- -
Infoacceso Normativa  ...

Remote Access Policy

This service is granted to an individual user and is non-transferable. The user of this service must be a member of the Universidad Politécnica de Valencia.

The user is the unique and direct responsible for the use of the service, and of the access key and passwords custody.

The user must have previously read these rules and fully accept them. The user agrees to make use of the service respecting all the established laws applying to this matter.

The University keeps the right to accept or deny the concession of this service. The same way, the University may revoke this service either temporarily or permanently for technical issues or improper use and establish the corresponding penalties.

The responsible of the devices connected to the UPVnet must make sure they have the security patches installed, antivirus and software and operating system’s updates which are recommended by the ASIC of the UPV.

Some other limitations in the provision of the service may be also established.

This service cannot be used with the aim of obtaining commercial or monetary profit.

The user cannot obtain, in any case, any benefit from the service offer to a third party. The service cannot be used by companies or entities which are not linked to the Universidad Politécnica de Valencia.

The user of this service must respect the copyrights of their owners. This service must not be used to distribute or obtain commercial software, copyrighted video, audio, images, text or any other format, total or partially. The use of this service to propagate destructive, racist, xenophobe or obscene contents, make terrorism apology or any other subject that Universidad Politécnica de Valencia considers inadequate are strictly forbidden.

The Universidad Politécnica de Valencia will have at his disposal access’ control mechanisms. This information will always be available for any supposed illicit activity investigation.

Regulations for the use of the IT services and resources

(articles 4, 5 and 6 extracted from "Regulations for the use of the IT Services and Resources" )


The user is solely responsible for the use of the services and resources offered by UPVnet, and is, any case, responsible for the custody of his password.

The user must immediately notify the Universitat Politècnica de València of any unauthorised use of his password or account or any other security breach. The user must also make sure he is logged out after using the computer equipment.

4.1. Use of resources

Users shall take the utmost care in handling and using computer equipment and all complementary infrastructure.

Computers must not display configurations or operate software or devices that cause problems on the network or other equipment connected to it.

Those responsible for the equipment connected to UPVnet must ensure that they have installed the security patches, antivirus and updates of operating systems and software as recommended by the ASIC of the UPV.

4.2. Password

The user must follow the instructions contained in the "Password Policy of the Universitat Politècnica de València " for the selection and use of their personal keys.

4.3. Servers

Those responsible for the equipment undertake to properly manage their equipment, keeping them up to date and protected against known security threats.

4.4. Prohibition on transmitting services and resources

The transfer or transmission to third parties in any form of the computer services and resources of the UPV is not permitted. In any case, it is forbidden to reproduce, duplicate, copy, sell, resell or make use of the services and resources, nor the use or access thereof, with a commercial or non-profit purpose.

In addition, the rights relating to intellectual and industrial property must also be observed.


Any use contrary to this Regulation, as well as any other rules and conditions of use of the services and computer resources established by the Universitat Politècnica de València or other applicable regulations in this area is not permitted.

In any case, the following shall be deemed as breach of the rules of use of computer resources and the UPVnet services:

a) Exceeding the services for which the account was authorised.

b) Any attempt to search for other user’s access keys or any attempt to find and make use of security flaws in the UPV’s computer systems or outside it, or make use of those systems to attack any computer system.

c) Trying to access the information of another user that is not explicitly made for public access purposes.

d) The creation, use or storage of programmes or information that may be used to attack UPV’s or outside computer systems, in particular programmes for listening to network traffic or for scanning ports, except for those persons expressly authorised to perform these tasks to guarantee the security and operation of the UPV's IT systems.

e) The intentional introduction of viruses, Trojans, worms or any other harmful or malicious software for the correct functioning of the UPV’s IT systems.

f) The use of mechanisms for the manipulation of network addresses or any other use that may affect the topology or the logical structure of the network.

g) Interfering or disrupting the services, servers, or networks connected to the services, or disobeying any requirement, procedure, policy or network regulation connected to the services.

h) Storing, advertising, emailing or otherwise transmitting illegal content of any kind and, in particular, disseminating contents of a racist, xenophobic, pornographic, sexist, terrorist apology, dangerous, threatening, defamatory, obscene, against human rights nature or which act to the detriment of the rights to privacy, honour, self-image or against the dignity of persons.

i) Disseminating contents contrary to the principles set forth in the Statutes of the University.

j) Uploading, storing, publishing, advertising, emailing or otherwise transmitting any content that infringes any patent, trademark, trade secret, copyright or other proprietary rights.

k) Disseminating emails without fully identifying the sender. Should the email account be used by groups of users, the author must be identified.

l) Propagating chained letters or participation in pyramid schemes or similar activities.

m) Using the services for commercial or advertising purposes without express authorisation; therefore, published contents can not contain text, sound, images or links of this nature not even for information purposes.

n) The mass mailing of messages or information that consumes UPV resources in an unjustified manner.

o) Manipulating the headers of email messages to try to hide or falsify the identity of the sender of the message.

p) Installing or using servers or email routers not authorised by the UPV.

q) Stalking or harassingother users.


In the event of failure to comply with this Regulation or any of the applicable regulations, ASIC, in the exercise of its duties, may proceed to the immediate suspension without prior notice of the service rendered and/or temporary and preventive blocking of systems, accounts or networks in order to guarantee the proper functioning of the UPVnet Services.

Subsequently, the Users Committee on Information and Communication Systems of the University shall be in charge on deciding the specific actions to be taken in the event of non-compliance with this Regulation or any other applicable rule.

Notwithstanding the disciplinary, administrative, civil and/or criminal actions that may be applicable in relation to the persons allegedly involved in such breach.

EMAS upv