Accept User Policy


Sep 2020

1. Purpose 


The National University of Singapore (the “University”) has invested extensively in information technology resources such as campus network, wireless, remote access, servers, storage, telephony, email, computer accounts, personal computers, workstations, software, applications, mobile computing, research computing, databases, data analytics and cybersecurity, etc to facilitate teaching, learning, research, administration, professional development and other functions of the University. This Policy is intended to prescribe the appropriate behaviour and use of such information technology resources by students, faculty, staff, alumni and authorised users in an effective, ethical and lawful manner The National University of Singapore (the “University”) has invested extensively in information technology resources such as campus network, wireless, remote access, servers, storage, telephony, email, computer accounts, personal computers, workstations, software, applications, mobile computing, research computing, databases, data analytics and cybersecurity, etc to facilitate teaching, learning, research, administration, professional development and other functions of the University. This Policy is intended to prescribe the appropriate behaviour and use of such information technology resources by students, faculty, staff, alumni and authorised users in an effective, ethical and lawful manner 


2. Scope 


This Policy applies to the use of information technology resources owned, controlled or managed by the University (‘the IT Resources’). It sets out the parameters of permitted use of the IT Resources and is in addition to any other policies that govern the use of the IT Resources. In the event of a conflict between other policies and this Policy, this Policy shall prevail. 


All users who have been granted access to the IT Resources (‘Users’), including but not limited to students, faculty, staff and alumni of the University, are to comply with this Policy. Contractors, consultants, vendors and contract workers (including their employees, agents and other authorised representatives) (‘Contingent Workers’) hired by a staff or faculty of the University (‘Hiring Manager’) are also to comply with this Policy. Where Users are granted extended access to the IT Resources beyond their terms of employment, for limited purposes connected to the University (‘Extended Account Users’), all provisions of this Policy shall continue to apply with the same force and effect. 


3. Waiver 


When restrictions in this Policy interfere with their research, educational or administrative activities, Users may request for a written waiver from specific clauses from the Chief Information Technology Officer (‘CITO’) of NUS Information Technology (‘NUS IT’). Such waiver shall only be granted in very exceptional circumstances. 


4. General Prohibited Uses 


4.1 Uses In Violation Of Law 


Users shall not engage in any activities relating to the use of the IT Resources that will be in violation of the laws of Singapore, in particular (but not limited to), the Computer Misuse and Cybersecurity Act (Cap 50A), Copyright Act (Cap 63), Patent Act (Cap 221), Trademark Act (Cap 332), Spam Control Act (Cap 311A) and Undesirable Publications Act (Cap 338) as may be amended from time to time. By way of illustration only, some examples of such illegal uses are: 


(i) Downloading, distribution, sharing or storing of (a) seditious or other materials that is likely to cause feelings of enmity, hatred, ill-will or hostility between different racial or religious groups; or (b) obscene or pornographic materials or other materials depicting sex, horror, crime, cruelty, violence or the consumption of drugs or other intoxicating substances that is likely to be injurious to the public good. 


(ii) Downloading, making copies, distribution or sharing of any copyrighted materials or copyright infringing materials without prior permission from the copyright owner and using or making use of the IT Resources to engage in activities which generally infringe copyright and intellectual property rights. 


4.2 Commercial Uses 


Users shall not use the IT Resources for commercial purposes or to offer any commercial services to external parties, unless it is within their scope of employment with the University or with prior authorisation of the University. 


4.3 Undermining System Integrity 


Users must not undermine or attempt to undermine the security of the IT Resources, for example, by ‘cracking’ passwords or modify or attempt to modify the files of other Users or software components of the IT Resources in an unauthorised manner. 


4.4 Unauthorised Access Or Use 


Users shall not access or attempt to access IT Resources to which they have not been given access or permit others to do so. Users shall not intercept or attempt to intercept or access data or communications not intended for them. 


4.5 Tampering Of IT Resources 


Users shall not tamper or in any manner modify the IT Resources that may potentially cause performance degradation, service instability, or compromise operation efficiency, security and fair use of resources. 


4.6 Massive Search Instructions and Data Download 


Users shall not indiscriminately issue search instructions and download data manually or via automated intelligent agents that may potentially consume large amount of network/Internet bandwidth and IT Resources, or which may degrade the network, system and/or database performance. 


4.7 Unauthorised Transmission or Disclosure of Proprietary/Confidential Materials 


Users shall keep in strict confidence any data which the University considers proprietary and/or confidential and use such data responsibly. Disclosure to any external party is prohibited, unless with the prior written authorisation of the University or in accordance with the University’s policies. Any questions on whether any data is propriety and/or confidential shall be directed to IT Care ( 


4.8 Unauthorised Security Scanning 


Users shall not perform security scanning on any IT Resources without authorisation from NUS IT. 


5. Specific Uses Of IT Resources 


5.1 Personal Responsibility 


(i) Users shall not reveal their login, passwords and NUS Smartcard PIN to anyone. 


(ii) Users shall be responsible for maintaining the security of their passwords, NUS Smartcard and NUS Smartcard PIN and all functions performed from the accounts and NUS Smartcard PIN assigned to them. 


(iii) Extended Account Users shall not use the IT Resources, including their extended email accounts, to misrepresent or mislead others regarding their authority and positions in the University. 

(iv) Hiring Managers applying for an account on behalf of a Contingent Worker to access the IT Resources as part of and in the course of the Contingent Worker's work shall ensure that such use by the Contingent Worker is in compliance with this Policy. 


5.2 Network Connection Policy 


(i) Every network connection point shall be connected to one computer only. Users shall not tamper with network points in any way, such as extending the cable to relocate the point to another room or open area temporarily or permanently, thereby blocking it from access by other Users. 


(ii) Users shall not share any network addresses assigned. 


5.3 Software Use, Licence and Copyright 


(i) Users shall not use or install unlicensed software or programs. Users shall not infringe the copyright of any software available over the University network. 


(ii) Users shall comply with contractual obligations, end user license agreements and terms and conditions of use as stated in the software licenses acquired by the University. 


(iii) Software purchased by the University are generally Academic licences. It may be granted to Users for use at home or other locations on non-University owned computers during the course of work or study with the University. Users shall discontinue use and un-install the software from those non-University owned computer(s) upon cessation or termination of employment or matriculation, or upon notification by the University of its termination of the software license agreement.


(iv) Users shall cooperate with NUS IT and be responsible for keeping their systems and software up-to-date in order to prevent exploitation of the IT Resources. 


5.4 Email 


Email is used frequently for correspondence internally and externally for teaching, research, learning, administration or otherwise carry out the functions and purposes of the University. 


(i) Users shall not email or transmit defamatory, threatening or abusive messages or any messages that may be reasonably construed as such. 


(ii) Users shall not send annoying, abusive or unwanted messages to others. 


(iii) Users shall not send unsolicited mass emails within or external to the University, except for purposes specific to the functions and purposes of the University, or which have been approved by a Dean or Director or University representative with equal or higher authority, and in accordance with the requirements of law. 


(iv) Users shall not forward messages containing general appeals or warnings like ‘virus warnings’, ‘request for help’, by mass mail or otherwise. Users should instead send these messages to the University’s NUS IT’s helpdesk for verification. 


(v) Users shall not forge the identity of or impersonate another person in an email. 


(vi) Users shall not knowingly transmit by email any harmful or malicious content (e.g. viruses) or any other content or material that may otherwise violate the civil and criminal laws of Singapore. 


(vii) Users shall not misuse mailing lists to flood an individual, group or the email system with numerous or large emails. 


(viii) Users shall report any suspicious email received to IT Care ( 


5.5 Staff and Contingent Worker Email 


(i) Staff and Contingent Workers may use their University Assigned Email Accounts (as defined in the Guidelines for Acceptable Use Policy for NUS IT Resources) for incidental personal purposes provided that such use does not: 


(a) interfere with the University’s operations; 

(b) interfere with the staff’s employment or other obligations to the University; or 

(c) burden the University with noticeable costs. 


(ii) All Executive and Professional staff, Non-academic staff and Academic Appointment Holder (as defined in Appendix A), shall always use their University Assigned Email Accounts for official correspondence. Staff will compromise the privacy and confidentiality of University data by not using their University Assigned Email Account or redirecting the email message from their University Assigned Email Account. 


5.6 Alumni Email 


(i) The alumni email is a good-will service provided by the University for building close bonds and relationship with its alumni. The University reserves the right to terminate or suspend the service with 90 days’ advance notice if it deems impractical to continue with the service at its sole discretion. 


(ii) Alumni email users shall not transmit messages containing representations that they are current staff or students of the University or are authorized to represent the University in any transaction or matter and/or otherwise to speak on behalf of the University. 


6. University’s Access 


6.1 Conditions of Access 


The University respects privacy and recognises its critical importance in an academic setting. As such, the University does not, in general, intend nor wish to access Users’ data except in the following limited circumstances: 


(i) For identification or diagnosis of systems or security vulnerability and problems in order to preserve the integrity of the IT Resources; 


(ii) Where there are reasonable grounds to believe that a violation of law or a breach of the University’s policies may have taken place, and such access, inspection or monitoring may produce evidence of such violation or breach; or 


(iii) Where specifically allowed or required under the laws of Singapore. 


In the above situations, the University or its representatives may access all aspects of the IT Resources, without User consent. 

Consistent with privacy interests of the Users, University access without the consent of the User will occur only with the approval of President, Provost, or Deputy President or their authorised delegates. 


6.2 User’s Assistance 


Where required, Users agree to provide all necessary assistance to the University or its representatives in relation to the activities stated in paragraph 6.1. 


6.3 Use Of Security Scanning Systems 


Notwithstanding paragraph 6.1, Users consent to the University’s use of scanning programs for security purposes at system and network level for computers and systems that are connected to the University’s network. This is to ensure that any computers or systems attached to the network will not become a launching pad for security attacks and jeopardise the IT Resources. System level scanning includes scanning for security vulnerabilities and virus detection on email attachments. 


7.Enforcement Procedures 


7.1 Complaints/Reports Of Alleged Violations 


Any User who believes that the security of his/her computer account, NUS Smartcard or NUS Smartcard PIN has been compromised or is aware of a violation of this Policy must report the matter to the CITO, who shall investigate the allegation and, if appropriate, refer the matter to the University disciplinary and/or law enforcement authorities. 


7.2 Disciplinary Procedures 


Violations of this Policy will be pursued in accordance with the appropriate disciplinary procedures for students, faculty and staff. 


7.3 Network Connection and Computer Account 


In the event that the situation poses an immediate security threat to the IT Resources or other external systems and jeopardises the reputation, properties or other interests of the University, the University may disconnect the User’s computer or any IT equipment from the University’s network or disable his/her computer account for further pending actions and notify the User accordingly, wherever possible. 


7.4 Legal Liability For Unlawful Use 


In addition to University disciplinary actions, Users may be subject to criminal prosecution, civil liability or both for unlawful use of any of the IT Resources. Users are reminded that unauthorised access to, modification or interception of computer programmes or data can amount to serious criminal offences under the Computer Misuse and Cybersecurity Act (Cap 50A) and general law. 


8. Channel of Recourse 


Any User who suspects that the University or its representatives have made unwarranted access to his or her computer systems may feedback his or her concerns to the President, Provost or Deputy President, who will investigate the report. 


9. Indemnity 


Failure by Users to observe this Policy may result, whether directly or indirectly, in the University being involved in claims and/or suffering damages, losses and expenses. The User shall indemnify the University and its officers from any such claims, damages, losses and expenses resulting from the User's failure to observe any of the provisions of this Policy.


10. Consent to Disclosure of Information 


In addition, the User must understand that the University will cooperate in any official investigations resulting from any breach of this Policy and may, in its discretion, furnish the relevant authorities/parties with the relevant information and User’s consent to any such disclosure shall be deemed by acceptance of this Policy. 


11. Further Guidance 


Further details and examples regarding particular aspects of this policy are found in the Guidelines for Compliance with Acceptable Use Policy for IT Resources (“”). 


12. Changes To Policy 


The University environment is a fast-changing environment and computer technologies and network access may be subject to change at any time. The University reserves the right to amend this Policy or implement additional policies, without the User’s consent, from time to time in the future. Although NUS IT will inform Users of policy changes, Users must share the responsibility of staying informed about the University’s policies regarding the use of IT Resources and complying with all other applicable policies. The current version of the Policy can be found at