public:security_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:security_rules [2020-01-10 20:50] veselypublic:security_rules [2023-03-15 11:25] (current) vesely
Line 3: Line 3:
 **All Network (LAN) users are obliged to follow the Charles University rules for network users.** **All Network (LAN) users are obliged to follow the Charles University rules for network users.**
  
-**Network infrastructure also includes non-institutional computers and other devices like mobile phones connected via institutional WiFi.**+(Network infrastructure rules implies also to any non-institutional computers and other devices like mobile phones connected via institutional WiFi networks)
  
 **See also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\ **See also Rector's Measure No. 34/2017 / Computer Network Rules / at [[https://www.cuni.cz/UKEN-772.html|https://www.cuni.cz/UKEN-772.html]] or **Opatření rektora č. 34/2017 at [[https://cuni.cz/UK-8237.html|https://cuni.cz/UK-8237.html]]\\
Line 14: Line 14:
 E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden. E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden.
  
-While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.+While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.
  
-It is forbidden to attempt to gain unauthorized access to programs, information, privileged statuses, peripheries and data of the other users, or to mediate such access. If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access.+It is forbidden to attempt to gain unauthorized access to programs, computers, information, privileged statuses, peripheries and data of the other users, or to mediate such access. It is forbiden to tamper with installed security and management tools (antivirus, asset management, privilege management etc.). If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access. Computer and network administration and overall network and computer security compliance is non-transferable responsibility of the Computer Office.
  
 Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities.
Line 29: Line 29:
  
 //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]// //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]//
 +
 +{{:public:pasted:20230315-112534.png?300x356}}
  
  
  • /var/www/html/dokuwiki/data/attic/public/security_rules.1578689414.txt.gz
  • Last modified: 2020-01-10 20:50
  • by vesely