Policies – Provide/Administrate Shared Computers to Campus Network
The purpose of these policies and guidelines is to define the regulations for providing shared computers to the University’s network and their administration. These regulations are designed to minimize potential exposure of the University and individual user from damages that could result from computers that are not configured or maintained properly.
It is acknowledged that the University IT infrastructure is constantly evolving to meet changing needs of the University and challenges of new technology. These policies and guidelines, therefore, are subject to regular review and amendment.
These policies and guidelines apply to all shared computer systems connected to the University’s network, including, but not limited to, computer systems in departments, units, computer labs, classrooms, communal area, student societies and computer labs in hostels.
The technical support staff of a college/faculty/department/unit/society that provides shared computer systems is responsible of the system administration of these computer systems. In some cases the responsibility of some specific machines may be assigned to departmental staff. Faculty, staff, students and societies who have received explicit permission to connect their personal computers to the campus network via wired or wireless network are assumed having the responsibility to administrate their computers.
The system administrators are responsible for:
Providing both physical security and access authorization services for the computers according to the policies and guidelines provided in this document.
Making sure access and use of the computers are authenticated and authorized.
Tracking users and their respective access authorizations. Access and usage should be monitored and recorded on an on-going basis. End users should be informed about such monitoring and recording in the computer systems that they are using.
Ensuring that all computers have anti-virus software installed and running and should ensure that virus definition files are updated daily or as recommended by the ITSC. Making sure that the shared computer systems are free of malicious software.
Installing the most recent security patches on the system as soon as practical or as directed by the ITSC.
Ensuring that suitable firewall is installed and running and that no unnecessary services are installed.
Conducting auditing on log files on a regular basis and secure the log files.
Reporting any inappropriate use or problems to their respective management committees.
Making sure if disk storage is provided for end users, proper access control method must be implemented to protect user data being accessed by unauthorized person.
Publishing the contact of support and administrators and user reminder, in eye-catching place in a shared computer for end users for enquiry or problem reporting while they are using the shared computer systems.
Taking remedy action within a reasonable period of time following receipt of notification of security vulnerability.
Removing from the network, machines that are infected, compromised, or modified in such a fashion that they are impacting network health.
Users are bound by the ITSC CUHK Campus Network – Policies and Guidelines on Access and Usage.
Users must follow the proper start up procedure or do a system re-start (power-off and then power-on), whenever possible, before using a shared computer system.
After using, users must log off and power off, whenever possible, a shared computer system.
Users should avoid inputting sensitive and personal data at shared computer systems and pay special attention to personal files.
No one should provide shared computers that cannot comply with the policies and guidelines as stated in this document. Violations of policies and guidelines in this document may be dealt with by the University in accordance with such disciplinary codes and/or procedures as are in place, from time to time, in respect of students and/or staff of the University.
User Support Service
Information Technology Services Centre
Version 2, May 2010
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.