public:security_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revisionBoth sides next revision
public:security_rules [2019-02-05 20:58] veselypublic:security_rules [2020-01-08 11:47] vesely
Line 4: Line 4:
  
 **see also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\ **see also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\
-PDF version is available at https://www.cuni.cz/UKEN-772-version1-charles_university_computer_network_rules.pdf+PDF version is available at [[https://www.cuni.cz/UKEN-772-version1-charles_university_computer_network_rules.pdf|https://www.cuni.cz/UKEN-772-version1-charles_university_computer_network_rules.pdf]]
  
 Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract. Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract.
Line 12: Line 12:
 E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden. E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden.
  
-While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.+While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, reconfiguration, connecting or disconnecting internal computer components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.
  
 It is forbidden to attempt to gain unauthorized access to programs, information, privileged statuses, peripheries and data of the other users, or to mediate such access. If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access. It is forbidden to attempt to gain unauthorized access to programs, information, privileged statuses, peripheries and data of the other users, or to mediate such access. If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access.
  • /var/www/html/dokuwiki/data/pages/public/security_rules.txt
  • Last modified: 2024-05-15 11:15
  • by vesely