Campus Network Acceptable Use Policy

  • Purpose

The campus network provides network services to members of the University  to support the academic ,research , administrative activities, e-learning  of the University.  This policy is formulated  to strengthen information ethics, safeguard legal rights and shall be used as the basis of reference  for administrators and users of campus network.

  • Scope of application

By connecting to the University campus network, the users must  agree to the campus network acceptable use policy, and related polices and regulations. Campus networks include  teaching networks, administrative networks, wireless networks, dormitory networks and so on (ADSL,FTTB,VPN…).

  • Respect Intellectual property rights

Users should  respect  intellectual property rights and may not engage in any of the following behavior  that infringes network intellectual property rights:

1. Use of unauthorized computer programs;

2.Downloading or duplicating copyright-protected work;

3.Publishing protected work online without author consent;

4.Re-posting of any articles from the electronic bulletins or any online forums;

5.Use of peer-to-peer file sharing  programs  to distribute copyrighted material without authorization.

6.Other behaviour that may infringe upon  intellectual property rights.

  • Forbid inappropriate or malicious use of network

Network users may not engage in the following behavior.

1.Spreading computer viruses or executing any malicious program to cause interference and/or unusual network traffic.

2.Unauthorized interception of network communications;

3.Deception ,false use or impersonation of any other user’s  individual login  identification ;

4.Illegal    disclosure of login  identification.

 5.Use of a fake account(s), though  authorized  anonymous  accounts  are  allowed.

6.Unauthorized access of another individuals  e-mail or files.

7.Exploiting network resources to perform malicious actions (i.e. sending spam or other malicious programs) that may adversely affect networks and/or systems.

8.Use of e-mails, online chats, electronic bulletins or other similar features to commit actions that are against social etiquette, which includes but is not limited to the dissemination of rumours, fraud, slander, insult, defilement, harassment, or the threatening of others.

9.Engagement  in activities that violate the objective of the campus network.

  • About Network management

The network management responsibilities are described as followed:

1.The Backbone network is managed by Information Technology Service center.

2.Each unit  should manage its  internal  network. The assign of IP addresses should be recorded and controlled.

3.In addition to this policy, students using the dormitory internet networks should also obey the rules and regulations as per the “student dormitory network regulation”.

4.Administrators should appropriately divide, control and monitor network usage and flow to allow for equal yet optimal usage of network resources.

5.violation of the policy or abusing network resources will lead to the suspension of access to the University’s computer and network services and possibly disciplinary actions.

6.All application servers (bbs, website) should assign administrator to admin and maintain the services. violation of the regulation will lead to suspension of access to the University’s computer and network services and possible  disciplinary action.

7.Users who are aware of any problems regarding network security should report them  to the administrator.

  • Privacy and Confidentiality

Network management should respect individual privacy. All  personal data will be treated as  strictly confidential. Only in the following situations will a user or administrator be asked to disclose user data and thereby compromise said confidentiality:

1.For maintenance or inspection of system security.

2.Finding evidence of  network resource abuse or  infringement of intellectual property rights.

3.In cooperation with investigation(s) conducted by law enforcement officials.  As per standard operating procedure, during an investigation of possible criminal activity, investigatore must provide a legal letter to be approved by the Executive Secretary. . Afterwards, all relevant parties will receive  notification of the investigation and should  cooperate by providing any and all relevant data in accordance with the “Taiwan academic network crime prevention”, “personal information protection law”, “public service”.

4.In case of emergency , necessary and relevant information may be disclosed  to address the emergency situation.

5.All information  is subject  to laws and regulations regarding the conditions for  its disclosure.

  • Enforcement

Network user’s violation of this policy will lead to:

1.Temporary suspension  of  network resource privileges. .

2.In serious cases, users may also be subject to University disciplinary action.

3.In addition to the first two provisions of the disciplinary action ,if a user engage in activities prohibited by law, he/she hold the responsibility.

4.This policy has been formulated and approved by the “University Executive Council”. Amendment will also be approved by the “University Executive Council”.

The Chinese version of the document shall prevail in case of any discrepancy or inconsistency between Chinese version and its English translation.