Matters for Cooperation of Ordinary NCKU Staff of All Units

Security Protection for Public Service Computers

  1. Ensure that the logon password shall contain at least 8 characters.
  2. Ensure GCB-compliance in program installation. 
  3. Ensure that the operating systems, browsers, and JAVA (if installed) are in their latest version.
  4. Ensure that firewalls are turned on.
  5. Ensure that Adobe Flash is not installed or has been removed.               
  6. Ensure that antivirus software has been installed and virus scan has been scheduled.
  7. If Adobe Reader is installed, update to the latest version and ensure that the automatic update function is enabled.
  8. Complete 3 hours of cybersecurity general education and training and the test. Click here to link to the course.
  9. Do not post the log on account and password on the desktop screen.
  10. Do not install software of an unknown origin or without authorization.

General Cybersecurity Notice

  1. Protect confidential and sensitive files contained in the information equipment with passwords and do not carry them away from the point of use without permission.
  2. After detecting a computer anomaly (e.g. unknown file encryption, virus attack, or intrusion), immediately turn off the system and disconnect it from the network, and report to the responsible staff to take over within one hour after detection.
  3. Make backups of important data periodically for PC users.
  4. Do not download or share files with Peer to Peer (P2P) software (e.g. BitComet, Ares Galaxy, BitTorrent, e-Donkey, XUNLEI, and others).
  5. When it is necessary to share files with the Network Neighborhood for business purposes, encrypt the folders or files containing confidential data to ensure data access security.
  6. Set reading emails in plain text on email software. Disable the email preview function and automatic HTML mail download function. Check if the mail sending time and contents are suspicious. Do not open mail attachments at will.
  7. When it is necessary to use portable information equipment or portable storage medium of an external source, run virus scan on them in advance to ensure they are free from virus and malware before reading and writing data.
  8. Remove confidential documents and keep them properly immediately after printing, photocopying, or faxing.