規則辦法
國立雲林科技大學個人電腦及網路使用注意事項 Guidelines for Personal Computer and Internet Use at National Yunlin University of Science and Technology
- 資料來源:雲林科技大學圖資處
- 日期:2025/04/30
國立雲林科技大學個人電腦及網路使用注意事項
97 年 06 月 03 日第 10 次行政會議通過、核定實施
109 年 07 月 28 日秘書室提出法規審議層級異動通過
第1條 國立雲林科技大學(以下簡稱本校)為有效規範本校個人電腦及網路資源有效使用、管理及資訊安全,特訂定本注意事項。
第2條 本校教師、行政人員及學生使用本校個人電腦者,應遵守下列規定:
- 禁止使用未經授權之電腦軟體。
- 請勿任意拆卸或加裝其他電腦設備 、網路設備如集線器、無線網路發射器等 。
- 不可擅自更改系統環境設定。
- 密碼須經常更換,長度應至少 6~10 碼。
- 電腦設備不可任意架站或做私人、營利用途。
- 電腦設備應隨時保持清潔,每週至少擦拭一次。
- 電腦附近請勿放置茶水、飲料、細小文具用品等物品,以免造成電腦設備損壞。
- 使用外來檔案,應先掃毒,請勿任意移除或關閉防毒軟體。
- 下班時(下課時)電腦應依正常程序關機始得離去。
- 應配合進行軟體更新,修補漏洞,保持更新至最新狀態,勿自行關閉系統自動更新程式。
- Internet Explorer 等相關瀏覽器安全等級應設定為預設值或更高 ,執行特殊程式如須降低安全性,需先確定特殊程式無安全顧慮。
- 電子郵件軟體應關閉收信預覽功能,請勿任意開啟不明來源的電子郵件。
- 電腦應使用螢幕保護程式,設定螢幕保護密碼,並將螢幕保護啟動時間設定為 10 分鐘以內。
- 請勿開啟網路芳鄰分享目錄與檔案,並停用 Guest 帳號。
- 請勿任意下載或安裝來路不明、有違反法令疑慮(如版權、智慧財產權等)或與業務無關的電腦軟體。
- Microsoft Office 軟體應將巨集安全性設定為預設值或更高,執行特殊程式如須降低安全性, 需先進行安全檢查及管理確定特殊
程式無安全顧慮。 - 禁止使用點對點互連 ( 軟體及 tunnel 相關工具下載或提供分享非法或侵犯智慧財產權之檔案(學術用途,如研討會上傳下載檔案
不在此限 )。 - 禁止閱覽不當之網路(如暴力、色情、賭博、駭客、惡意網站、釣魚詐欺、傀儡網站等)及瀏覽非研究、學術與公務用途網站,以避免內部頻寬壅塞,各單位主管應加強督導同仁使用網路情形。
- 各單位主管應加強督導同仁使用電子郵件(Webmail)情形,以避免社交工程、網路釣魚與網路漏洞產生。
- 禁止於上班時間透過網路資源進行與工作內容無關之串流媒體、MP3 、圖片、檔案等網路上的傳輸,非上班時間(中午休息、下班
後)的使用,亦不得影響單位內主要系統運作之效率。 - 上網行為需以不影響各主系統之網路效能為前提,若有資源上的衝突,將以本校主要系統為主。
- 電腦內重要資料文件應定期備份,避免資料毀損。
- 機密性敏感性檔案資料應進行加強安全防護(如防火牆等)或實體隔離(與外部網路隔絕)。
- 各單位應每年不定期進行內部稽核 。
第3條 本注意事項經本校資訊科技服務指導委員會通過陳請校長核定後公佈實施,修正時亦同。
Guidelines for Personal Computer and Internet Use at National Yunlin University of Science and Technology
Approved and implemented at the 10th Administrative Meeting on June 3, 2008
Amendment of regulation review level approved on July 28, 2020, as proposed by the Secretariat
Article 1
National Yunlin University of Science and Technology (hereinafter referred to as "the University") has established these guidelines to effectively regulate the use, management, and information security of personal computers and network resources at the University.
Article 2
University faculty, administrative staff, and students who use the University's personal computers must comply with the following rules:
-
Unauthorized software is strictly prohibited.
-
Do not dismantle or install additional computer or network equipment such as hubs or wireless access points without permission.
-
Do not change system environment settings without authorization.
-
Passwords must be changed regularly and should be 6 to 10 characters long.
-
Computer equipment may not be used to host servers or for personal or commercial purposes.
-
Keep computer equipment clean; it should be wiped down at least once a week.
-
Do not place drinks, liquids, or small stationery items near the computer to avoid damage.
-
Always scan external files for viruses; do not disable or remove antivirus software.
-
Computers must be properly shut down after work (or after class) before leaving.
-
Software should be kept updated with the latest patches; do not disable automatic updates.
-
Browser security settings (e.g., Internet Explorer) should be set to the default or higher. Lowering the security level for special programs should only be done after confirming there are no security risks.
-
Disable email preview in mail software; do not open emails from unknown sources.
-
Enable screen savers with password protection and set activation time to within 10 minutes.
-
Do not enable file sharing or shared folders through network neighbors; disable the Guest account.
-
Do not download or install suspicious or unauthorized software that may violate laws (such as copyright or intellectual property rights) or is unrelated to work.
-
In Microsoft Office, macro security should be set to default or higher. Lowering security should only occur after a security check confirms no risks.
-
Use of peer-to-peer (P2P) software or tunneling tools for downloading or sharing illegal or copyright-infringing files is prohibited (academic uses, such as uploading/downloading files for conferences, are exempt).
-
Accessing inappropriate websites (e.g., violent, pornographic, gambling, hacking, malicious, phishing, or botnet sites) is prohibited. Non-research, non-academic, and non-official browsing is also forbidden to avoid network congestion. Supervisors must monitor their staff's internet usage.
-
Supervisors must ensure proper use of email (Webmail) to prevent phishing, social engineering, and cyber threats.
-
Using internet resources for unrelated streaming, MP3s, images, or file transfers during working hours is prohibited. Even during breaks or after work hours, such use must not impact the performance of core systems.
-
Internet usage must not degrade the performance of key systems. In the event of resource conflict, priority will be given to essential systems.
-
Important data on computers should be backed up regularly to prevent data loss.
-
Sensitive or confidential data should be protected with enhanced security (e.g., firewalls) or physically isolated from external networks.
-
Each department should conduct internal audits on an irregular basis at least once a year.
Article 3
These guidelines shall be implemented upon approval by the University's Information Technology Services Steering Committee and the President. Amendments shall follow the same procedure.