- Purpose
The campus network provides network services to members of the University to support the academic ,research , administrative activities, e-learning of the University. This policy is formulated to strengthen information ethics, safeguard legal rights and shall be used as the basis of reference for administrators and users of campus network.
- Scope of application
By connecting to the University campus network, the users must agree to the campus network acceptable use policy, and related polices and regulations. Campus networks include teaching networks, administrative networks, wireless networks, dormitory networks and so on (ADSL,FTTB,VPN…).
- Respect Intellectual property rights
Users should respect intellectual property rights and may not engage in any of the following behavior that infringes network intellectual property rights:
1. Use of unauthorized computer programs;
2.Downloading or duplicating copyright-protected work;
3.Publishing protected work online without author consent;
4.Re-posting of any articles from the electronic bulletins or any online forums;
5.Use of peer-to-peer file sharing programs to distribute copyrighted material without authorization.
6.Other behaviour that may infringe upon intellectual property rights.
- Forbid inappropriate or malicious use of network
Network users may not engage in the following behavior.
1.Spreading computer viruses or executing any malicious program to cause interference and/or unusual network traffic.
2.Unauthorized interception of network communications;
3.Deception ,false use or impersonation of any other user’s individual login identification ;
4.Illegal disclosure of login identification.
5.Use of a fake account(s), though authorized anonymous accounts are allowed.
6.Unauthorized access of another individuals e-mail or files.
7.Exploiting network resources to perform malicious actions (i.e. sending spam or other malicious programs) that may adversely affect networks and/or systems.
8.Use of e-mails, online chats, electronic bulletins or other similar features to commit actions that are against social etiquette, which includes but is not limited to the dissemination of rumours, fraud, slander, insult, defilement, harassment, or the threatening of others.
9.Engagement in activities that violate the objective of the campus network.
- About Network management
The network management responsibilities are described as followed:
1.The Backbone network is managed by Information Technology Service center.
2.Each unit should manage its internal network. The assign of IP addresses should be recorded and controlled.
3.In addition to this policy, students using the dormitory internet networks should also obey the rules and regulations as per the “student dormitory network regulation”.
4.Administrators should appropriately divide, control and monitor network usage and flow to allow for equal yet optimal usage of network resources.
5.violation of the policy or abusing network resources will lead to the suspension of access to the University’s computer and network services and possibly disciplinary actions.
6.All application servers (bbs, website) should assign administrator to admin and maintain the services. violation of the regulation will lead to suspension of access to the University’s computer and network services and possible disciplinary action.
7.Users who are aware of any problems regarding network security should report them to the administrator.
- Privacy and Confidentiality
Network management should respect individual privacy. All personal data will be treated as strictly confidential. Only in the following situations will a user or administrator be asked to disclose user data and thereby compromise said confidentiality:
1.For maintenance or inspection of system security.
2.Finding evidence of network resource abuse or infringement of intellectual property rights.
3.In cooperation with investigation(s) conducted by law enforcement officials. As per standard operating procedure, during an investigation of possible criminal activity, investigatore must provide a legal letter to be approved by the Executive Secretary. . Afterwards, all relevant parties will receive notification of the investigation and should cooperate by providing any and all relevant data in accordance with the “Taiwan academic network crime prevention”, “personal information protection law”, “public service”.
4.In case of emergency , necessary and relevant information may be disclosed to address the emergency situation.
5.All information is subject to laws and regulations regarding the conditions for its disclosure.
- Enforcement
Network user’s violation of this policy will lead to:
1.Temporary suspension of network resource privileges. .
2.In serious cases, users may also be subject to University disciplinary action.
3.In addition to the first two provisions of the disciplinary action ,if a user engage in activities prohibited by law, he/she hold the responsibility.
4.This policy has been formulated and approved by the “University Executive Council”. Amendment will also be approved by the “University Executive Council”.
The Chinese version of the document shall prevail in case of any discrepancy or inconsistency between Chinese version and its English translation.