Regulations for the Use of Campus Network at I-Shou University Adopted on June 28, 2000 by the University Administration Council Amendments to the Regulations ratified and promulgated by the President on September 1, 2010 Amendments to Article 4 ratified and promulgated by the President on March 21, 2013 Amendments to the Regulations ratified and promulgated by the President on February 13, 2015 Article 1 To bring the functions of campus network (including dormitory network, hereinafter collectively referred to as the “Network”) into full play, enhance the respect for laws and regulations, and set standards for network users to follow, thereby facilitating education and learning, the Regulations for the Use of Campus Network at I-Shou University (hereinafter referred to as the “Regulations”) are hereby established as per the Taiwan Academic Network Management and Regulations and the Ministry of Education Regulations for the Access to Campus Network under the auspices of the Ministry of Education. Article 2 Any information devices which use the Internet Protocol (IP) address of I-Shou University (hereinafter referred to as the “University”) or which are used to access the Internet within the territory of the University are considered part of the campus network of the University. The information devices mentioned herein include but are not limited to computer servers, personal computers, the Network, and mobile information devices. Any individual or unit that uses any of the aforesaid information devices is considered campus network users of the University. Article 3 Network users shall avoid the following behaviors that might get involved in the infringement of intellectual property rights: 1. using computer programs or software without prior consent or authorization; 2. illegally downloading or copying works protected by the Copyright Act; 3. uploading protected works onto public websites without prior consent of the copyright owner; 4. republishing any articles posted on BBS (Bulletin Board System) or any online discussion forums when the author has clearly indicated that no republishing is allowed; 5. setting up a website for the public to illegally download protected works; 1 6. illegally using or abusing Peer-to-Peer (P2P) networking to share software; or 7. any other behaviors that might get involved in the infringement of intellectual property rights. Article 4 Network users are prohibited from getting involved in any of the following behaviors: 1. spreading computer viruses or programs that could cause damage or interfere with normal system operation; 2. intercepting any information transmitted through network transmission without authorization; 3. accessing network resources without authorization by means of cracking, embezzling, or misapplying another person’s user account and password, or disclosing another person’s user account and password to a third party; 4. disclosing his/her user account and password to others without a proper reason; 5. hiding his/her user account or using a fake account, which does not apply to users authorized for the use of anonymity; 6. illegally accessing another person’s emails or computer files; 7. abusing network resources by any means, including the transmission of mass advertising, chain mail or unworthy messages via emails; or interfering with normal system operation by flooding email inboxes or seizing resources; 8. spreading law-violating messages involved with double-crossing, aspersion, humiliation, obscenity, harassment or illegal software trade by means of emails, online chatting, BBS or other similar interfaces; 9. disclosing confidential information; or 10. using the University’s network resources to conduct illegal activities or any activities not relevant to teaching and research. Article 5 To bring the functions of the Regulations into full play, the Office of Library and Information Services will take the following measures for network management: 1. accepting applications for accessing network resources filed by users and assisting network users in establishing a self-discipline mechanism; 2. properly splitting and controlling the network flow; 3. suspending a user’s right to access the Network if the user gets involved in a violation of the Regulations or interferes with the normal operation of the Network; 4. appointing personnel to manage and maintain BBS and other websites; the responsible person should delete the post or suspend a user from accessing the website if the user violates the rules of accessing the website; in case of a major offense, a violation of the University’s regulations or rules, or a violation of laws 2 and decrees, the violator shall be referred to the University or the judicial authorities; or 5. Article 6 any other affairs concerning campus network management. The competent units at the University shall respect network privacy, and shall not intercept personal information without authorization or get involved in the invasion of privacy. Notwithstanding the foregoing, the following are not subject to the restrictions: 1. the maintenance or inspection of system security; 2. acquiring evidence or carrying out an investigation into inappropriate behaviors for cases in violation of the University’s regulations or rules based on reasonable grounds; Article 7 3. in cooperation with an investigation conducted by the judicial authorities; or 4. any other law-abiding behaviors. Network users who violate the Regulations shall receive the following punishment: 1. being suspended from the access to network resources; and 2. receiving punishment or disciplinary actions depending on severity. Violators of the Regulations shall put forward an appeal by following due administrative procedures if they have objections against the punishment. Article 8 The Regulations become effective on the third day of promulgation after being adopted by the University Administration Council and ratified by the President. Note: In the event of any disputes or misunderstanding as to the interpretation of the language or terms of the Regulations, the Chinese language version shall prevail. 3