public:security_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:security_rules [2023-02-03 09:51] veselypublic:security_rules [2023-03-15 11:25] (current) vesely
Line 16: Line 16:
 While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain. While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.
  
-It is forbidden to attempt to gain unauthorized access to programs, computers, information, privileged statuses, peripheries and data of the other users, or to mediate such access. It is forbiden to tamper with installed security and management tools (antivirus, asset management, privilege management etc.). If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access. Computer administration and overall network and computer security compliance is non-transferable responsibility of the Computer Office.+It is forbidden to attempt to gain unauthorized access to programs, computers, information, privileged statuses, peripheries and data of the other users, or to mediate such access. It is forbiden to tamper with installed security and management tools (antivirus, asset management, privilege management etc.). If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access. Computer and network administration and overall network and computer security compliance is non-transferable responsibility of the Computer Office.
  
 Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities.
Line 29: Line 29:
  
 //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]// //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]//
 +
 +{{:public:pasted:20230315-112534.png?300x356}}
  
  
  • /var/www/html/dokuwiki/data/attic/public/security_rules.1675417894.txt.gz
  • Last modified: 2023-02-03 09:51
  • by vesely