Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:security_rules [2020-01-08 11:47] – vesely | public:security_rules [2024-06-27 13:55] (current) – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== General Rules for LAN Users ====== | + | ====== General Rules for Computer Infrastructure |
- | **All LAN users are obliged to follow the Charles University rules for network users.** | + | **All Network (LAN) users are obliged to follow the Charles University rules for network users. The rules are applicated for CERGE and EI equivalently.** |
- | **see also Rector' | + | Institutional computers are computers purchased by institution (CERGE or EI) no matter what source of financing was used. All purchased devices are property of the respective institution during theie whole lifecycle. In addition, network infrastructure rules apply also to any non-institutional computers and other devices like mobile phones connected via institutional wired and WiFi networks. |
+ | |||
+ | **See also Rector' | ||
PDF version is available at [[https:// | PDF version is available at [[https:// | ||
Line 12: | Line 14: | ||
E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person' | ||
- | While using CERGE-EI' | + | While using CERGE-EI' |
- | It is forbidden to attempt to gain unauthorized access to programs, information, | + | It is forbidden to attempt to gain unauthorized access to programs, computers, information, |
Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | ||
Line 21: | Line 23: | ||
Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). | Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). | ||
+ | |||
+ | CERGE-EI does not guarantee users in any way the uninterrupted operation of the computer network or its services, their accessibility or quality. | ||
Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | ||
Line 27: | Line 31: | ||
//Text also available at CERGE-EI internal web [[https:// | //Text also available at CERGE-EI internal web [[https:// | ||
+ | |||
+ | {{: | ||