Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:lan_byod [2025-01-29 15:40] – vesely | public:lan_byod [2025-04-08 11:44] (current) – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Rules for use of non-instituonal | + | ====== Rules for use of non-institutional |
+ | |||
+ | <faicon fa fa-hand-o-up> | ||
+ | |||
+ | ---- | ||
The use of own (private) computer equipment and mobile phones on the premises of the institution is fully supported. | The use of own (private) computer equipment and mobile phones on the premises of the institution is fully supported. | ||
- | \\ | + | Depending on the type of user, this is allowed on the Eduroam, Residents, Guest wifi and Guest LAN Ethernet networks, all in compliance with the obligations set by the infrastructure operator (UK, CAS, PASNET, CESNET - [[: |
- | Depending on the type of user, this is allowed on the Eduroam, Residents, Guest wifi and Guest LAN Ethernet networks, all in compliance with the obligations set by the infrastructure operator (UK, CAS, PASNET, CESNET - e.g. see the document "Rules for users of the UK computer network", | + | |
- | For a computer acquired with grant funds, where there is a requirement for an operating system other than the supported (Windows and Mac are supported) applies that the said hardware will be made fully available to the user without an operating system after acquisition by IT office and after registration in the property. | + | For a computer acquired with grant funds, where there is a requirement for an operating system other than the currently |
- | From the moment of handover, the user is fully responsible for all activity carried out on this computer, for the software installed, license compliance, data backups, security software updates, and all this in compliance with the obligations set by the infrastructure operator and the responsible statutory bodies (Director | + | From the moment of handover, the user is fully responsible for all activity carried out on this computer, for the software installed, license compliance, data backups, security software updates, and all this in compliance with the obligations set by the infrastructure operator and the responsible statutory bodies (Director, |
- | For this scheme, the same rules for network use apply as for the use of private devices (see above). \\ | + | For this scheme, the same rules for network use apply as for the use of private devices (see above).\\ |
The user has access to the Internet. Other available services (from the residents network and guestwire) are mainly as follows: MyQ print, TAS web pages, internal, email services, heavyhorse via RDP gateway, etc. | The user has access to the Internet. Other available services (from the residents network and guestwire) are mainly as follows: MyQ print, TAS web pages, internal, email services, heavyhorse via RDP gateway, etc. | ||
\\ | \\ | ||
- | For security reasons, the user does not have access to the organisation' | + | For security reasons, the user does not have access to the organisation' |