Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:security_rules [2018-05-04 08:03] – vesely | public:security_rules [2022-08-10 16:33] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== General Rules for LAN Users ====== | ====== General Rules for LAN Users ====== | ||
- | **All LAN users are obliged to follow Charles University rules for network users. | + | **All Network (LAN) users are obliged to follow |
- | Czech version of rules is available | + | (Network infrastructure |
+ | |||
+ | **See also Rector' | ||
+ | PDF version is available at [[https:// | ||
Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. | ||
Line 11: | Line 14: | ||
E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | ||
- | While using CERGE-EI' | + | While using CERGE-EI' |
- | It is forbidden to attempt to gain unauthorized access to programs, information, | + | It is forbidden to attempt to gain unauthorized access to programs, computers, information, |
Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. |