Acceptable Usage Policy

Punakha Dzongkhag ICT Services Acceptable Use Policy


This Acceptable Use Policy (AUP) covers the use of Dzongkhag information and ICT Services. It also includes the use of email, internet, voice and any ICT related equipment. It is designed to help protect other users, and the Internet community, from irresponsible, abusive or illegal activities.

  1. Scope
  1. The AUP applies to all Dzongkhag Network users (any individuals).
  1. AUP Recommendations:
  1. Users are expected to use the Internet services with responsibility and productively. Internet access is limited to job-related activities only.
  2. All Internet data that is composed, transmitted and/or received by the user's computer systems is considered to belong to the Dzongkhag and is recognized as part of its official data.
  3. The services and technology used to access the Internet are the property of Dzongkhag and the Dzongkhag reserves the right to monitor Internet traffic and access data that is composed, sent or received through its online connections.
  4. Official emails should not contain content that is deemed to be offensive such as sexually explicit, discriminatory, defamatory or libellous material.
  5. All sites and downloads may be monitored and/or blocked by ICT section if they are deemed to be harmful and/or not productive to public service delivery.
  6. Users are expected to respect the legal protections to data and software provided by copyright and licenses.
  7. Keep your login accounts and password secure and safe.
  8. Inform the ICT office or Service Provider immediately of any unusual occurrence in the network or in your computer appliances.
  9. Maximum of two devices for each user are permissible unless prior approval is sought from the management.
  10. The Dzongkhag Administration can take any disciplinary or legal action for non-compliance to the AUP policy.
  1. AUP Prohibits the following but not limited to:
  1. Stealing, using, or disclosing someone else's password without authorization
  2. Sharing confidential material, trade secrets, or proprietary information outside of the organization
  3. Introducing malicious software onto the Dzongkhag network and/or exposing the security, sending or posting discriminatory, harassing, or threatening messages or images on the Internet or via official email.
  4. Posting or informing personal views or fake information representing Dzongkhag Administration.
  5. Using computers to perpetrate any form of fraud, and/or software, film or music piracy
  6. Downloading, copying or pirating software and electronic files that are copyrighted or without authorization.
  7. Sending or posting information that is defamatory to the organization, its products/services, colleagues and/or customers of the organization's electronic communications systems.
  8. Deliberate unauthorized access to Dzongkhag networked facilities or services.
  9. Creation or transmission or causing the transmission of pornographic, racist or extreme political nature, or which incites violence, hatred or any illegal activity.
  10. Adding, removing, or modifying identifying network header information in an effort to deceive or mislead.  
  11. Attempting to impersonate any person by using forged headers or other identifying information.
  12. Sending unsolicited commercial email or unsolicited bulk-emails (spam) or junk-mails.
  13. Attempting to circumvent user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for the customer, logging into a server or account that the customer is not expressly authorized to access, or probing the security of service provider servers and networks.
  14. Using any program/script/command, or sending messages of any kind, designed to interfere with a user’s session.
  15. Using the internet as a tool to exploit minors, children’s or as an abusive tool.
  16. Deliberate activities having, with reasonable likelihood, any of the following characteristics:
  1. 3.16.1.        Wasting service provider’s staff effort or networked resources, including time on end systems and the effort of staff involved in the support of those systems;
  2. Corrupting or destroying other users’ data;
  3. Violating the privacy of other users;
  4. Disrupting the work of other users;
  5. Denying service to other users (for example, by deliberate or reckless overloading of access links or of switching equipment);
  6. Continuing to use an item of networking software or hardware after ICT section has requested user not to use because it is causing disruption to the correct functioning of services.


  1. Reporting Violation of the AUP
  1. Any user, who believes that there is a violation of this AUP, shall direct the information to the ICT section with all relevant information and evidence.
  2. ICT section shall take necessary action such as warnings, account cease or account termination to the violator.


  1. Revision of the AUP
  1. Dzongkhag reserves the right to revise, alter or modify this AUP.
  2. Any revision made to this AUP shall be made available to clients and agencies through postal, mail or other certified / registered mail.



  1. Monitoring
  1. Dzongkhag ICTs usually do not monitor Internet services under normal circumstances; however, the section reserves the right to monitor Internet activities if seen necessary to protect the network in general.
  1. Conclusion
  1. All the users under the Dzongkhag Administration are hereby have to adhere to and have to abide by the AUP policy. Failure to comply with the policy or violation of this policy will be liable from revoking access privileges, disciplinary action, appropriate legal action.
  2. Beside this AUP, the user has to abide by any applicable laws, rules and regulations of the Royal Government of Bhutan and liable for the penalties and or administrative action for non-compliance.



Thank You