- protect the privacy and security of individual users
- ensure the security and reliability of KU Leuven systems and networks as well as third party systems and networks
- safeguard KU Leuven’s reputation as a responsible Internet user
- protect network services
10 commandments of the network user:
- Networks operated by KU Leuven and its partner providers (BELNET, UPC, Iverlek) must not be used for illegal purposes. Any handling (including sending, distributing, providing or storing) of materials through the networks operated by KU Leuven and its partner providers which contravenes Belgian, European and international legislation is prohibited. Examples of unacceptable use include infringements of legislation concerning privacy protection, intellectual property rights, trade name protection or or any action that violates the rights of third parties and / or constitutes a criminal offence.
- Any use of networks operated by KU Leuven and itspartner providers, which causes damage or inconvenience (of any kind) to other users is prohibited.
- Networks operated by KU Leuven and its partner providers must not be used for sending or providing offensive, indecent, threatening or confidential information.
- Bulk sending of unsolicited and undesired electronic messages (spamming) is prohibited.
- Users must not make passwords or accounts required for gaining access to the network available to others (e.g. dial in account, email account, KotNet account).
- It is not prohibited to offer third parties (free or paid) access to the network.
- It is prohibited to connect equipment of third parties to the KotNet network.
- Any attempt to bypass the security restrictions of a host, network or account is prohibited. This includes, but is not limited to, the retrieval of data not intended for the user, the use of a service or account to which the user has no access, the use of sniffing and scanning tools.
- Any attempt to disrupt a service, host or network (denial-of-service attack) is prohibited. This includes, but is not limited to, deliberate attempts to overload a network or host (flooding) and attempts to crash a system.
- It is prohibited to use the network for profitable or commercial purposes unrelated to teaching and research (see http://www.belnet.be).