September 2010


New ITS Service Structure
Notebook Ownership Programme 2010 - Over 16,000 Notebooks Sold
Desktop PCs Now Available in All Teaching Rooms
Reminder: Business Continuity Drill on 1 and 16 October
Training Workshops for Departmental Administrators on University Portal

Security Practices for Mobile Devices


As the popularity of mobile devices continues to grow with their functionality and sophistication, we may easily forget that these devices indeed contain personal information and other data of high value to hackers. Here are some simple security practices that will help you protect your mobile devices and the data thereon:


Enable password protected screen / keyboard lock - Always enable this first line of defence in helping to protect the information in your mobile devices. It should be set to automatically lock the devices after being left idle for a predetermined period of time (e.g. 5 minutes).
Minimize storage of data on mobile devices - Try to store only minimum amount of data necessary on a mobile computing device for the shortest possible time required. For data that requires longer period of storage, move it to a more secure device and remove it from the mobile device as soon as possible. University protected servers should be the first option for storing confidential University information.
Encrypt your files - Make use of data encryption software such as WinZip, TrueCrypt, etc. for file encryption on mobile devices. A strong key should be used for encryption when files are being transferred into removable media or through email.
Do not use unauthorised wireless connections - Avoid connection to unauthorised wireless network, either unknown wireless networks or unsecured connection in a public place.
Do not open messages from unknown sources - SMS or Multimedia SMS (MMS) from unknown or suspicious sources may contain malicious content and should not be opened when checking messages on mobile computing devices. Bluetooth function should be deactivated by default. Data transmission requests from unknown Bluetooth devices must not be accepted.

Comply with security policies - Understand and follow the guidelines and best practices stipulated in the University’s Computer Systems Security Policy. Consult ITS if you encounter any information security related problems.




New ITS Service Structure


ITS provides a portfolio of shared services to the University community. In order that the University's IT services can be more effectively and efficiently delivered in collaboration, we are happy to announce to our users that a new IT service structure is now in place.

Under the new service structure, ITS is organized into 5 sections:


Section Head

Administrative Application Services Section

Dr Jimmy Wong
Associate Director
(Administrative Applications)

Network and Communication Services Section

Mr Ken Chung
Associate Director
(Network and Communications)

System Infrastructure Services Section

Dr Kent Leung
Associate Director
(Systems Infrastructure)

User Services Section

Mr David Chiu
Associate Director
(User Services)

Administrative and General Services Section

Ms Teresa Chan
Senior Officer
(IT Services)

We invite our users to click here and gain a better understanding of our new service structure.


ITS - your trusted Partner

It is our Mission that ITS will be the outstanding provider of information technology services to our clients and the University community we serve by being:


Under the leadership of Mr Gerrit Bahlman, DoIT, and with the dedication and concerted efforts of all colleagues, ITS will continue to deliver quality services which will facilitate the effective, efficient and appropriate use of information and communications technology for the learning, teaching, research and administrative tasks in pursuit of the strategic objectives of the University.

ITS - your trusted Partner !




Information Security Awareness Workshop on Data Handling


As one of the initiatives to be launched by the JUCC (Joint Universities Computer Centre) Information Security Task Force, a series of Information Security Awareness Workshops will be organized for departmental IT security personnel to enhance their capability in handling information security issues at the departmental level.

Following the first workshop in March, another half-day Information Security Awareness Workshop will soon be held on 25 October 2010. With the theme of 'Data Handling in University', the upcoming workshop will cover the following major topics:

Human Factor in Information Security

  • Information Security Roles and Responsibilities
  • Information Security Control and Management
  • Human Factors for Improving Information Security

Information Security in University

  • Information Security Frameworks
  • Confidentiality-Integrity-Availability
  • Risk Management
  • People-Process-Technology
  • Plan-Do-Check-Act (PDCA)

Information Classification and Handling

  • Information Classification
  • Data Handling
  • Fundamental Security

Business Impact Analysis

  • Performing Business Impact Analysis
  • Business Continuity Planning
Invitation will be sent to departments in early October. Don’t miss the workshop if you are involved in handling University data or are supporting information security at your department!



Notebook Ownership Programme 2010 - Over 16,000 Notebooks Sold

With the end of the 2nd road show period, this year’s Annual Notebook Ownership Programme has come to a close in mid September. Over 16,600 Fujitsu notebooks / netbooks have been sold during the 2 road show periods. 

Here are the 3 most popular models:



No. of Unit Sold





Netbook (MH330/380)





The 2nd delivery period will start in early October. For enquiries, please call the sales hotline of Sunlite Computronics at 2616 2466 (until 31 October 2010) from 09:00 – 18:00 on Monday - Friday.



Desktop PCs Now Available in all Teaching Rooms


After 2 years of trial run in some of the teaching rooms, desktop PCs with Internet access have been provided jointly by FMO and ITS in all general teaching rooms and lecture theaters starting 1 September 2010.

In response to the feedback from users, the log on requirement for Internet connection using NetID and NetPassword has now been removed to shorten the startup time and to simplify the operation.  

After the PC is powered up, users will be able to access the pre-installed software and be automatically connected to the Internet. 

If you need any assistance in operating the PCs in the teaching rooms, please contact the FMO AV supporting unit at 2766 6302.



Reminder: Business Continuity Drill on 1 and 16 October


As previously announced, the University's annual Business Continuity (BC) Drill for the Central Computer Systems will be conducted on 1 October (National Day) and 16 October (Chung Yeung Festival) this year. Departments/offices are reminded to avoid carrying out critical events which would have to rely on the central computer systems on the two days.

What will be done?

Same as in the previous years, we will simulate the failure of some or all of our systems in the Main and Secondary Computer Rooms, to rehearse the established business continuity procedures in order to maintain the University’s mission-critical processes in case of disaster.

What services will be affected?

While Internet access (except WiFi) and the campus network will be maintained within campus during the exercise, all other computer systems will be shut down from 07:00 to 13:00 on 1 October 2010 and from 07:00 to 16:00 on 16 October 2010. The affected time for different services with or without high availability (HA) protection can be found here.

This annual Drill is a crucial part of the University's Business Continuity Plan which is dedicated to ensuring the continuity of its critical processes in case of disaster or other unexpected problems.

For further information or enquiries on the exercise, please contact our Help Centre at 2766 5900.


October Staff IT Training Programmes


Training Workshops

You may view the full list of workshops offered in October and make online enrolment via the Staff IT Training Workshop Enrolment System. You will be notified instantly of the enrolment results.


Online Courses

  October Online Courses


Access 2007: Level 1, 2, 3 & 4

  Access 2007: New Features


Acrobat 9.0 Pro: Level 1 & 2


Excel 2007: Level 1, 2, 3 & 4


Excel 2007: New Features

  Excel 2007: VBA


GroupWise 7.0 Level 1-1: Using GroupWise E-mail


GroupWise 7.0 Level 1-2: Organizing E-mails and Address Book in GroupWise

  GroupWise 7.0 Level 1-3: Using GroupWise Calendar and Resources
  GroupWise 7.0 Level 2-1: Exploring Advanced Mail and Message Features


GroupWise 7.0 Level 2-2: Exploring WebAccess, Rules and Access Rights


PowerPoint 2007: Level 1 & 2


PowerPoint 2007: New Features


Project 2007: Level 1 & 2


Publisher 2007


Security Awareness (Part 1): Protecting Information and Countering Social Engineering


Security Awareness (Part 2) : Maintaining Computer and File Security


Security Awareness (Part 3): Promoting E-mail Security and Proper Responses to Security Incidents


SharePoint Designer 2007: Level 1 & 2


What's New in Visio 2007


Windows Vista : New Features


Word 2007: Level 1, 2 & 3


Word 2007: New Features


Please click here for the detailed description of each course. To enrol, please complete and return the web-based proforma reply and you will be informed of the enrolment results in early October via e-mail.

Enquiries: 4566



Training Workshops for Departmental Administrators on University Portal


In preparation for the migration of the University Portal to a new platform, a series of training workshops have been arranged for departmental administrators in October on the following functions of the University Portal:

  • News Channel Administration
  • Link Channel Administration
  • Departmental Web Folder Administration 

Invitations to the workshops have been sent to all departmental administrators. Don't forget to reserve your seat!