public:security_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:security_rules [2022-08-10 16:33] veselypublic:security_rules [2024-05-15 11:15] (current) vesely
Line 1: Line 1:
-====== General Rules for LAN Users ======+====== General Rules for Computer Infrastructure Users ======
  
 **All Network (LAN) users are obliged to follow the Charles University rules for network users.** **All Network (LAN) users are obliged to follow the Charles University rules for network users.**
Line 16: Line 16:
 While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain. While using CERGE-EI's computing facilities, it is forbidden to distribute, install or use software and data for unauthorized purposes (distributing includes placing software on a WWW server), tamper with the hardware (device intrusion, hardware or software reconfiguration, connecting or disconnecting internal computer components, manipulating with the provided computer operating system and tampering with its installed features and components). When using the network, the user must not run software which has not been authorized by the network administrator. Without such authorization, it is also forbidden to copy and distribute parts of the operation system or installed software that are not in the public domain.
  
-It is forbidden to attempt to gain unauthorized access to programs, computers, information, privileged statuses, peripheries and data of the other users, or to mediate such access. It is forbiden to tamper with installed security and management tools (antivirus, asset management, privilege management etc.). If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access.+It is forbidden to attempt to gain unauthorized access to programs, computers, information, privileged statuses, peripheries and data of the other users, or to mediate such access. It is forbiden to tamper with installed security and management tools (antivirus, asset management, privilege management etc.). If such a condition occurs unintentionally, the user is obliged to inform the machine or network administrator and, in case of his/her unavailability, to terminate the access. Computer and network administration and overall network and computer security compliance is non-transferable responsibility of the Computer Office.
  
 Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities.
Line 23: Line 23:
  
 Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI).
 +
 +CERGE-EI does not guarantee users in any way the uninterrupted operation of the computer network or its services, their accessibility or quality.
  
 Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, delay or other defects with information transfers. Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, delay or other defects with information transfers.
Line 29: Line 31:
  
 //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]// //Text also available at CERGE-EI internal web [[https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users|https://www.cerge-ei.cz/institutional-support/general-rules-for-lan-users]]//
 +
 +{{:public:pasted:20230315-112534.png?300x356}}
  
  
  • /var/www/html/dokuwiki/data/attic/public/security_rules.1660149226.txt.gz
  • Last modified: 2022-08-10 16:33
  • by vesely