Both sides previous revision Previous revision Next revision | Previous revision |
public:security_rules [2024-06-27 10:12] – vesely | public:security_rules [2025-01-29 15:56] (current) – vesely |
---|
====== General Rules for Computer Infrastructure Users ====== | ====== General Rules for Computer Infrastructure Users ====== |
| |
| <faicon fa fa-hand-o-up> [[:public:lan_rules|General Rules for LAN Users]] |
| |
| ---- |
| |
**All Network (LAN) users are obliged to follow the Charles University rules for network users. The rules are applicated for CERGE and EI equivalently.** | **All Network (LAN) users are obliged to follow the Charles University rules for network users. The rules are applicated for CERGE and EI equivalently.** |
| |
(Network infrastructure rules implies also to any non-institutional computers and other devices like mobile phones connected via institutional WiFi networks) | Institutional computers are computers purchased by institution (CERGE or EI) no matter what source of financing was used. All purchased devices are property of the respective institution during theie whole lifecycle. In addition, network infrastructure rules apply also to any non-institutional computers and other devices like mobile phones connected via institutional wired and WiFi networks. |
| |
**See also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\ | **See also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\ |
| |
E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden. | E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden. |
| |
| For CERGE-EI users (staff, F&R, students), Windows and Apple Mac computers are provided in the version supported by the manufacturer. These two platforms ensure user comfort, support of the installed software by the IT department, the necessary security of operation and overview of the operation of the equipment owned by the institution (in accordance with the requirements for security according to the applicable laws and regulations), the up-to-date nature of the systems in use, protection of the institution's assets against theft and misuse, compliance with the licensing rules for the installed software, ensuring protection against third parties access. |
| |
While using CERGE-EI's computing facilities (like desktop PCs, laptops, tablets etc.), it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain. | While using CERGE-EI's computing facilities (like desktop PCs, laptops, tablets etc.), it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain. |
| |
//Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]// | //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]// |
| |
{{:public:pasted:20230315-112534.png?300x356}} | |
| |
| |