Regulations for the Use of Campus Network at I-Shou University

advertisement
Regulations for the Use of Campus Network at I-Shou University
Adopted on June 28, 2000 by the University Administration
Council
Amendments to the Regulations ratified and promulgated
by the President on September 1, 2010
Amendments to Article 4 ratified and promulgated by the
President on March 21, 2013
Amendments to the Regulations ratified and promulgated
by the President on February 13, 2015
Article 1
To bring the functions of campus network (including dormitory network, hereinafter
collectively referred to as the “Network”) into full play, enhance the respect for laws
and regulations, and set standards for network users to follow, thereby facilitating
education and learning, the Regulations for the Use of Campus Network at I-Shou
University (hereinafter referred to as the “Regulations”) are hereby established as per
the Taiwan Academic Network Management and Regulations and the Ministry of
Education Regulations for the Access to Campus Network under the auspices of the
Ministry of Education.
Article 2
Any information devices which use the Internet Protocol (IP) address of I-Shou
University (hereinafter referred to as the “University”) or which are used to access the
Internet within the territory of the University are considered part of the campus network
of the University. The information devices mentioned herein include but are not limited
to computer servers, personal computers, the Network, and mobile information devices.
Any individual or unit that uses any of the aforesaid information devices is considered
campus network users of the University.
Article 3
Network users shall avoid the following behaviors that might get involved in the
infringement of intellectual property rights:
1.
using computer programs or software without prior consent or authorization;
2.
illegally downloading or copying works protected by the Copyright Act;
3.
uploading protected works onto public websites without prior consent of the
copyright owner;
4.
republishing any articles posted on BBS (Bulletin Board System) or any online
discussion forums when the author has clearly indicated that no republishing is
allowed;
5.
setting up a website for the public to illegally download protected works;
1
6.
illegally using or abusing Peer-to-Peer (P2P) networking to share software; or
7.
any other behaviors that might get involved in the infringement of intellectual
property rights.
Article 4
Network users are prohibited from getting involved in any of the following behaviors:
1.
spreading computer viruses or programs that could cause damage or interfere with
normal system operation;
2.
intercepting any information transmitted through network transmission without
authorization;
3.
accessing network resources without authorization by means of cracking,
embezzling, or misapplying another person’s user account and password, or
disclosing another person’s user account and password to a third party;
4.
disclosing his/her user account and password to others without a proper reason;
5.
hiding his/her user account or using a fake account, which does not apply to users
authorized for the use of anonymity;
6.
illegally accessing another person’s emails or computer files;
7.
abusing network resources by any means, including the transmission of mass
advertising, chain mail or unworthy messages via emails; or interfering with
normal system operation by flooding email inboxes or seizing resources;
8.
spreading law-violating messages involved with double-crossing, aspersion,
humiliation, obscenity, harassment or illegal software trade by means of emails,
online chatting, BBS or other similar interfaces;
9.
disclosing confidential information; or
10. using the University’s network resources to conduct illegal activities or any
activities not relevant to teaching and research.
Article 5
To bring the functions of the Regulations into full play, the Office of Library and
Information Services will take the following measures for network management:
1.
accepting applications for accessing network resources filed by users and assisting
network users in establishing a self-discipline mechanism;
2.
properly splitting and controlling the network flow;
3.
suspending a user’s right to access the Network if the user gets involved in a
violation of the Regulations or interferes with the normal operation of the
Network;
4.
appointing personnel to manage and maintain BBS and other websites; the
responsible person should delete the post or suspend a user from accessing the
website if the user violates the rules of accessing the website; in case of a major
offense, a violation of the University’s regulations or rules, or a violation of laws
2
and decrees, the violator shall be referred to the University or the judicial
authorities; or
5.
Article 6
any other affairs concerning campus network management.
The competent units at the University shall respect network privacy, and shall not
intercept personal information without authorization or get involved in the invasion of
privacy. Notwithstanding the foregoing, the following are not subject to the restrictions:
1.
the maintenance or inspection of system security;
2.
acquiring evidence or carrying out an investigation into inappropriate behaviors
for cases in violation of the University’s regulations or rules based on reasonable
grounds;
Article 7
3.
in cooperation with an investigation conducted by the judicial authorities; or
4.
any other law-abiding behaviors.
Network users who violate the Regulations shall receive the following punishment:
1.
being suspended from the access to network resources; and
2.
receiving punishment or disciplinary actions depending on severity.
Violators of the Regulations shall put forward an appeal by following due
administrative procedures if they have objections against the punishment.
Article 8
The Regulations become effective on the third day of promulgation after being adopted
by the University Administration Council and ratified by the President.
Note: In the event of any disputes or misunderstanding as to the interpretation of the language or
terms of the Regulations, the Chinese language version shall prevail. 3
Download