The General Department of Cybersecurity

General Provisions

To protect data and information and ensure the confidentiality and security of systems at the Islamic University, the following instructions must be adhered to:

• Handle information in accordance with the specified classifications and in line with the Islamic University’s Data Classification and Protection Policy to ensure its confidentiality, integrity, and availability.

• Respect intellectual property rights and refrain from violating the rights of any individual or entity, including avoiding the installation of unauthorized or illegal software.

• Avoid leaving printed documents unattended on shared printers.

• Store external storage media in a secure location to ensure their protection.

• Do not use other people’s passwords under any circumstances, including the passwords of administrators or colleagues.

• Comply with the clean desk policy and ensure that desks and screens are free from any sensitive or classified information.

• Refrain from disclosing Islamic University information to any unauthorized internal or external party.

• Do not publish any information related to the university through media outlets or social media platforms without prior authorization.

• Refrain from using the Islamic University’s systems and assets for personal purposes or for benefits unrelated to the university’s activities.

• Comply with the mobile device security policy when connecting personal devices to the university’s networks.

• Do not bypass the university’s security systems, such as antivirus software or firewalls, without prior authorization.

• Do not allow unauthorized individuals to access sensitive areas except with official approval.

• Immediately report to the relevant department any loss, leakage, or theft of information related to the university.

Adherence to these instructions ensures a secure work environment and protects the Islamic University’s information and systems.