, and/or compliance with the provisions of any law, and/or for its needs, including university services and surveys.
Acceptable Use Policy
1. Acceptable Use of Access Accounts
Passwords should not be shared with any third party.
Passwords should not be recorded or written down in any form.
Users should use work passwords that are different from those used for personal accounts.
Passwords must be changed immediately if there are any indications of a breach or leak.
Passwords must always be changed when logging in for the first time.
Passwords must be at least 8 characters long and include uppercase letters, lowercase letters, numbers, and symbols.
– Users must not share their access to university systems with anyone else.
– Peripheral devices must allow users to enter any non-public facilities using their information or access cards, or by tailgating into these areas.
Any suspicious account activity must be reported to the technical support team immediately.
2. Acceptable Use of Messaging Systems
- Email services must be used for work-related or educational purposes only.
University email should not be used for non-work-related purposes (e.g., blogs, forums).
– Do not open suspicious attachments or links in emails, and report them immediately to the IT support team.
Personal email accounts must not be used to share university data.
– University-provided messaging services must be used for work-related correspondence only.
Confidential data should not be sent via email or instant messaging systems.
– Sensitive data (e.g., password-protected) must be encrypted when sent to external email addresses (non-university addresses).
When sending confidential information via fax, the recipient must be informed in advance, and receipt confirmation requested.
– When sending confidential data via email, the word “Confidential” must be added to the subject line or body of the email.
3. Acceptable Use of Internet and Network Services
– University internet services should not be used to view or download inappropriate or offensive material (e.g., games, questionable websites, and copyrighted material).
– University internet services must not be used to attempt unauthorized access to any external system.
When on company premises, users must only use internet services provided by the Deanship of Information Technology.
When off-site, users must only use trusted internet services.
When connecting to the university's VPN services, users must ensure that the devices used have anti-malware software and updated operating systems.
4. Acceptable Use of Office Equipment
The screen must be locked when the device is left unattended.
Users must not attempt to install any software or hardware without obtaining approval from the Deanship of Information Technology.
Users should not modify the security settings of devices (such as lockout policies, firewall, antivirus software, etc.).
Devices should be positioned to minimize the chance of others seeing the screen while it is in use.
Any suspicious activity or malfunction in security software (e.g., antivirus software) that is observed must be immediately reported to the technical support team.
5. Acceptable Use of Encryption
– Business data should not be encrypted unless required by this policy, or only with formal approval from the data owner and the IT Dean's office.
– Work data can only be encrypted using encryption software provided by the Deanship of Information Technology.
– Upon termination of employment or transfer to another position within the university, users must ensure that all encryption keys they manage are handed over to their direct supervisors.
6. Acceptable Use of Social Media
Accounts representing the university are not permitted on social media platforms without official approval from the General Directorate of Media and Communication.
Users must not post any university-related information on their social media accounts in an official capacity.
Any suspicious activity observed on the university's social media accounts (e.g., account hacking, leakage of sensitive data) must be immediately reported to the technical support team.
7. Acceptable Use of Data and Storage Media
– Highly confidential data should only be stored in lockable offices or centralized storage/archiving facilities; for non-highly confidential data, it may also be stored in office safes and drawers.
Highly confidential or confidential data must be encrypted (using tools provided by the Information Technology Deanship) when stored on removable or portable storage media and deleted immediately after use.
Media containing highly confidential data must not be connected to devices that have not been procured and managed by the university.
Storage media should not be left unattended in public or open areas (e.g., on desks, printers, fax machines, in vehicles, etc.).
– Lock cabinets, drawers, and desks when left unattended (if they contain non-public data or media).
Highly confidential or secret data available to the user must not be shared with other users without the data owner's knowledge and consent.
– Highly confidential, confidential, or restricted data available to the user must not be shared with external parties without the written consent of the data owner.
– Data must not be published or shared publicly without written consent from the data owner.
Confidential or highly confidential data must not be exported from business applications without written consent from the data owner.
– The classification (within the document footer, or its name, for non-editable documents) and the data owner's name (at least, for highly confidential and confidential data) must be added to documents containing highly confidential, confidential, or public data.
– Physical transfer of media containing confidential data must be carried out either by officially authorized university personnel or by approved couriers.
– Media containing non-public data must be wiped (using tools provided by the Deanship of Information Technology) before being reused by another user.
– Paper copies containing non-public data must be shredded when no longer needed.
– Loss of any media containing highly confidential or confidential data must be reported to the IT support team within two days.
8. Acceptable Use of Mobile and Personal Devices
Personal devices must not be connected to the university's wired or wireless internal networks (except for the guest wireless network).
Personal devices must be protected using biometric authentication (e.g., fingerprint); if this feature is unavailable, passwords or patterns must be used.
– Software should only be installed from official and trusted app stores.
Personal device settings should be configured so that all programs and operating systems update automatically.
Personal device settings should be configured to lock if not used for five minutes or less.
– Only personal devices running iOS, Android, or Windows operating systems can be used. .
Personal devices should not be shared with anyone else, unless the device allows for the configuration of isolated profiles or workspaces.
Highly sensitive data should not be stored on mobile or personal devices.
When users are in a public or open area, they should always keep their mobile devices with them.
Mobile devices must not be left unattended in the office unless locked and secured to an immobile object (e.g., via security cables).
– Devices should not be left in cars when exiting the vehicle.
University-issued mobile devices must not be shared with anyone else.
The university has the right to remotely wipe the contents of personal devices if they are stolen, lost, or compromised.
The university has the right to suspend access to any service in case of suspected suspicious behavior, until the incident is investigated and resolved.
Loss or theft of any mobile or personal device must be reported to the technical support team within two days.
Any suspected breach of a mobile or personal device must be reported to the IT support team within two hours.
Users must immediately report any found lost devices to the technical support team (to avoid device content erasure and password resets, if possible).
9. The right to monitor user activities
The university has the right to monitor user activities on systems and services provided by the university, to the extent necessary to ensure the protection of the university's systems and data, while respecting user privacy as much as possible.
10. Responsibility for Reporting Incidents and Vulnerabilities
Users must immediately report to the IT support team any events that are suspected of negatively impacting the confidentiality, integrity, or availability of systems or data (e.g., system breach, data leak, receiving phishing emails, etc.).
Users must immediately report any security vulnerability found in any of the systems or services they are using to the technical support team (for example: the ability to access data they should not have access to).
• The site reserves the right to modify these terms at any time and in the manner it deems appropriate.