Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:security_rules [2017-05-11 11:18] – vesely | public:security_rules [2020-01-08 11:48] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== General Rules for LAN Users ====== | ====== General Rules for LAN Users ====== | ||
+ | |||
+ | **All LAN users are obliged to follow the Charles University rules for network users.** | ||
+ | |||
+ | **see also Rector' | ||
+ | PDF version is available at [[https:// | ||
Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | ||
Line 7: | Line 12: | ||
E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | ||
- | While using CERGE-EI' | + | While using CERGE-EI' |
It is forbidden to attempt to gain unauthorized access to programs, information, | It is forbidden to attempt to gain unauthorized access to programs, information, | ||
Line 22: | Line 27: | ||
//Text also available at CERGE-EI internal web [[https:// | //Text also available at CERGE-EI internal web [[https:// | ||
- | |||
- | . | ||