###147852369$$$_RedirectToLoginPage_%%%963258741!!!

Web Policies

IIT Jodhpur respects your privacy and is committed to protecting your personal information. This policy outlines how we collect, use, and safeguard your data when you visit our website.

"No copyright protected third party content has been used in the Indian Institute of Technology Jodhpur website”

Material featured on this portal may be reproduced free of charge in any format or media without requiring specific permission. This is subject to the material being reproduced accurately and not being used in a derogatory manner or in a misleading context. Where the material is being published or issued to others, the source must be prominently acknowledged. However, the permission to reproduce this material does not extend to any material on this site which is identified as being the copyright of the third party. Authorisation to reproduce such material is obtained from the copyright holders concerned.

  • Clearer distinction between IIT Jodhpur-owned and third-party content.
  • Emphasis on accurate representation and avoiding misuse of content.
  • Specific guidance on proper attribution, including URL references.
  • Information on commercial use restrictions.
  • Contact information for inquiries.

Objective: The CMAP policy at IIT Jodhpur aims to maintain a high standard of academic integrity and quality across all user-contributed content, ensuring it aligns with the educational mission of the institution while fostering respectful and inclusive academic discourse.

Submission Guidelines: Contributors are encouraged to submit original images, videos, artwork, or other creative content. All submissions must follow the web portal’s creative themes, which include art, designand multimedia.

Content formats allowed: MP4 for videos, JPEG/PNG for images, and PDF/HTML for written submissions.

Following this policy, we provide a role-based Content Management system. This CMS helps the website team by giving role-specific access to the administrator panel to different Users. Admin can create the users by assigning him a particular role and Module to which functions of a particular user are limited. These users are known as web coordinators.

These users would be appointed by the Web Information manager in consultation with concern department/Office/section and they would be responsible for the overall quality and quantity of information on the Website. Policy ensure below mentioned points on website.

  • Website is free from offensive/discriminatory language.
  • Clear and simple language has been used throughout the website.
  • The language is free from spelling and grammatical errors.
  • There is adequate contrast between the text and background color.
  • Alternate text is provided for non text elements (e.g. images).
  • Web pages do not contain any content that flashes more than three times in a second.
  • Web coordinators from various department/Office/section will provide/update the information in bilingual (Hindi and English) which will be verified by Hindi office as per requested.

For various requirements, the portals developed by ERP section of institute will be linked with website. The contact information of relevant office/technical team will be given on portal regarding any queries regarding portal.

Content Archival Mechanism is in place to ensure that all outdated announcements are removed from the website or moved to archive. This will help the website team in ensuring that the expired contents are removed from the main website. The Archival System is available on the Website will transfer the expired content in the archives section as soon as it reaches the expiry date.

The web information manager and the assigned Personnel (web coordinators) will have the responsibility for periodically reviewing the content of the website in respect of their respective domains/department/offices/centers etc. and keeping the information Up to Date.

Links to external websites/portals : At many places on IIT Jodhpur, you shall find links to other websites/portals. These links have been placed for your convenience. IIT Jodhpur is not responsible for the contents of the linked websites and does not necessarily endorse the views expressed in them. We cannot guarantee that these links will work all the time and we have no control over availability of linked destinations.

Links to IIT Jodhpur by other websites/portals : We do not object to you linking directly to the information that is hosted on this web site and no prior permission is required for the same. Also, we do not permit our pages to be loaded into frames on your site. The pages belonging to IIT Jodhpur must load into a newly opened browser window of the User.

Links of IIT Jodhpur portals : As per requirement there are various links will be present on website which is developed by ERP division of institute. The contact information of relevant office/technical team will be given on portal regarding any queries regarding portal.

This website does not automatically capture any specific personal information from you, (like name, phone number or e-mail address), that allows us to identify you individually

We do not sell or share any personally identifiable information volunteered on the website site to any third party (public/private). Any information provided to this website will be protected from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

We gather certain information about the User, such as Internet protocol (IP) addresses, domain name, browser type, operating system, the date and time of the visit and the pages visited. We make no attempt to link these addresses with the identity of individuals visiting our site unless an attempt to damage the site has been detected.

This website is intended to provide information about our academic programs, research activities, campus life, and other initiatives. While we make every effort to ensure the accuracy and timeliness of the information contained here, it's important to understand the limitations outlined below.

  • Disclaimer Information Sources : The content on this website, including news, announcements, and regulations, is derived from various sources within IIT Jodhpur. However, this website is not an official legal document and should not be relied upon.
  • Accuracy and Currency We diligently strive to keep the information accurate and up-to-date. However, errors or outdated information may inadvertently occur. We encourage you to verify any critical information by checking with the relevant department or authority at IIT Jodhpur or consulting other reliable sources.
  • Professional Advice The information on this website is for general informational purposes only and is not intended to be a substitute for professional advice. For matters related to academics, admissions, legal issues, or any other specific concerns, please seek guidance from qualified professionals.
  • Liability IIT Jodhpur assumes no responsibility for any expenses, losses, or damages arising from the use of this website, including indirect or consequential damages, data loss, or service interruptions. This applies even if we are notified of the possibility of such damages.
  • Acceptance By accessing and using this website, you acknowledge and agree to be bound by these terms and conditions. If you do not agree to these terms, please do not use this website.
  • Governing Law These terms and conditions are governed by and construed in accordance with the laws of India.
  • Jurisdiction Any dispute arising out of or relating to these terms and conditions shall be subject to the exclusive jurisdiction of the courts of India.
  • Changes IIT Jodhpur reserves the right to modify these terms and conditions at any time without prior notice. Your continued use of this website following any such modification constitutes your agreement to the revised terms and conditions.
  • Intellectual Property All content on this website, including text, images, videos, and logos, is the property of IIT Jodhpur or its licensors and is protected by copyright and other intellectual property laws. Unauthorized use of this content is strictly prohibited.
  • Links to External Websites This website may contain links to external websites that are not operated by IIT Jodhpur. We have no control over the content of these websites and are not responsible for their content or practices. Your use of these external websites is at your own risk.
  • Privacy Policy Please refer to our Privacy Policy for information on how we collect, use, and protect your personal information. By using this website, you agree to these disclaimers and Terms of Use. If you have any questions or concerns, please contact us.

Under this, the website is monitored periodically to address and fix the quality and compatibility issues around the following parameters:

  • Functionality : All modules of the website are tested for their Functionality for their smooth working.
  • Performance : All important pages of the website are tested for the download time.
  • Broken Links : The website is thoroughly reviewed to rule out the presence of any broken links or errors.

The Hosting Service Provider (IIT Jodhpur) possesses state-of-the-art multi-tier security infrastructure which includes devices such as web application firewall (WAF), intrusion prevention systems and Endpoint Protection that has been implemented in the hosting system.

Increasing complexity of data access due to multiplicity of platforms leads to multiple leakage scenarios while data is being created, accessed and utilized. Network server system , endpoints, application physical environments, and communication are involved in the execution of a data transaction .These elements contribute to the security posture of data. Value associated with data collected by an organization is increasing phenomenally, attracting the attention of adversaries and attackers. Security threats are becoming more organized and targeted , reaping immense benefits out of data compromises .This has led to the increasing concentration of these threats at the data layer.

  • We maintain appropriate security measures to protect your personal information from unauthorized access, alteration, or disclosure.
  • We utilize secure servers and encryption protocols to safeguard your data.
  • We regularly review and update our security practices to adapt to evolving threats.
  • We maintain proper data classification so no sharing of secret &Top secret document is permitted
  • We are also maintaining network segmentation to reduce the attack surface.
###147852369$$$_RedirectToLoginPage_%%%963258741!!!
arrow_downward