Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:security_rules [2017-05-11 11:17] – vesely | public:security_rules [2020-01-10 20:50] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== General Rules for LAN Users ====== | ====== General Rules for LAN Users ====== | ||
+ | |||
+ | **All Network (LAN) users are obliged to follow the Charles University rules for network users.** | ||
+ | |||
+ | **Network infrastructure also includes non-institutional computers and other devices like mobile phones connected via institutional WiFi.** | ||
+ | |||
+ | **See also Rector' | ||
+ | PDF version is available at [[https:// | ||
Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | ||
Line 7: | Line 14: | ||
E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | ||
- | While using CERGE-EI' | + | While using CERGE-EI' |
It is forbidden to attempt to gain unauthorized access to programs, information, | It is forbidden to attempt to gain unauthorized access to programs, information, | ||
Line 19: | Line 26: | ||
Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | ||
- | Also available at CERGE-EI internal web [[https:// | + | ---- |
+ | |||
+ | //Text also available at CERGE-EI internal web [[https:// | ||