Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision Next revisionBoth sides next revision | ||
public:security_rules [2017-05-11 11:13] – created vesely | public:security_rules [2020-01-13 11:12] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | GR | + | ====== General Rules for LAN Users ====== |
+ | |||
+ | **All Network (LAN) users are obliged to follow the Charles University rules for network users.** | ||
+ | |||
+ | (Network infrastructure rules implies also to any non-institutional computers and other devices like mobile phones connected via institutional WiFi networks) | ||
+ | |||
+ | **See also Rector' | ||
+ | PDF version is available at [[https:// | ||
+ | |||
+ | Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | ||
+ | |||
+ | CERGE-EI' | ||
+ | |||
+ | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | ||
+ | |||
+ | While using CERGE-EI' | ||
+ | |||
+ | It is forbidden to attempt to gain unauthorized access to programs, information, | ||
+ | |||
+ | Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | ||
+ | |||
+ | Users must not spread information which contradicts the law or which might damage the honour of Charles University. This also applies to the construction of individual www pages and their direct references. | ||
+ | |||
+ | Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). | ||
+ | |||
+ | Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | ||
+ | |||
+ | ---- | ||
+ | |||
+ | //Text also available at CERGE-EI internal web [[https:// | ||
+ |