Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:security_rules [2022-08-10 16:33] – vesely | public:security_rules [2024-05-15 11:15] (current) – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== General Rules for LAN Users ====== | + | ====== General Rules for Computer Infrastructure |
**All Network (LAN) users are obliged to follow the Charles University rules for network users.** | **All Network (LAN) users are obliged to follow the Charles University rules for network users.** | ||
Line 16: | Line 16: | ||
While using CERGE-EI' | While using CERGE-EI' | ||
- | It is forbidden to attempt to gain unauthorized access to programs, computers, information, | + | It is forbidden to attempt to gain unauthorized access to programs, computers, information, |
Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | Users must not deliberately overload the network (e.g., by sending mass mailings or chain letters). They must not change the configuration of the network equipment or manipulate it with devices not intended for public use. Users must follow all rules for handling the technical facilities. | ||
Line 23: | Line 23: | ||
Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). | Users are also obliged to follow the specific rules as well as the laws (e.g., copyright and export laws) of the networks and their respective countries which he/she enters (both within and outside CERGE-EI). | ||
+ | |||
+ | CERGE-EI does not guarantee users in any way the uninterrupted operation of the computer network or its services, their accessibility or quality. | ||
Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | Network traffic is monitored to optimize network operation and to detect and prevent abnormal situations and attempts of unauthorized access. Users agree that their action and data may be monitored; any information acquired will be kept confidential. Neither the network administrator nor CERGE-EI carries any legal accountability for contingent non-delivery, | ||
Line 29: | Line 31: | ||
//Text also available at CERGE-EI internal web [[https:// | //Text also available at CERGE-EI internal web [[https:// | ||
+ | |||
+ | {{: | ||