Skip Ribbon Commands
Skip to main content
(Approved by the Committee on Information Services and Technology on 16 April 2007)
  1. The use of the IT network is governed by the University's “Policy on Use of IT Services and Facilities" and the following regulations.
  2. Users must not attempt to disrupt or degrade the performance of host systems, any device on the network, or any IT service delivered over the network.
  3. Loopholes in network security systems or knowledge of special passwords etc. must not be used to gain access to any service or any resource on the network for which proper authorisation has not been given.
  4. Users who are aware of any problems on network security should report such to the CSC Help Desk.
  5. Users must not create or distribute malicious software codes on the network, and should take all reasonable precautions to prevent such actions.
  6. Users must not connect or disconnect networking equipment (e.g. bridges, routers, repeaters, protocol analysers, data loggers, transceivers, Wireless LAN device , etc.) to or from the production network without proper authorization.
  7. Users must not conduct network experiments on the University network such as demonstrating network vulnerabilities, generating network traffic which will lead to depletion of its available bandwidth, or setting up phishing sites , etc . unless proper authorization has been given.
  8. All computers directly reachable from the Internet or Intranet (i.e., not connected to a private or standalone network) must use only University-approved IP addresses/node names/domain names in order to avoid conflicts which might result in disruption of normal operation of the network. Please refer to the "IP address registration" and "Domain Name System Policy and Guidelines".
  9. Users must register in advance with the CSC (a) for any network server or communication link installed on campus through which IT service, accessible by remote user, is offered, or (b) for any IT service that is offered to staff and students but hosted by external service providers.
  10. Without prior approval from the CSC, users must not perform network scanning or port scanning, on production network.
  11. These regulations may be revised from time to time by the University.