Student Directions for the Use of the IT Resources at Chalmers

The directions below are aimed at all students registered at Chalmers. To gain access to the university’s information technology (IT) resources, you are required to first read the instructions below and then indicate your approval and understanding of these directions.

The IT resources at Chalmers are the property of Chalmers University of Technology and their intended usage is to fulfill the assignments and activities of Chalmers.. All other types of usage are prohibited unless not otherwise specified by these directions.

The IT resources of Chalmers include computers, computer data networks, IT services and equipment used in connection with handling digital forms of information.

It is prohibited to use the IT resources at Chalmers to disseminate or store information improperly or to act as an intermediary with regard to such information that:

  • Runs counter to existing laws, e.g. through incitement to racial or ethnic hatred, child pornography offences, unlawful portrayal of violence, slander, disturbing the peace, unauthorised access to computer systems or illegal misuse of computer information, as well as violating copyrights,
  • May be construed as political, ideological or religious propaganda,
  • Violates the law regarding the processing of personal data to protect individual integrity,
  • May otherwise be interpreted as abusive or offensive,
  • Is used for commercial purposes, including marketing products or services not approved by Chalmers, or that
  • Otherwise disrupts the computer systems of Chalmers.

In using the Chalmers computer systems, students should take into consideration the good name, standing and reputation of Chalmers.

Processing of personal data

Personal data are treated by Chalmers in accordance with existing laws and regulations within the scope of its educational and research activities. Such data include items like names, addresses, civic registration numbers, e-mail addresses and study-related information.

Authorised users

Authorised users who have been granted access to the IT resources of Chalmers should pay attention to the following:

  • User authorisations are given to individuals and may only be used by individuals who have been granted such specific access rights.
  • Users are responsible for keeping informed on an ongoing basis about the current directions for using the IT resources of Chalmers, including the local regulations for using the IT resources at departments and other academic bodies of the university.

Using the Internet

The aim of the Internet is to be used for data searches, communications and other relevant purposes consistent with the mission of Chalmers:

  • It is prohibited to access websites with pornographical, racist or other content that may elicit offence.
  • Use caution in downloading computer programmes and files since you always run the risk of encountering malicious software (“malware”). Contact the Chalmers Service Desk if you are uncertain of how to proceed.
  • You are not allowed to handle materials protected by copyright without explicit permission. Contact the Service Desk in the case of uncertainty. Examples include copying, saving, downloading or uploading, printing or distributing copyrighted materials.
  • Only information related to your studies may be published on web pages sponsored by Chalmers.

It is permitted to use the Internet to a limited extent for private purposes on the condition that such use does not prevent others from using these resources for their study purposes and that these student directions are fully respected.

Use of email

The Chalmers email is intended and allowed to be used for internal and external communications in order to serve the educational purposes of the university. A certain amount of use of the Chalmers e-mail is also allowed for private purposes on the condition that these directions are fully respected.

  • Avoid sending large attachments by email by rather emailing links to these materials.
  • Only open attachments and click on links if you trust the sender.

Copyright protected material

Unauthorised copying, storage or dissemination of materials protected by copyright, such as software, music, pictures or videos, films and texts, is strictly prohibited. As a student, you may only install Chalmers-owned licenses or so-called “freeware” on the IT resources owned by Chalmers.

Rules for passwords 

  • Passwords may not be disclosed to other students or individuals.
  • If you’re compelled to write down your passwords and log-in information, please keep this information away from and outside the reach of others and stay away from using plain language when referring to this type of sensitive information.
  • Never save user name and password in the browser for automatic log-in.
  • Passwords must be immediately changed if you suspect that someone else may have come across such sensitive information.
  • Passwords to access the IT resources of Chalmers may not be simultaneously used on other websites or systems.

Private computers

All computers and other equipment connected to the Chalmers data network, regardless of ownership and location, must have up-to-date antivirus protection and a current version of their operating system. Private laptops must be checked to make sure they have not been contaminated with malware. User names must be equipped with secure passwords. If uncertain, consult

Other security directions


Users are prohibited from concealing their identities when using the Chalmers IT resources. For example, it is prohibited to forge the identity of the sender of an e-mail message.

Interception of data

Intercepting the traffic of data networks is not allowed.

Sensitive information

Information worth protecting, e.g. passwords to access the IT resources of Chalmers, must never be sent by means of unencrypted e-mails, be published at websites or in any other way be handled carelessly. Private information, such as credit and debit card numbers and building entry codes, should also be treated using the same caution.   

Computer viruses

You are not allowed to disperse or install viruses or other malware from or on the IT resources of Chalmers.

Security leaks

It is expressly prohibited to utilise security leaks, be they technical deficiencies (e.g. security shortcomings of Windows), or human oversight (e.g. somebody neglecting to lock his/her display screen), to one’s personal advantage.


You must never install server software or other server applications on the Chalmers IT resources without explicit permission by Chalmers.

Control and supervision 

The Chalmers IT resources are closely supervised so that incidents taking place involving its computer data networks and other Chalmers computer assets are constantly logged and monitored. These logs are saved and archived in accordance with existing laws and regulations and may constitute future proof of potential violations of these user directives. The logs are used to make internal investigations by Chalmers and are delivered to the police at their request.

Reporting of incidents

If you detect or have every reason to suspect that a security deficiency or misuse of the IT resources of Chalmers has been committed, you must immediately report the incident to the Chalmers Service Desk.

Measures and sanctions

Disciplinary measures may be taken towards students who violate the rules laid out in this document. Such measures include the issuance of a warning or suspension from studying and pursuing academic activities at the university for a specified amount of time in accordance with the Chalmers disciplinary rules.

Chalmers technology officers have the mandate to immediately and temporarily shut down the IT systems that are mismanaged or improperly used.

Those suspecting breaches of security may report such suspicions to the police. Other legal steps, such as filing claims for the recovery of damages, may also be taken by Chalmers.

This agreement must be signed by login to within 30 days from the day you've recieved your computer account. The agreemen will be displayed the first time you login and thereafter until you've signed it.

Published: Thu 01 Oct 2009. Modified: Mon 25 Mar 2019