Skip to main content

Network Policy

policy 8

1)   Any software that can intercept communications network security and are not allowed using them at all unless approved ICT Committee.

2)   Special approval from ICT Committee is required for connecting networks to external organizations and premises which are not under the control of the university.

3)   Provides firewall and IDS or IPS as one method of computer security and network disruption invasion.

4)   Antivirus software provides an effective means for controlling the spread of computer viruses.

5)   User accessibility :

  1. Local Area Network (LAN)
  • Only staff and students UTHM are allowed to use network connectivity.
  • External users must obtain permission before accessing UTHM network.
  • Using network analyzer and packet sniffer software is not allowed.
  1. Wireless Local Area Network (WLAN)
  • Only staff and students UTHM are allowed to use the UTHM wireless network
  • External users must obtain permission UTHM before using the wireless network.
  • Only authenticated users are allowed to access to the UTHM Network.
  • Using network analyzer and packet sniffer software is not allowed.