Policies & Regulations

The Hong Kong University of Science and Technology (Guangzhou) Privacy Statement
01
Introduction

The Hong Kong University of Science and Technology (Guangzhou) (hereinafter referred to as "we") is committed to protecting the privacy and security of personal information of all faculty, staff, students, visitors, and partners (hereinafter referred to as "you") in all its operations.

We are committed to strictly complying with applicable laws and regulations (hereinafter referred to as "Applicable Laws"), taking corresponding security protection measures, and endeavoring to protect the security and integrity of your Personal Information.

This Statement is applicable when you register, use or visit our Systems, Official Websites, Official Apps and Official Social Media Platforms (hereafter referred to as “Official Services”). We will process (incl. collect, store, use, process, transfer, provide, entrust process, disclose, share, transfer and delete etc.) your personal information in compliance with applicable laws and this Statement. 


Before using our Official Services, please make sure you have thoroughly read and understood all the terms and conditions of this Statement, especially the terms marked in italics. When you use our official services, it is deemed as you have read, understood, and agreed to this Statement and its updated versions, and you consented us to collect and process your personal information in accordance with this Statement.

Please note, this Statement does not apply to products or services provided to you by other third parties through our official services nor to the Personal Information provided to the third parties by you, you shall check their relevant policies accordingly.

02
How We Collect and Use Your Personal Information

Personal Information refers to various information recorded by electronic or other means related to identified or identifiable natural persons, excluding data that are anonymized. We only collect and use your Personal Information and sensitive Personal Information (collectively referred to as "Personal Information") for lawful, legitimate, necessary, and specific purposes.

 

1.1 Information You Actively Provide to Us

When you register for and use our Official Services, you may need to provide us with necessary Personal Information. The specific types of information collected and the purposes will be clearly communicated to you through the corresponding "Personal Information Processing Notice and Consent Form" or separately in specific scenarios.

 

1.2 Information Automatically Collected During Interaction with Us or Using Our Official Services

To ensure the secure and stable operation of our Official Services, optimize service experience, and conduct necessary statistical analysis, we may automatically collect certain information about you:
1. Device and Network Information: We will collect relevant information about your device when you use our Official Services, including device type, name, model, or identifier; type and version of operating system or browser; language settings, IP address, network service provider;
2. Interaction Information: Information submitted directly to us when you use our Official Services or interacting with us, including your request for information, the  inquiries you enter or questions/information you raised;
3. Log Information: When you use our Official Services or view its contents, we will automatically collect and store necessary log information, including visit time, access path, IP address, event information.

 

1.3 Information From Third Parties and Open Sources

Where permitted by Applicable Laws, we will also collect data from open sources or third parties. We may also collect and use non-identifiable data, which is the data that cannot be used to identify a specific person, such as aggregated statistical data. And in our sole discretion, we may collect, use, process, transfer or disclose those non-identifiable data for specific purposes. We will make every effect to differentiate your Personal Information and non-identifiable data and use them separately. If non-identifiable data is mixed with Personal Information, it will still be regarded and processed as Personal Information.

In order to better operate our Official Services, we will notify you and obtain your consent before processing your Personal Information when the type of the Personal Information to collect or the way to process the Personal Information is beyond the scope of the above, or use for other purposes not specified in this Statement.

03
How We Use Cookies

To ensure the normal operation of our official services and optimize your access experience, we may sometimes store small data files called Cookies on your computer or mobile device. A Cookie is a plain text file stored on a computer or mobile device by a web server. Cookies typically contain identifiers, site names, and some numbers and characters. We use Cookies mainly for:

1) Authentication: Remembering your login status to simplify repeated login steps.

2) Preference Settings: Saving your personalized settings such as language and font size.

3) Analysis and Improvement: Understanding your usage habits to evaluate and improve our services.


We will not use Cookies for any purposes other than those described in this Statement. You can manage or delete Cookies according to your preferences. Most browsers offer functions to block or clear Cookies. However, please note that disabling Cookies may affect your complete experience with some of our services.

04
How We Retain and Protect Your Personal Information

In principle, Personal Information collected and generated within the People's Republic of China will be stored within the territory. For specific situations regarding cross-border transfer, please refer to Article 7 of this Statement. We attach great importance to security of Personal Information. We employ appropriate physical, administrative, and technical safeguards to protect your Personal Information from unauthorized access, disclosure, use, modification, damage or loss.


We will retain your Personal Information for a reasonable period necessary to achieve the purposes, unless extension of the retention period is required or permitted by Applicable Laws. The criteria we use to determine the retention periods include: the time for which Personal Information needs to be retained for the purpose of processing; whether users agree to a longer retention period; whether there are special requirements for data retention by laws or contracts, etc. As long as your account is necessary to enable you to use our Official Services, we will retain your registration data. You can also choose to cancel your account, after which you will no longer have access to our Official Services. Once your account is deleted, we will retain your Personal Information for a period in accordance with the applicable laws, and upon the expiration of the retention period, we will remove or anonymize your Personal Information. Please note that once you cancel your account, you will not be able to login and use our Official Services and loose access to the data in your account, therefore please exercise the cancellation with caution.


Although we have taken the above reasonable security measures, please understand that due to technical limitations and possible malicious methods, no internet environment can guarantee 100% security. You also have responsibility to properly safeguarded your account name, password, and other identity information to avoid information leakage due to personal negligence.

In the event of a personal information security incident, we will, in accordance with legal and regulatory requirements, immediately activate emergency plans and take remedial measures to avoid harm from information leakage, tampering, or loss. We will endeavor to protect your Personal Information, but please note that no security measure is infallible.

05
How We Process Your Personal Information

We respect your privacy and shall comply with the Applicable Laws to keep your Personal Information in strict confidence and will not unlawfully sell your Personal Information to others.

 

4.1 Entrusted Processing

To improve service efficiency, we may entrust authorized partners to process certain of your Personal Information. For entrusted parties, we will strictly bind them through agreements to process information only within our authorized scope, in accordance with this Statement, and require them to have sufficient data security capabilities.

 

4.2 Sharing

For purposes of ensuring the stable operation of our Official Services, ensuring your user experience, as well as other reasonable purposes, we may share your Personal Information with other Personal Information processors in the following circumstances. For those third parties with whom we share Personal Information, we will evaluate the legality, legitimacy, and necessity of their collection of data, and require them to process your Personal Information in accordance with this Statement and other Applicable Laws:

1. Where your express consent is obtained in advance;

2. Where the sharing of Personal Information is requested by you;

3. Where the sharing is mandatory required by applicable laws or government authorities;

4. Where we need to share with your parents, spouse or statutory guardians for the purpose to verify the authenticity of the Personal Information collected.


4.3 Transferring

We will not transfer your Personal Information to any company, organization, or individual, unless:
1. Where such transfer is requested by you;
2. Where your express consent is obtained in advance.


4.4 Disclosure

We will only disclose your Personal Information under the following circumstances:

1. Where such transfer is requested by you;

2. Where your express consent is obtained in advance.


4.5 Exceptions to your prior consent of sharing, transferring or disclosure of Personal Information

You fully understand and agree that we have the right to under the following circumstances, we have the right to process your Personal Information without obtaining your prior authorization and consent:

1. Where it is necessary for the conclusion or performance of a contract to which you are a contracting party, or for the management of human resource management in accordance with contracts signed and labour related policies and policies according to applicable laws;

2. Where it is necessary for us to fulfill statutory responsibilities or obligations;

3. Where it is necessary to respond to public health emergencies, or for the protection of life, health, and safety of natural person under emergency circumstances;

4. Where Personal Information is reasonably processed for the purposes of news reporting, supervision by public opinion, or other activities for public interests;

5. Where Personal Information disclosed by yourself or legally available from open sources are reasonably processed by us in compliance with Applicable Laws;

6. Other circumstances as required by laws and regulations.

06
Your Rights in Personal Information Processing Activities

 We respect and protect your statutory rights regarding your Personal Information. Where permitted by Applicable Laws, you have the right to:

1. Access and copy the Personal Information we have collected about you;

2. Request us to update or correct your inaccurate Personal Information, or complete your incomplete Personal Information;

3. Allow, refuse, or limit our use of your Personal Information;

4. Request us to delete your Personal Information;

5. Request us to explain the Personal Information processing rules;

6. Request us to transfer your Personal Information to a designated Personal Information processor; provided such transfer meets the conditions stipulated by the National Cyberspace Administration.

7. Withdraw your authorization and consent.


If you wish to exercise the above rights, please contact us through the method in Article 10 of this Statement. If we have reasonable grounds to believe that these requests are deceptive, impracticable, or infringe on others' privacy rights, we will refuse to process your request.

Please note that exercising certain rights may result in your inability to continue using part or all of our services.

07
How We Collect and Process Personal Information of Minors Under Fourteen

The users of our Official Services are mainly adults, however we also attach great importance to the protection of minors' Personal Information.

 

If you are a minor under the age of fourteen (hereinafter referred to as "minor"), you shall obtain written consent from your parents or statutory guardians prior to using our Official Services. You shall not use our Official Services or create your own user account without written consent of your parents or statutory guardians.


If you are the statutory guardian of the minor, please contact us through the contact information set forth in Article 10 when you have queries about the Personal Information of the minor under your custody.


Where collecting the Personal Information of the minors is with the written consent of their parents or statutory guardians, we will store, use or disclose the minors’ Personal Information collected only to the extent as consented, or as permitted by applicable laws, or for the necessary protection of the minors. If we find that we have collected Personal Information from minors without prior verifiable consent from their parents or statutory guardians, we will try to delete the relevant data as soon as possible.

08
How Your Personal Information is Transferred Cross-Border

In principle, Personal Information collected and generated within the People's Republic of China will be stored within the territory. Without your explicit authorization and consent, we will not transfer your Personal Information cross-border.


However, since we are a sino-foreign university, where it is necessary and appropriate and in order to better provide services for you or for essential management purposes, your Personal Information collected by us may be provided to The Hong Kong University of Science and Technology or other countries/regions. Under such circumstances, we will further inform you of the types of Personal Information to be transferred cross-border, their processing purposes and methods, the contact information of the recipient, and the methods and procedures for  exercising  your rights, and obtain your separate consent.

Please note that the laws related to Personal Information protection laws in the countries/regions of cross-border transfer recipients may differ. We will always process and use your Personal Information in accordance with relevant domestic laws and regulations and this Statement, and take necessary security protection measures to ensure your Personal Information is secure and controllable.

09
How We Update This Statement

We reserve the right to update or revise this Statement from time to time. Without your explicit consent, we will not diminish the rights you should enjoy according to this Statement.


In case of updates, we will notify you in reasonable ways such as pop-up notifications, emails, or system announcements, so that you can timely understand the changes. The aforementioned "Material Changes" mentioned above includes, but not limited to the following:

1. Significant changes in the data processing model of our official services, such as changes in processing purposes, methods, types of personal information processed, storage periods, or changes in entities involved in sharing, transfer, or public disclosure of personal information;

2. Changes in your rights regarding personal information processing and the ways to exercise them;

3. Changes in the responsible department for personal information security, contact details or complaint channels;

4. When a personal information security impact assessment report indicates high risks;

5. Other important circumstances, that will materially affect personal rights and interests.


If you continue to use our official services after receiving our update notification, it means you have fully read, understood, and agreed to be bound by the revised Statement.

10
Disclaimer

Although we have taken reasonable data security protection measures in accordance with legal requirements, to the extent permitted by Applicable Laws, we shall not assume legal liabilities under the following circumstances:

1. Leakage due to your personal reasons: Including but not limited to you informing others of your password, sharing your account with others, or any Personal Information leakage due to your improper safekeeping;

2. Force Majeure and Third-Party Reasons: Under the premise that we have fulfilled the security protection obligations stipulated by law, due to hacker attacks, computer virus intrusion or outbreak, technical adjustments or failures of telecommunications infrastructure, government regulation, etc., resulting in temporary interruption or paralysis of network services, or Personal Information leakage, loss, theft, or tampering;

3. Third-Party Link Risks: Personal Information leakage and any resulting legal disputes and consequences caused by you accessing other websites or systems through links on our official services (it is recommended that you consult the relevant third party's privacy policy);

4. Statutory Disclosure: In accordance with laws, regulations, or rules, or in statutory scenarios involving public safety or significant public interest, we need to provide relevant Personal Information to administrative, judicial, or other competent authorities.

11
Contact Us

If you have any questions, comments, or suggestions to this Statement, or wish to exercise your rights under this statement, please contact us as follows:

Information Technology and Data Intelligence Department (ITDID) Email: ITDID@hkust-gz.edu.cn

Acceptable Use Policy
01
Introduction

(In case of any divergence of the translation, the Chinese text shall prevail.) 

This "Acceptable Use Policy" ("this Policy") outlines the guidelines that users ("you") must adhere to when accessing and using various IT services and resources provided by The Hong Kong University of Science and Technology (Guangzhou) ("University" or "we"). The Policy aims to ensure that every user can enjoy a safe and efficient working environment. The examples and restrictions listed in the Policy do not exhaust all possibilities. We may update this policy from time to time, and the updated policy will be published on the Information Technology Department (ITD) website. Continuing to use the University's IT services and resources indicates your agreement to comply with the latest version of this policy.

If you have any questions about the policy or need assistance, you may contact ITD via email, and they will respond within two working days.

For the purposes of this policy, "user" also refers to "campus user," including but not limited to students, faculty members, staff, visitors, and other individuals or organizations authorized by the University; The IT services and resources provided by the University include, but are not limited to, computer networks, software, programs, email, information systems, media equipment (such as printers, campus cards, servers, office computers), etc.

This policy includes the following content:

1.Campus account and password management

2.Network security

3.Information security and privacy protection

4.Media equipment or resource management

5.Prohibition of inappropriate/irrelevant content

6.Supervision and enforcement

7.Disclaimer

8.Updates and effectiveness

Attachments: Relevant Laws and Regulations

02
Campus Account and Password Management

The campus account refers to the unified identity authentication account for users to access and use various IT services and resources, provided only to legitimate users approved by the University (such as those who have gone through the special email account application process). The campus account is for the sole use of the user. Users are not allowed to misuse or transfer related permissions to others without the approval of the University.

1.Users must not allow unauthorized personnel to access the network through their computers.

2.Users must not copy or transfer software or data files to others via the campus network.

3.Users should be particularly careful when transmitting/receiving large files (e.g., multimedia files) over the internet, and should try to find files locally and perform transfers during non-working hours to avoid affecting other users.

4.Users must not use campus network resources for activities unrelated to the University (e.g., commercial and private activities).

5.Users must not arbitrarily change, delete, or manipulate data, programs, information, etc., within the campus network, including those that are not specifically locked or protected by the system.

6.Users must not use campus email or other email accounts to send false and/or anonymous emails. Sending emails in someone else's name (false emails) and/or using anonymous emails is considered dishonest behavior and may lead to serious disciplinary action.

7.Users are responsible for maintaining password security and changing passwords regularly. Sharing campus accounts and passwords with others without the approval of the University is prohibited.

In the event of any violation or suspected violation of this policy by a user or in emergency situations, the University reserves the right to temporarily suspend the campus account's access to IT services and resources.

03
Network Security

Users should understand and comply with the "Cybersecurity Law of the People's Republic of China“, the "Regulations on the Protection of Computer Information Systems Security of the People's Republic of China“, the "Measures for the Administration of International Networking Security Protection of Computer Information Networks“, and other laws and regulations related to network security, especially:

1.Users must not use the network to endanger national security, disclose state secrets, infringe upon the legitimate rights and interests of the state, society, collectives, and third parties, or engage in illegal and criminal activities.

2.Users must strictly comply with relevant national laws and regulations and manage their own information security.

3.Users must not create, copy, access, or disseminate the following information as well as websites containing such information:

a) Opposing the basic principles established by the Constitution;

b) Endangering national security, leaking state secrets, subverting state power, undermining national unity;

c) Harming national honor and interests;

d) Inciting national hatred, discrimination, and undermining national unity;

e) Undermining national religious policies, promoting cults and feudal superstitions;

f) Spreading rumors, disrupting social order, and undermining social stability;

g) Spreading obscenity, pornography, gambling, violence, murder, terror, or inciting crime;

h) Insulting or defaming others, infringing upon the legitimate rights and interests of others;

i) Containing other content prohibited by laws and administrative regulations.

4.Users must not engage in the following activities that endanger computer information network security:

a) Accessing restricted computer information networks or using restricted computer information network resources without permission;

b) Deleting, modifying, or adding functions of computer information networks without permission;

c) Deleting, modifying, or adding data and applications stored or transmitted in computer information networks without permission;

d) Intentionally creating and spreading destructive programs such as computer viruses;

e) Other activities that endanger computer information network security.


Users must immediately take emergency measures and retain relevant original records in the event of a major security incident involving the computer information system they use, and report to ITD via email or DingTalk within 4 hours, and notify their supervisor or relevant department heads.

Users who violate the requirements of this section may be involved in serious legal liabilities, including administrative penalties, civil liability, and criminal responsibility. Users may further refer to the content under "Attachment: Relevant Laws and Regulations" in this policy.


04
Information Security and Privacy Protection

Users should pay attention to information security and privacy protection. For example:

1.Without special approval from the University, sharing accounts and passwords with others is prohibited.

2.Be wary of phishing attacks. Do not click on unknown links or attachments, and ensure information is obtained from trusted sources.

3.Encrypt data. Use encryption tools to protect information security when transmitting or storing sensitive data.

4.Ensure device security. Make sure all devices have the latest security patches installed and antivirus software enabled.

5.Adopt privacy settings: Regularly check and adjust the privacy settings of personal accounts to limit the scope of information sharing.

6.Use artificial intelligence in a responsible and ethical manner. When using tools like GPT, be especially careful not to input or disclose private information, including but not limited to names, addresses, contact information, student IDs, financial information, facial information, and any other sensitive data. Although these tools can be helpful, inputting private information may lead to data breaches or privacy risks. Users must ensure that privacy information is protected when using such tools.

05
Media Equipment or Resource Management

When using various media equipment or resources provided by the University, such as office computers, servers, campus cards (physical and digital campus cards), cloud desktops, etc., users must adhere to the following requirements:

1.Users must properly manage equipment or resources and are strictly prohibited from lending, transferring, mortgaging, altering, or otherwise illegally using them. Users are responsible for all consequences resulting from violating the regulations for using equipment or resources.

2.Upon graduation, suspension, leaving the school, or leaving employment, users must follow the procedures and timelines determined by the relevant departments of the University for function termination.

3.Users must not install software unrelated to work/study or of unknown origin on office computers/servers without authorization.

4.Users must not use office computers/servers for matters unrelated to work/study.

5.Users must not download and install software from unknown online sources, as such software may contain viruses, leading to data leaks or other significant losses, affecting both users and the University’s interests. If non-university-procured software is needed, it should be downloaded and installed through official channels and in accordance with the software user agreement. If in doubt, consult the Information Technology Office.

6.The production and distribution of campus cards are managed by the University. Unauthorized third parties are prohibited from producing or distributing cards with campus card functions. Cracking, counterfeiting, or forging campus cards is strictly prohibited.

7.When using the digital campus card QR code, do not take screenshots, project, or record screens on mobile devices, nor forward it to others. Failure to comply will result in the QR code being frozen, and the individual will bear the associated responsibilities and any potential losses.


06
Prohibition of Inappropriate/Irrelevant Content

The University encourages users to publish content in a civilized manner. For example:

1.Do not send mass irrelevant emails. Sending inappropriate or unrelated emails (such as advertisements, promotions of activities unrelated to the University, or surveys) to a large number of recipients not only wastes recipients' time and disk space but also disrupts the normal operation of servers and networks.

2.Do not send false and/or anonymous emails: Emails should be sent using the university-assigned email addresses. Sending emails on behalf of others (false emails) and/or using anonymous emails is considered dishonest behavior and may result in severe disciplinary action.

3.Do not send obscene emails: Emails should always be written in appropriate language and adhere to common etiquette. Users must not use vulgar language or harass recipients.

4.Do not store or publish pornographic resources: Users must not store or publish pornographic resources (including electronically stored files). Illegal storage and distribution of pornographic resources may constitute a criminal offense.

5.Do not publish any form of inappropriate and/or irrelevant content through public screen devices: Public screen devices include but are not limited to information display screens, conference all-in-one machines, classroom smart interactive panels, etc. Users are strictly prohibited from publishing any form of inappropriate and/or irrelevant content, including but not limited to pornography, violence, discrimination, or other content unrelated to work/study. Upon discovering such content, it should be immediately discontinued, and the Information Technology Office should be notified for follow-up action.

07
Intellectual Property Protection

Respecting and protecting the intellectual property rights of others is a legal obligation for every user. Infringing on others' intellectual property rights can lead to serious legal consequences, including administrative penalties, civil liability, and criminal liability. Users must ensure that accessing any software, data, or other users' confidential information, as well as copyrighted or patent-protected materials, does not violate intellectual property protection laws and regulations. Users should pay attention to the following points:

1.All software installed on personal computers must have valid and appropriate licenses. This applies not only to offices but also to laboratories, open areas, and student dormitories.

2.Software or copyrighted materials must not be copied from the campus network and installed on other machines, unless appropriate licenses or consent have been obtained.

3.Copyrighted software must not be uploaded to networks (including campus and external networks) to provide download services, such as via FTP, file sharing, etc.

4.Users are responsible for ensuring that their contributions to the campus network do not infringe on third-party intellectual property rights. The Hong Kong University of Science and Technology (Guangzhou) does not tolerate or approve any infringement behavior.

5.Users are required to install the Software Authenticity Check Tool on personal computers to prepare for regular sampling checks of the valid use of licensed software and to promptly uninstall any unlicensed software.

If the University discovers any user engaging in intellectual property infringement, it reserves the right to suspend their campus account access to various resources and may delete infringing materials as appropriate. Users will bear the corresponding adverse consequences themselves.


08
Supervision and enforcement

The Information Technology Department is responsible for the execution and supervision of this policy. If the The Information Technology Department believes that a campus user has violated or is about to violate this policy in any way, the Department may take any one or more of the following measures at its discretion without assuming any liability to the user:

1.Issue a warning to the user.

2.Stop or remove problematic programs/processes.

3.Isolate the problematic machine/server from the network until the issue is resolved.

4.Temporarily or permanently remove infringing content, including removing or blocking access to infringing materials loaded or shared on the campus network.

5.Temporarily or permanently prohibit the user's account and computer from accessing the network, with the specific duration determined by the Technology and Information Services Department.

The Technology and Information Services Department will report the user's violations to the relevant functional departments of the school (such as the Student Disciplinary Committee, Human Resources Department), which will then suspend the user's access to other non-IT facilities or resources. The relevant functional departments will also further process the user's violations according to the applicable disciplinary system.

For suspected illegal activities, the school will report to the relevant government departments in accordance with the law.

09
Disclaimer

Users shall use IT services and resources responsibly and bear their own responsibilities. The University shall not be liable for any losses incurred by users due to the use of IT services and resources.

10
Updates and Effective Date

The University may update this policy from time to time, and the updated policy will be published on the website of the Information Technology Department. Continuing to access or use the school's IT services and resources indicates that users agree to comply with the latest version of this policy.

11
Attachment: Relevant Laws and Regulations

1."Criminal Law of the People's Republic of China"

Article 291-1: Whoever fabricates false information about danger, epidemic, disaster, or police situations and spreads it on information networks or other media, or knowingly spreads such false information on information networks or other media, thereby seriously disrupting social order, shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention, or public surveillance; if the consequences are serious, the person shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years.

Article 246: Whoever openly insults another person by violence or other methods or fabricates facts to defame another person, if the circumstances are serious, shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention, public surveillance, or deprivation of political rights.

2."Public Security Administration Punishments Law of the People's Republic of China"

Article 25: Whoever commits one of the following acts shall be detained for not less than five days but not more than ten days and may also be fined not more than 500 yuan; if the circumstances are minor, the person shall be detained for not more than five days or fined not more than 500 yuan:
(i) spreading rumors, falsely reporting danger, epidemic, police situations, or otherwise deliberately disturbing public order;
(ii) throwing false explosive, poisonous, radioactive, corrosive substances or pathogens of infectious diseases and other dangerous substances to disturb public order;
(iii) threatening to commit arson, explosion, or throw dangerous substances to disturb public order.

Article 42: Whoever commits one of the following acts shall be detained for not more than five days or fined not more than 500 yuan; if the circumstances are serious, the person shall be detained for not less than five days but not more than ten days and may also be fined not more than 500 yuan:

(i) Writing threatening letters or using other methods to threaten the personal safety of others;

(ii) Publicly insulting others or fabricating facts to defame others;

(iii) Fabricating facts to falsely accuse and frame others, attempting to subject them to criminal prosecution or public security administration punishment;

(iv) Threatening, insulting, beating, or retaliating against witnesses and their close relatives;

(v) Repeatedly sending obscene, insulting, threatening, or other messages to interfere with others' normal lives;

(vi) Peeping, taking secret photographs or videos, eavesdropping, or spreading the privacy of others.

3."Civil Code of the People's Republic of China"

Article 1194: Network users and network service providers who infringe upon the civil rights and interests of others through the use of the network shall bear tort liability. Where the laws provide otherwise, such provisions shall prevail.

Article 1195: Where a network user infringes upon the rights of others through the use of network services, the right holder has the right to notify the network service provider to take necessary measures such as deletion, blocking, or disconnection of links. The notice shall include preliminary evidence of the infringement and the true identity information of the right holder. Upon receiving the notice, the network service provider shall promptly forward the notice to the relevant network user and take necessary measures based on the preliminary evidence of infringement and the type of service; if the network service provider fails to take necessary measures in a timely manner, it shall bear joint and several liability with the network user for the expanded part of the damage. If the right holder causes damage to the network user or network service provider due to an erroneous notice, the right holder shall bear tort liability. Where the laws provide otherwise, such provisions shall prevail.

Article 1197: If a network service provider knows or should know that a network user is using its network service to infringe upon the civil rights and interests of others and fails to take necessary measures, it shall bear joint and several liability with the network user.

4."Cybersecurity Law of the People's Republic of China"

Article 12, Paragraph 2: Any individual or organization using the network shall abide by the Constitution and laws, observe public order, respect social ethics, and shall not endanger network security. They shall not use the network to engage in activities that endanger national security, honor, and interests, incite the subversion of state power, overthrow the socialist system, incite national separatism, undermine national unity, promote terrorism, extremism, promote national hatred, discrimination, spread violence, obscenity, and pornography information, fabricate and spread false information to disrupt economic order and social order, as well as infringe upon others' reputation, privacy, intellectual property rights, and other legitimate rights and interests.

Article 47: Network operators shall strengthen the management of information published by their users. Upon discovering information that is prohibited by laws and administrative regulations from being published or transmitted, they shall immediately stop the transmission of such information, take measures such as removal to prevent the spread of information, preserve relevant records, and report to the relevant competent authorities.

5."Administrative Measures for Internet Information Services"

Article 15 ("Nine Prohibitions"): Internet information service providers shall not produce, replicate, publish, or disseminate information containing the following contents:

(i) Opposing the basic principles determined by the Constitution;

(ii) Endangering national security, leaking state secrets, subverting state power, or undermining national unity;

(iii) Harming national honor and interests;

(iv) Inciting national hatred, discrimination, or undermining national unity;

(v) Undermining national religious policies, promoting cults and feudal superstitions;

(vi) Spreading rumors, disrupting social order, or undermining social stability;

(vii) Disseminating obscenity, pornography, gambling, violence, murder, terror, or inciting crime;

(viii) Insulting or slandering others, infringing upon others' legitimate rights and interests;

(ix) Containing other contents prohibited by laws and administrative regulations.

6."Regulations on the Ecological Governance of Network Information Content"

Article 21: Users of network information content services, producers of network information content, and platforms for network information content services shall not use the network and related information technologies to commit illegal acts such as insult, slander, threat, spreading rumors, and infringing upon others' privacy, which damage others' legitimate rights and interests.


Regulations on HKUST(GZ) HPC Platform
01
General Provisions

(In case of any divergence of the translation, the Chinese text shall prevail.)

 

Article 1 In order to standardize the user management, resource allocation and use, training, account auditing and supervision of the High-Performance Computing (HPC) platform at the Hong Kong University of Science and Technology (Guangzhou), and to ensure the normal operation and data security of the HPC platform, these management regulations are formulated.

Article 2 These regulations apply to all users of the HPC platform at the Hong Kong University of Science and Technology (Guangzhou).


02
Service Application and Approval

 

Article 3 Students who wish to use the service must fill out the "HPC Platform Application" (Application URL: https://onestop-online.hkust-gz.edu.cn) in the online service hall.

Article 4 Provide true and complete personal information and project information. This includes, but is not limited to, name, ID number, contact information, student ID/work ID, email, project name, and the name of the main supervisor.

Article 5 Professors and teachers must submit the "HPC Platform Application" for approval in DingTalk (a Chinese multi-purpose messaging, social media, and mobile collaboration platform).

Article 6 Users must commit to complying with relevant regulations. It is strictly forbidden to use this platform for illegal activities such as mining or system intrusion. Once discovered, the account will be immediately banned. Users must conduct self-investigation and gather evidence to prove their innocence. Once the facts are confirmed, the person who applied will bear the responsibility for the violation.

Article 7 After submitting the application form, it will be reviewed by the HPC platform management department. Once approved, the user will receive an account and initial password. The review period generally does not exceed 2 working days.

Article 8 Student users must provide supervisor information in the application form and can only obtain an account after approval from the supervisor. The supervisor signs the application form and bears the responsibility for supervising the student's use of the HPC platform.

Article 9 Users from cooperative units must provide relevant cooperation agreements and can only obtain an account after approval from the relevant departments of Hong Kong University of Science and Technology (Guangzhou). Users from cooperative units must comply with the resource usage restrictions stipulated in the agreement.


03
Account Usage

 

Article 10 User accounts and resources of the Intelligent Computing Center are strictly for on-campus teaching and scientific research purposes only. Any behavior or operation involving illegal activities is prohibited. Users must comply with the following guidelines, among others.

Article 11 Any other purposes besides on-campus teaching and scientific research are prohibited, such as lending personal accounts.

Article 12 Users must keep their accounts and passwords secure. In case of account theft or password leakage, they must immediately report to the HPC platform management department and reset their password promptly. They should also notify the HPC management department to take measures to protect user information security as soon as possible.

Article 13 Users must use HPC platform resources reasonably and comply with relevant regulations. Any violation will result in accountability. Violations include, but are not limited to:

a) Illegally occupying or wasting resources;

b) Prohibiting any activities that endanger network and information security;

c) Prohibiting infringement of others' intellectual property rights;

d) Prohibiting the installation of commercial software and programs without copyright;

e) Prohibiting any illegal activities, such as mining and other behaviors prohibited by national laws and regulations.


04
Account Change and Cancellation

 

Article 14 In case of user information change (such as name, contact information, etc.), the user must apply for the change to the HPC platform management department. The change application must be submitted within 2 working days after the information change occurs.

Article 15 When a user's project ends or they no longer use the HPC platform, they should apply to the HPC platform management department to cancel their account. The application must be submitted within 10 days after the project ends or the use of the HPC platform stops.

Article 16 Under the following circumstances, the HPC platform management department has the right to decide to suspend or cancel the user's account:

a) The user violates relevant regulations and engages in illegal activities;

b) The user account has not been used for a long time, i.e., not logged in for 6 consecutive months;

c) The user's project has been completed;

d) The user has left the school, resigned, or the cooperation relationship has ended.

Article 17 Student accounts will be automatically closed after graduation or account cancellation, or if the user does not use the account for 3 months. User data will be deleted from the HPC platform within 60 days after account cancellation. Users must back up and migrate their data before cancellation, and delete the data.


05
Training and Technical Support

 

Article 18 The HPC platform management department serves the campus teachers, students, and scientific research teams to carry out scientific research and teaching activities. Therefore, the school will study the formation of a cross-domain expert team and committee to promote the continuous upgrade of the Intelligent Computing Center, as well as co-construction, co-management, and co-creation.

Article 19 The HPC platform management department regularly holds training sessions on the use of the HPC platform to improve users' operational skills and resource utilization rate. The training content includes, but is not limited to, system use, software application, data processing, and task scheduling.

Article 20 Users encountering technical problems while using the HPC platform can consult the HPC platform management department. The platform management department provides timely technical support.

Article 21 For major scientific research projects, applications must be made. The HPC platform management department can provide special technical support to assist users in solving problems related to computation, data storage, and analysis.


06
Information Security and Data Protection

 

Article 22 Users must comply with national laws and regulations and school rules, and must not use the HPC platform to engage in illegal activities or infringe upon the rights and interests of others.

Article 23 Users are responsible for the data they store on the HPC platform and must regularly back up their data. The HPC platform management department is not responsible for any loss of user data.

Article 24 Users must comply with the security regulations of the HPC platform, must not attack the system, tamper with data, or disclose others' information. If a security vulnerability is discovered, it should be reported to the HPC platform management department immediately.

Article 25 The HPC platform management department takes necessary measures to ensure system security and data integrity, and regularly conducts security checks, backups, and system maintenance.


07
Resource Allocation

Article 26 Resource Grading: Platform resources are mainly divided into shared queues, following the principle of "first come, first served". Two types of queues are supported: shared and Debug. In the same queue, all tasks have the same priority, and the maximum usage time is seven days. Resources include different types of CPUs, GPUs, memory, and storage.

Article 27 Allocation Principle: Allocate various resources reasonably according to the actual needs of the project, the qualifications of the applicant, and the overall resource situation of the platform.

Article 28 Priority: Priority is given to national key projects, school-level key projects, and projects with the characteristics of industry-education-research integration. Relevant project names must be submitted when applying.

Article 29 Usage Time Limit: Allocate resource usage time limits reasonably according to the progress and actual needs of the project to avoid wasting resources. If an extension of the usage time is needed, an application must be submitted in advance.


08
Charging and Rewards

 

Article 30 During the trial operation period of the Intelligent Computing Center, the campus Intelligent Computing Center and HPC platform will temporarily suspend charging.

Article 31 The High-Performance Computing Platform will formulate the "High-Performance Computing School-Level Public Platform Charging Management Measures" according to the actual situation, which will come into effect after being approved by the Expert Committee of the High-Performance Computing Platform.

Article 32 Users can participate in applying for the "Open Test Fund" which is responsible for by the Equipment Department.

Article 33 Users can submit their achievements to obtain discounts.


09
Achievement Report

 

Article 34 Users who use the scientific research achievements produced by the school's Intelligent Computing Center should declare the support of the Intelligent Computing Center when publishing scientific research papers, technical reports, or participating in academic seminars, to increase the influence of the school's Intelligent Computing Center. Users should submit the "User Achievement Report" for filing. The High-Performance Computing Public Platform has the right to quote the content in the user's "User Achievement Report".

Article 35 Users within the school and those who enjoy preferential treatment should indicate "This research work is supported by the High-performance Computing Platform of The Hong Kong University of Science and Technology (Guangzhou)" when publishing their scientific research achievements or papers, and submit a copy of their achievement report or published paper.


10
Account Audit and Supervision

 

Article 36 The HPC platform management department has the right to conduct regular audits of user accounts. The audit cycle is once a year, or temporary audits can be conducted as needed.

Article 37 Users should actively cooperate with the audit work and provide relevant information truthfully. This includes, but is not limited to, project progress, resource usage, data processing, and storage.

Article 38 The HPC platform management department should strictly keep user information confidential and ensure the security of user data. For sensitive data, users need to sign a confidentiality agreement with the HPC platform management department.

Article 39 The results of the account audit will be notified to the user and relevant departments in writing. If any violations or unreasonable use of resources are found, the platform management department has the right to require the user to rectify or take corresponding measures.


11
Responsibility and Punishment

 

Article 40 If a user violates the provisions of this system, the HPC platform management department has the right to take corresponding measures, including but not limited to suspending or canceling accounts, issuing criticism, etc. In serious cases, it will be transferred to the school discipline inspection commission or relevant departments for handling.

Article 41 Users who cause losses to the HPC platform due to violations shall bear corresponding compensation responsibilities.


12
Supplementary Provisions

 

Article 42 This system shall come into effect from the date of promulgation.

Article 43 The Office of the President and the Information Technology Department of The Hong Kong University of Science and Technology (Guangzhou) are responsible for the interpretation and modification of this system. After the revision of the system, it shall be promptly announced to users.

Article 44 In case of any conflict between this system and national laws and regulations or school rules, national laws and regulations and school rules shall prevail. For issues not covered by this system, reference may be made to national laws and regulations and school rules for implementation.


HKUST(GZ) Zoom Management Rules (Trial)
01
General Provisions

(In case of any divergence of the translation, the Chinese text shall prevail.) 

Article 1 To strengthen the management of Zoom and regulate users' use of Zoom video conferencing, these management rules are hereby formulated.


02
Authorization

Article 2 There are two kinds of authorized license of Zoom at HKUST(GZ): Education Edition ZOOM ONE and the Education Student Edition ZOOM ONE. Faculty and staff users are allocated the Education Edition ZOOM ONE license, while student users are allocated the Education Student Edition ZOOM ONE license.

Article 3 Users with Education Edition ZOOM ONE can host meetings with up to 500 participants without time restrictions; enjoy features including chat, whiteboard, Zoom subtitle translation, cloud recording, 10GB of cloud storage space, etc. 

Article 4 Users with Education Student Edition ZOOM ONE can host meetings with up to 300 participants without time restrictions; enjoy features including chat, whiteboard, cloud recording, 0.5GB of cloud storage space, etc. 


03
Recording

Article 5 Recorded files are cleared every semester, and offline retention of Zoom recording files for Guangzhou users is for half a year. 

Article 6 After the end of each semester, the Zoom administrator will notify users to clean up the data, and users must complete the download of recorded files within one month. 

Article 7 For special recorded files that users need to apply for retention, they can apply through the DingTalk approvals or email. 


04
Display Name

Article 8 The setting of display names should comply with the related policies and requirements of the University. 

Article 9 The setting of display names should directly reflect the user's true information. 


05
Supplementary Provisions

Article 10 These management rules shall be implemented on a trial basis from the date of issuance. 

Article 11 These management rules are drafted and interpreted by the Information Technology Department (ITD).