1. Objectives:

  • To enhance the security of the campus computing system.
  • To standardize the computer access level for different groups of staff.
  • The user responsibility for granting a higher level access right.

2. Eligible Users:

  • All UIC staff.
  • All UIC students.
  • UIC visitors and guests.

3. Applied to all computers that registered with ITSC, it includes:

  • Office computers.
  • Classroom computers.
  • Laboratories computers.
  • General/public access computers and etc

4. Access level definition and classification

Advanced System User
Accessible Areas
  • Adding and removing hardware accessories.
  • Setting BIOS.
  • Installing and uninstalling operating system software.
  • Configuring system security such as firewall, antivirus software.
  • Configuring system network.
  • Managing user group account.
  • Installing and configuring printer.
  • Installing and uninstalling application software.
Password Management
  • BIOS settings password.
  • System security password.
  • System administrator password.
Eligible Users ITSC system support engineers.
System User
Accessible Areas
  • Configuring operating system.
  • Managing user group account.
  • Setting system network.
  • Installing and configuring printer.
  • Installing and uninstalling application software.
  • Using application software and printer
Password Management

System administrator password.

Eligible Users
  • ITSC system support engineers.
  • Administrative or teaching staff that are authorized by ITSC.
Advanced User
Accessible Areas
  • Managing user group account.
  • Installing and uninstalling application software.
  • Installing and configuring printer.
  • Using application software and printer.
Password Management

Power user password

Eligible Users

Administrative or teaching staff that are authorized by ITSC.

User
Accessible Areas
  • Using application software and printer.
  • Changing of personal profile includes password, desktop settings and etc.
Password Management User password
Eligible Users Administrative or teaching staff.
Guest
Accessible Areas

Using application software only

Password Management Nil
Eligible Users UIC’s Visitor

5. Rules and Regulations

5.1. At all times ITSC reserves the right to review, suspend or terminate any user access right.

5.2. By default all UIC staff, students, classroom and laboratories computer users are granted the user level access right.

5.3. Any user requires a higher access level for improving their job productivity must submit an application form to ITSC and the application is subject to the unit head and ITSC approval.

5.4. Higher access level user must have the adequate computer system maintenance knowledge.

5.5. User who granted the access level higher than the USER LEVEL ACCESS RIGHT must strictly obey the followings rules;

5.5.1. Only using the higher level access right when necessary, user should use the user level access right in the daily operation.

5.5.2. Do not remove or amend any user account that set up by ITSC.

5.5.3. Do not uninstall or remove any computer security or system management software from the system.

5.5.4. Installing of illegal, pirated or sexually suggestive software is strictly prohibited.

5.5.5. Copying, storage, transmission and use of unlicensed copyrighted software are strictly prohibited.

5.5.6. The user must fully responsible for any confidential information or data leaking and losing due to the software installed in their system.

5.5.7. The user must responsible for their system software upgrade and maintenance.

5.5.8. The user must ensure the computer is protected with up-to-date anti-virus software. In additional the user must also apply the latest software security patches and service packs to their computers to prevent network intrusions or attacks exploiting the weaknesses of the computers.

5.5.9. The user should not provides services such as:

5.5.9.1. Sharing neither IP address with other computers nor use static IP address.

5.5.9.2. Online services such as game server, etc.

5.5.10. The user should not perform abusive activities towards other computers within or outside UIC. Such abusive activities may include but not limited to, performing port scan on other computers, sending SPAM mails to other internet users, depositing or connecting to Trojan horse type of software on other computers.

5.6. The user shall be personally liable for the maintenance of the user account and computer to prevent the occurrence of any of the above mentioned events.

5.7. Users are reminded that any violation of the above mentioned rules, ITSC reserves the right to terminate the user access right.

Download: Computer System Administrative Right Application/Termination From