University

Safe Usage Policy

Accuracy and Guarantees

All information provided on the Islamic University website is owned by the university, and best practices are implemented to ensure the quality and updating of information.

Website Availability and Accessibility

The Islamic University makes every possible effort to maintain the operation and availability of the website for all users, including students, employees, and visitors, in a smooth and efficient manner.

Links to Other Websites

Our website may contain links related to other websites on the internet. Therefore, the Islamic University is not responsible for the content of these websites, and browsing them through any link available on the university’s website is at the user’s own risk.

User Agreement

The user agrees not to use, encourage, facilitate, or guide others to use the services in the following ways:

  1. Engaging in or promoting activities that violate any law, regulation, governmental decision, royal decree, legal agreement, or published policies issued by the authority.
  2. Accessing any service or system or searching for vulnerabilities without authorization, including but not limited to, breaches, security vulnerability scanning, or penetration testing.
  3. Disrupting, interfering with, or circumventing any aspect of the service, or violating any security or authentication measures used by the system or service.
  4. Any theft of resources, including sensitive information.

Key Principles and General Rules for Data Sharing

  1. We provide publishable data from its correct sources and ensure no duplication or conflict with any other data.
  2. We provide data for practical purposes that serve public interests without causing harm to the activities of entities, individual privacy, or environmental safety.
  3. Data access is granted to qualified individuals.
  4. All necessary information for data exchange is made available, including required data, the purpose of its collection, means of transfer, storage methods, protection measures, and disposal mechanisms.
  5. Security controls specified in the data exchange agreement are applied.
  6. Appropriate security measures are applied to protect and share data in a secure and reliable environment in accordance with relevant regulations and legislations.
  7. Ethical practices are applied during the data-sharing process to ensure its use within the framework of justice, integrity, honesty, and respect.