Student Directions for the Use of the IT Resources at Chalmers

The directions below are aimed at all students registered at Chalmers. To gain access to the university’s information technology (IT) resources, you are required to first read the instructions below and then indicate your explicit approval and understanding of these directions.

General Information

The IT resources at Chalmers are the property of the Chalmers University of Technology and their intended usage is to fulfill the mission of Chalmers in the areas of education, research and the administrative responsibilities necessary to carry out this mission, in addition to collaborating with the larger society surrounding the university, the so-called “third mission” of the university. All other types of usage are prohibited unless not otherwise specified by these directions.

The IT resources of Chalmers are defined to include computers, computer data networks, IT services and all other equipment used in connection with handling digital forms of information.

It is prohibited to use the IT resources at Chalmers to disseminate or store information improperly or to act as an intermediary with regard to such information that:

  • Runs counter to existing laws, e.g. through incitement to racial or ethnic hatred, child pornography offences, unlawful portrayal of violence, slander, disturbing the peace, unauthorised access to computer systems or illegal misuse of computer information, as well as violating copyrights,
  • May be construed as political, ideological or religious propaganda,
  • Violates the law regarding the processing of personal data to protect  individual integrity,
  • May otherwise be interpreted as abusive or offensive,
  • Is used for commercial purposes, including marketing products or services not approved by Chalmers, or that
  • Otherwise disrupts the computer systems of Chalmers.

In using the Chalmers computer systems, students should take into consideration the good name, standing and reputation of Chalmers.

Treatment of Personal Data

Personal data are treated by Chalmers in accordance with existing laws and regulations within the scope of its educational and research activities. Such data include items like names, addresses, civic registration numbers, e-mail addresses and study-related information.

Duly Authorised IT Users

Users who have been duly authorised are those who have been granted access privileges to the IT resources of Chalmers.

Authorised users should in particular pay attention to the following:

  • User authorisations are given to individuals and may only be used by individuals who have been granted such specific access rights
  • Users are responsible for keeping informed on an ongoing basis about the current directions for using the IT resources of Chalmers, including the specific local regulations for using the IT resources of the various departments and other academic bodies of the university.

Using the Internet at Chalmers

The aim of the Internet is to be used for data searches, communications and other relevant purposes consistent with the mission of Chalmers:

  • It is prohibited to access websites with pornographical, racist or other content that may elicit offence.
  • You should use caution in downloading computer programmes and files since you always run the risk of encountering malicious software (“malware”) in this process. Please be sure to contact the Chalmers Service Desk if you are uncertain of how to proceed.
  • You are not allowed to handle materials protected by copyright without explicit permission. Be sure to contact the Service Desk in the case of uncertainty. Examples include copying, saving, downloading or uploading, printing or distributing copyrighted materials.
  • Only information directly related to your studies may be published on the web pages sponsored by Chalmers.

It is permitted to use the Internet to a limited extent also for private purposes on the condition that such use does not prevent others from using these resources for their study purposes and that these student directions are fully respected.

The Use of E-Mail

The Chalmers e-mail is intended and allowed to be used for internal communications within Chalmers and for external communications beyond Chalmers in order to serve the educational purposes of the university.
A certain amount of use of the Chalmers e-mail is also allowed for private purposes on the condition that these directions are fully respected.

Please avoid sending large attachments by e-mail by rather e-mailing links to these materials.
Only open attachments and click on e-mail links if you trust the sender.

Copyright Protected Materials

Unauthorised copying, storage or dissemination of materials protected by copyright, such as software, music, pictures or videos, films and texts, is strictly prohibited.
As a student, you may only install Chalmers-owned licenses or so-called “freeware” on the IT resources owned by Chalmers.

Rules for Choosing and Using Passwords to the IT Resources at Chalmers

Passwords may not be disclosed to other students or individuals.
If you’re compelled to write down your passwords and log-in information, please keep this information away from and outside the reach of others and stay away from using plain language when referring to this type of sensitive information.
Never save your user name and password in the browser for automatic log-in regardless of which computer you use.
Passwords must be immediately changed if you suspect that someone else may have come across such sensitive information.
Passwords to access the IT resources of Chalmers may not be simultaneously used on other websites or systems.

Private PCs

All computers and other equipment connected to the Chalmers data network, regardless of ownership and location, must have up-to-date antivirus protection and a current version of their operating system. Private PCs must always be checked to make sure they have not been contaminated with malware. All computer user names for the various departments must be equipped with secure passwords (please consult in the case of uncertainty).

Other Types of Security Directions (Identification, Data Interception, Handling Sensitive Information, Virus Prevention, Security Leaks and Server Applications)


Users are prohibited from concealing their identities when using the Chalmers IT resources. For example, it is thus prohibited to forge the identity of the sender of an e-mail message.

Interception of Data

Intercepting the traffic of data networks is not allowed.

Handling Sensitive Information

Information worth protecting, e.g. passwords to access the IT resources of Chalmers, must never be sent by means of unencrypted e-mails, be published at websites or in any other way be handled carelessly. Private information worth protecting, such as credit and debit card numbers and building entry codes, should also be treated using the same caution and prudent behaviour.   

Computer Viruses

You are not allowed to disperse or install viruses or other malware from or on the IT resources of Chalmers.

Security Leaks and Other Flaws

It is expressly prohibited to utilise security leaks, be they technical deficiencies (e.g. security shortcomings of Windows), or human oversight (e.g. somebody neglecting to lock his/her display screen), to one’s personal advantage.

Server Software

You must never install server software or other server applications on the Chalmers IT resources without explicit permission by Chalmers.

Control and Supervision of the Chalmers IT System

The Chalmers IT resources are closely supervised so that incidents taking place involving its computer data networks and other Chalmers computer assets are constantly logged and monitored. These logs are saved and archived in accordance with existing laws and regulations concerning the sorting and filing of such data and may constitute future proof of potential violations of these user directives. The logs are used to make internal investigations by Chalmers and are delivered to the police at their request.

Reporting of Incidents

If you detect or have every reason to suspect that a security deficiency or misuse of the IT resources of Chalmers has been committed, you must immediately report the incident to the Chalmers Service Desk.

Measures and Sanctions in the Event of Violation of Security Directions

Disciplinary measures may be taken towards students who violate the rules laid out in this document. Such measures include the issuance of a warning or suspension from studying and pursuing academic activities at the university for a specified amount of time in accordance with the Chalmers disciplinary rules.

Chalmers technology officers have the mandate to immediately and temporarily shut down the IT systems that are mismanaged or improperly used.

Those suspecting breaches of security may report such suspicions to the police. Other legal steps, such as filing claims for the recovery of damages, may also be taken by Chalmers.


This agreement must be digitaly signed by login to within 30 days from the day you've recieved your computer account. The agreemen will be automatically displayed first time you login to CDKS and thereafter until you've signed it.

Published: Thu 01 Oct 2009. Modified: Thu 05 Feb 2015