Computer Utilization

  1. University computing resources and accounts are to be used only for the purpose of University’s educational, research and administrative activities unless otherwise authorized. All access to Faculties and Departmental computer system must be approved by the Deans, Directors or authorized representative.
  2. Users may not use computing resources for any commercial purpose or any non-university related activities without prior written authorization from the respective person. The continued use of an account after the student enrollment or faculty/staff/associate employment end is considered non-university related activity.
  3. The accounts given by the university must not be used by others without permission from either the computing services (NTU) or the faculty or the department which granted the account. Users are individually responsible for safeguarding their accounts, including proper password protection and appropriate use of Internet resources. The account password are encouraged to be changed at least once per semester, particularly if someone may have seen the password being entered. Users will be accountable for any actions taken by anyone using their account.
  4. University's programs and files are confidential, unless they have been explicitly (either written approval or security systems) made available to the others. Users also should refrain from accessing or copying other user's programs, files, data or documents unless with permission from the owner to do so. NTU reserves the right to access users files when necessary for the maintenance of computing systems, or during investigations of serious matters.
  5. University's computing resource should not be used to intimidate or create an atmosphere of harassment based upon gender, race, religion, ethnic origin, creed, or sexual orientation. Fraudulent, threatening, or obscene email or graphical displays used to harass or intimidate are prohibited. Chain letters, mass mailings, and repeated sending of email after being requested to stop are also prohibited.
  6. Users must comply with the provisions of current Malaysia law relating to pornography and pornographic materials in any form. Accessing local or international sites to obtain obscene and/or pornographic files, pictures, movies, captions or others are considered intentional and are subject to disciplinary actions by the University and other enforcement agencies.
  7. No one should run or install on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to computer viruses, Trojan horses, worms or password cracking programs.
  8. No one should deliberately attempt to circumvent data protection schemes or uncover security loopholes, to damage any computing systems, obtain extra computing resources, take resources from another user, gain access to computing systems, or use computing systems for which proper authorization has not been given.
  9. Users are prohibited from copying software illegally and possessing illegal copies of software, whether for course, job related or private use. Users also not allowed to install, alter or delete any software program from the University's computer unless with authorization from the Deans, Directors or authorize representative. Any violations of this policy or of Copyright law are the personal responsibility of the user.
  10. Any illegal software installed in all PCs and Labs are under the owner's responsibility. NTU is not responsible for any raid taken by the Ministry of Internal Affairs.
  11. Computing resources must be shared among users in an equitable manner. The user may not participate in any behavior that deliberately wasting computing resource. The activities include but not limited to playing games for recreation or idle computer 'chatting' when another user needs the resource for more important activities, exceeding established disk space, time or other allocations, intentionally running programs that attempt to execute endless loops, printing large jobs during periods of heavy computer use, or printing multiple copies of a document.
  12. Users may not attempt to tamper with University's computers, computer systems, networks, facilities, equipment, software, files, documentation, accounts, or information associated with any of them. Users should report any damages of the computer resources either to the NTU or Directors or Deans.
  13. Any activities that intentionally obscuring or forging of the date, time, physical source, logical source or other header information of a message or transaction are prohibited. This includes forging email and masking identification information for amusement, personal gain or any reasons.
  14. University computing resources and accounts may not be used in connection with activities prohibited by any applicable Multimedia University policy or any applicable laws, ordinances, rules, regulations, or orders of any public authority having jurisdiction including, without limitation, those concerning: trademark, commerce, computer usage, conspiracy, telecommunications, defamation, forgery, obscenity and privacy.
  15. NTU will not be responsible for any defects that occur when users plug in any external devices to the University's computers. Any such usage are at the users own risk. At the same time, the users are also expected to indemnify the University in the case that any external devices belonging to them causes defect when connected / plugged in to the University's computers.
  16. Pursuant to the provisions of the Copyright Act 1987 (the Act) no individual student, organization, body or group of students of the University shall for any unauthorized purpose copy / reproduce or cause to copy / reproduce or permit the copying / reproducing or the sharing and / or downloading of any copyrighted material or an attempt to do so whether by use of the University's facilities or outside networks or facilities whether in hard copy or soft copy format, to the extent that it shall prejudice the rights of a copyright owner of any material protected under the provisions of sections 3 and 7 of the Act whether for profit or otherwise save as specifically provided for therein. This shall include but not be limited to any lecture notes, course packs, thesis, text books, exam questions, and any works of authorship fixed in any tangible medium of expression whether provided by the University or otherwise. Any infringement of this rule shall be a strict liability offence.

This policy is subject to change at any time without prior notice.