The following guidelines are intended for offices in the campus.
A. Use of Office Computers
1) Do not eat, drink, or smoke in front of the office computers.
2) Children should not be allowed to play using office computers. Students should not be allowed to use office computers for their projects and assignments. Student assistants are not exempted from this rule.
3) Sites inconsistent with the vision and mission of the school or not work-related should not be accessed. These sites include pornographic sites, racist sites and other sites, which advocate the violation of human rights.
4) Activities inconsistent with class preparation and / or office work should not be engaged in. These activities include games and non‑work related chatting especially during working hours. Games are not to be installed in any networked computer.
5) Do not install or download software that may damage the configuration of the office computer and / or degrade its performance. Do not alter the settings of the software installed in your computer.
6) Do not keep unnecessary files in the network and in the local drives of office computers. Typically, these files are .MP3, .JPG, .BMP, .TMP, .VBS, and similar types. The CITS reserves the right to inspect these files and take appropriate measures to protect the network.
7) Always keep the office computers’ surrounding areas free of dust and magnets as these may cause computer peripherals such as the mouse, trackball, keyboards, and printer heads to malfunction.
8) Always do regular virus check-up with the updated version of the anti-virus available in the network.
9) Always make sure the office computers are turned off when a power interruption occurs. Wait for five minutes after power has resumed before turning them on.
10) Always use your own designated network account to save personal and official documents and files in the network.
11) Always delete viruses, unnecessary files and old emails from the directories you can access.
12) Always change your password when it has expired. Do not ignore the warning to change your password.
13) Users are encouraged to report any malfunction of the computers or their associated peripherals to the Center through job order forms, email and/or respective contact persons.
14) In reporting problems to the Center, make sure the problems and symptoms are written down as accurately as they were observed (e.g. what you were doing when the computer broke down, what were the messages on the screen when the breakdown occurred).
15) The Center reserves the right to erase files that interfere with the correct operation of the network. It also reserves the right to erase files that are suspected to be in violation of the Intellectual Property Rights Law.
16) Files which cannot be inspected by the anti-virus software because they have been encrypted or rendered unreadable will be immediately erased to protect the network.
17) Only the software and application programs recommended and recognized by the Center will be installed in the office computers. These software and programs are made available in the University servers.