This is an old revision of the document!

General Rules for LAN Users

All Network (LAN) users are obliged to follow the Charles University rules for network users.

(Network infrastructure rules implies also to any non-institutional computers and other devices like mobile phones connected via institutional WiFi networks)

See also Rector's Measure No. 34/2017 / Computer Network Rules / at or Opatření rektora č. 34/2017 at
PDF version is available at

Every CERGE-EI employee (faculty, researchers and staff) and student (further referred to as “users”) will be issued an individual user account. Identity of each user must be explicit. The account is strictly for individual use. The user is obliged to select and keep confidential a security password. The user who allows the abuse of his or her account, or makes such abuse possible, is responsible for any resulting damages caused. If the user suspects abuse of his or her, or any other account, he or she is required to report this fact immediately to the domain administrator. Unless otherwise agreed the user's rights at CERGE-EI expire with the termination of the user's studies or employment contract.

CERGE-EI's computing facilities and network can only be used for approved activities or those activities related to the institution's operations (tuition, projects, individual work, correspondence, etc.). It is forbidden to abuse the computer network by spreading commercial, political, religious or nationalistic propaganda.

E-mail use follows the same ethical rules as ordinary mail. The sender must not assume another person's identity (the same applies to filling out www forms) and must not annoy other users with correspondence. An e-mail letter is considered to be an open correspondence; therefore, the use of vulgarisms is forbidden.

While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.

It is forbidden to attempt to gain unauthorized access to programs, information, privileged statuses, peripheries and data of the other users, or to mediate such access. If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access.

Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities.

Users must not spread information which contradicts the law or which might damage the honour of Charles University. This also applies to the construction of individual www pages and their direct references.

Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI).

Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, delay or other defects with information transfers.

Text also available at CERGE-EI internal web

  • /var/www/html/dokuwiki/data/attic/public/security_rules.1578913927.txt.gz
  • Last modified: 2020-01-13 11:12
  • by vesely