To protect data and information and ensure the confidentiality and security of systems at the Islamic University, the following instructions must be adhered to:
• Handle information in accordance with the specified classifications and in line with the Islamic University’s Data Classification and Protection Policy to ensure its confidentiality, integrity, and availability.
• Respect intellectual property rights and refrain from violating the rights of any individual or entity, including avoiding the installation of unauthorized or illegal software.
• Avoid leaving printed documents unattended on shared printers.
• Store external storage media in a secure location to ensure their protection.
• Do not use other people’s passwords under any circumstances, including the passwords of administrators or colleagues.
• Comply with the clean desk policy and ensure that desks and screens are free from any sensitive or classified information.
• Refrain from disclosing Islamic University information to any unauthorized internal or external party.
• Do not publish any information related to the university through media outlets or social media platforms without prior authorization.
• Refrain from using the Islamic University’s systems and assets for personal purposes or for benefits unrelated to the university’s activities.
• Comply with the mobile device security policy when connecting personal devices to the university’s networks.
• Do not bypass the university’s security systems, such as antivirus software or firewalls, without prior authorization.
• Do not allow unauthorized individuals to access sensitive areas except with official approval.
• Immediately report to the relevant department any loss, leakage, or theft of information related to the university.
Adherence to these instructions ensures a secure work environment and protects the Islamic University’s information and systems.