{"id":4182,"date":"2022-01-07T11:08:07","date_gmt":"2022-01-07T03:08:07","guid":{"rendered":"https:\/\/sites.gtiit.edu.cn\/it\/?page_id=4182"},"modified":"2022-01-07T11:08:08","modified_gmt":"2022-01-07T03:08:08","slug":"cryptocurrency-mining-risks-and-gtiit-policy","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/home\/cybersecurity-and-it-policies\/cryptocurrency-mining-risks-and-gtiit-policy\/","title":{"rendered":"Cryptocurrency Mining Risks and GTIIT Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4182\" class=\"elementor elementor-4182\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c26cc7 elementor-widget elementor-widget-heading\" data-id=\"5c26cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyrptocurrency mining risks and GTIIT policy<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<blockquote><p>According to recently published government pronouncements, cryptocurrency mining and cryptocurrency-connected business are illegal financial activities in China. This includes the use of GTIIT or personally owned systems using university electrical or campus networking resources, as well as the use of GTIIT computer equipment.<\/p><p><strong>What is Cryptocurrency Mining?<\/strong><\/p><p>Cryptocurrency mining is an extremely energy-intensive process in which computers run complex math problems for cryptocurrency networks to get rewarded with cryptocurrency, such as Bitcoin.<\/p><p><strong>Cryptocurrency Mining is banned in China<\/strong><\/p><p>The central government has identified that crypto mining is an \u201cextremely harmful\u201d industry that jeopardizes the country\u2019s pursuit of carbon neutrality. Accordingly, the Department of Education of Guangdong Province has instructed to prohibit staff or students from using public resources (including desktop computers, laptops, lab workstations, research computing servers, teaching computing servers, network services, and electricity) for cryptocurrency mining activities.<\/p><p><strong>Infringement of Cryptocurrency mining ban policy<\/strong><\/p><p>Following the government regulations, GTIIT has zero tolerance for any cryptocurrency mining activity on campus. Members of the GTIIT community who are found to be in breach of the cryptocurrency mining ban policy will be liable to disciplinary action under the relevant provisions for staff and students. Disciplinary actions may take the form of, but is not limited to, withdrawal of access to institute resources(e.g. sites, power supply, facilities), the imposition of a fine, the 1:1 conversation with the line manager.<\/p><p><strong>Protect GTIIT, Protect Yourself<\/strong><\/p><p>If you suspect the use of university resources for cryptocurrency mining, report it as a suspected security incident.<\/p><p>Protect yourself against unauthorized use of your own computer by following IT security best practices: keep your software and apps up-to-date, do not click suspicious links in email, do not open unknown shared documents or email attachments.<\/p><p style=\"text-align: left;\">For more information, please refer to <a href=\"https:\/\/sites.gtiit.edu.cn\/it\/zh\/home\/cybersecurity-and-it-policies\/it-policies-and-guidelines\/\">IT Policies and Guidelines<\/a>.<\/p><\/blockquote>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2a936 elementor-widget elementor-widget-text-editor\" data-id=\"5e2a936\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bab93d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4bab93d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a419433\" data-id=\"a419433\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyrptocurrency mining risks and GTIIT policy According to recently published government pronouncements, cryptocurrency mining and cryptocurrency-connected business are illegal financial activities in China. This includes the use of GTIIT or personally owned systems using university electrical or campus networking resources, as well as the use of GTIIT computer equipment. What is Cryptocurrency Mining? Cryptocurrency mining [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4186,"parent":549,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/4182"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/comments?post=4182"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/4182\/revisions"}],"predecessor-version":[{"id":4187,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/4182\/revisions\/4187"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/media\/4186"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/media?parent=4182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}