Public Computer Usage Policy


Policy No.:ETP-A -25-3                                                                                                                                                                                 Effective:2nd Oct, 2011


KSAU-HS                        King Saud bin Abdulaziz University for Health Sciences

UNIVERSITY                   King Saud bin Abdulaziz University for Health Sciences

EDUTECH                        CorporateOffice of Educational Technology Services

PUBLIC COMPUTER         Computers located in Classrooms, Labs, Libraries, Auditoriums, Tutorial Rooms, Kiosks, lobbies and open computing areas.

IT                                    Information Technology

HDS                                 Help Desk Services – All Regions

USERS                              Students, Faculty, Staff, and Approved Guests


The purpose of this policy is to support the IT Managers in providing reliable computing services for the University student, Faculty and guest users.  This policy is intended to prevent misuse of hardware, software and applications and loss of user data.


The policy applies to all University computer labs, public library systems, hardware, software, and devices that store University related information. It applies to all University Students, Faculty and guest users who utilize the computer labs and public library computers for educational activities


  • Policy: ETP-18-4 Internet Acceptable Use Policy
  • Policy: ETC-27-1 Password Policy
  • E-Mail and Internet Agreement Form 
  • Exhibit: 23-3-1 Software Matrix List
  • Justification Form
  • Temporary Domain Access Form


All users who operate the KSAU-HS computer labs and other public computers, have a responsibility to protect the systems from damage and follow the guidelines as outlined below:

General Policies

  • All public computers throughout the University are for academic, instructional and research purposes ONLY.
  • Public computers are available to users only during computer lab hours of operation and when no classes are scheduled in the rooms. Computers are available on a first come first serve bases.
  • All users are required to sign in using their own username and password.  If this information is lost you can contact the respective College’s HDS in person along with a valid University ID.
  • Edutech is not responsible for any lost, stolen or deleted files.
  • Users are not permitted to install, modify or delete any software on Public computers. Software that comes with textbooks needs to be approved by the HDS before installing the software.
  • Any Equipment in the computer labs is not to be removed, modified, relocated, or disassembled without permission from Lab Assistants.  This applies to other public computers as well.
  • Computers in open labs are not to be left “locked” or unattended for more than 10 minutes. Users waiting to use a computer in an open lab have the right to reboot a computer that has been left locked or unattended for more than 10 minutes.
  • Any unapproved software or hardware on open lab computers will be removed. Users requiring special software should contact Edutech for approval before installation.  
  • All information saved to the desktop or the local hard drive will be erased at logout. All computers will have updates installed weekly and the user will be requested to reboot.
  • If any computer equipment malfunctions, users should not attempt to repair it. All malfunctions should be noted to the regional HDS concerned.
  • Only academic applications are supported on lab machines
  • Departments may request access for a guest by submitting a “Temporary Access Form” to their regional Helpdesk Services.  Access will be granted based on need for a specific period of time, and the department head or Dean will be responsible for the guest’s activities.
  • All IT Managers must ensure that users in their respective colleges have signed the E-Mail and Internet Agreement Form (Form A-23b). All agreements must be accompanied with a photocopy of the user’s badge. Forms received without the badge photocopy will be returned without being processed.
  • Internet access is provided for educational use; visiting sites (viewing or printing) of inappropriate nature or that may be considered offensive by other individuals is not considered acceptable use of this service.
  • Users may not connect any personal computer equipment to the University network without prior authorization from EduTech.
  • Users may not attempt to intercept, analyze, record, or tamper with network data packets.


  • User data files should not be saved on public computers as every public computer hard drive might be wiped clean every time the computer is rebooted. It is the user’s responsibility to back up their data saved on public computers.
  • HDS reserves the right to view or scan any file or software stored on public systems or transmitted from public computing areas over college networks, and will do so periodically to verify that software and hardware are working correctly.


  • Users should submit the print command only once to avoid printing multiple copies of a document. Users should allow adequate time to ensure a successful print job before resending a print command.
  • Users are expected to be conservative in their use of paper and to exercise discretion when printing documents to prevent waste of expensive printing materials.


  • A range of software is available on public computers to Faculty, staff and students as negotiated by Edutech through licensed vendors.
  • No software or “freeware” shall be installed on any of the public computers without consent from the IT Manager.
  • All requests for installation of software in the public computers must be made by submitting a Justification Form to the HDS. 


All users of University computer systems and networks should respect the rights of others and are obligated to safeguard University resources. Abuse and illegal activity should be reported to Edutech immediately.  All reports of abuse and illegal activity will be investigated. All University constituents are obligated to cooperate with investigations of computer network abuse and illegal activity.

Approved By:
Director Corporate, Educational Technology Service
King Saud bin Abdulaziz University for Health Sciences


Related Links