This acceptable usage policy applies to all users of the HKUST Campus Network and its objective is to ensure that every network user can enjoy a secure and productive working environment.
2. The Network
Access to restricted resources are provided by means of a ITSC Network Account. Users are responsible to maintain a secure password and change it regularly.
In emergency cases, network administrators are authorized to temporarily suspend the access of ITSC Network Accounts.
4. Software Copyright and Licenses
Hong Kong has appropriate copyright and patent laws which govern the use of software and other intellectual properties. The University has also laid down a general policy regarding intellectual properties and software licenses. Users should ensure that all the software (data files inclusive) they install and use does not violate such laws and policies. In particular, users should note the following:
Email is one of the most important tools for administration and communication in this University. The following are common email problems which should be avoided:
Broadcast mail or Mass mail
Sending inappropriate or irrelevant email to a large group of recipients will not only waste the recipients' time and disk space but can also interfere the normal operation of servers and network. Typical emails considered as inappropriate are:
This is equivalent to chain letters, requesting recipient to duplicate a junk mail to others, generating a chain of emails. Users should NOT propagate such mails.
Fake and/or anonymous mail
Email should be sent with the email address assigned by the University. Sending email in the name of others (fake mail) and/or using anonymous mail is considered as acts of dishonesty and could lead to serious disciplinary actions.
Emails should always be written with proper language and observe common courtesy.
Users should not use bad language or harass the recipient.
6. Pornographic and Indecent Materials
The Laws of Hong Kong governing the pornographic and indecent materials also apply to files stored in electronic forms. Illegal storage and distribution of such materials is a criminal offense.
7. Interaction with Other Network Users
There are lots of communications tools and programs which allow network users to communication and interact with other network users. Examples of such tools are email, news-groups, chatting program, send/receive messages, picture/audio/video transmission, phone and fax facilities and so on. In using such communications tools, users should not violate the relevant laws such as those related to discrimination, harassment and slander. Users should also observe good conducts and common courtesy. The Regulations for Student Discipline stipulated in the University Calendar also applies to the misconduct in use of computers.
8. Accessing External Network
Users should be aware that when accessing external network managed by different authorities, different policies and regulations apply.
Depending on the seriousness of the offence, one or more of the following actions could be taken:
For offence against the law of Hong Kong, ITSC will:
The following are the laws related to computer crimes