Dean’s Measure no. 21/2010

Policy for Operation and Use of IT Equipment at FSV UK

Charles University, Faculty of Social Sciences
 

Dean’s Measure no. 21/2010

 

Title:

Policy for Operation and Use of IT Equipment at FSV UK

 

In effect from

1. 8. 2010

In Prague on July 12, 2010

               PhDr. Jakub Končelík, Ph.D.

Dean of the Faculty

 

Basic Provisions

  1. The network of the Faculty of Social Sciences, Charles University, is a collection of technical resources (i.e. cabling, network elements and central servers) enabling the faculty's employees and students to access the Internet or other public computer networks. This policy defines the basic rights and obligations of the faculty’s operators of computer technology, network administrators and its users.
  2. For the purposes of these rules, the user is a faculty member, a student, a doctoral student, or another person approved by the network administration and using the IT equipment of the faculty.
  3. Upon the Dean’s decision, designated employees, or workplaces have been entrusted with administering networks in individual location. Network administrators may issue operating rules as a supplement to these rules.

Rules for Users

  1. Every user must be registered and his/her identity must be known. The account must be strictly personal. The user is required to choose a secure access password and keep it confidential. For security reasons, the user is required to change his/her password periodically. If a user allows abuse of his/her identity, he/she is responsible for damages incurred. If a user discovers abuse of his/her or another account, s/he must immediately report this to the staff of the IT Department of FSV UK (hereinafter referred to as CIVT). By terminating the employment or one’s studies at the faculty, user rights will cease to exist.
  2. The computer technology, which is the property of the faculty, and the faculty network can only be used for activities approved by or related to the faculty (classwork, projects, independent work, personal correspondence, etc.).
  3. For the use of e-mail, the same ethic applies as for the use of a classic mail. The sender may not impersonate another person (also applies when filling in the WWW forms) and may not bother another person with his/her correspondence. An electronic letter needs to be regarded as an open mail, and as such the use of vulgarism is also prohibited.
  4. It is forbidden to distribute, install or use such software and data on the IT equipment of the faculty which the user is not authorized to distribute, install, or use (spreading also includes the passive propagation – i.e. placement on the anonymous FTP or WWW server). When working in a network, the user may not operate software that is in conflict with the software standard issued by CIVT. It is also prohibited to copy and distribute without permission any parts of operating systems and installed software that are not freely distributable.
  5. Attempts to gain unauthorized access to programs, information, privileged status, peripherals and other users' data or mediating and allowing such access are prohibited. If such access or condition occurs unintentionally, the user is required to inform CIVT.
  6. The user may not consciously overload the networks (e.g. by sending bulk or chain letters) and is required to use the closest source of the requested information when searching for information. S/he may not change the configuration of the network equipment or operate such devices that are not intended for public use. The user is required to adhere to the rules for handling specific IT equipment.
  7. The user may not disseminate information that is contrary to the law or which could damage the reputation of Charles University. This also applies to the content of WWW pages and direct links from these pages.
  8. The user is also required to adhere to the specific rules of the networks which s/he enters (both within and outside the faculty) and the laws (e.g. copyright and export laws) of the respective countries.
  9. Network operations are monitored in order to optimize their functioning, detect abnormal states and attempts for unauthorized access and prevent them. The user agrees that his/her operations and data can be monitored, and the information thus obtained is confidential. Network administrator and the faculty bear no legal responsibility for any non-delivery, delay or other defects in the transmission of information.
  10. Users are not allowed to change the configuration of workstations and install any software (any application, no matter what size and purpose, including utilities, screensavers, etc. is considered software for the purposes of these rules), without the knowledge and permission of CIVT. In the event of a violation of this rule, CIVT is not responsible for the operation of this device.
  11. CIVT is entitled to install only legally acquired software that is directly related to the performance of the user's profession or study.

 

Final Provisions

  1. The head of the respective unit or the dean of the faculty will be notified of any failure to comply with these rules. In the case of students, violation of these rules will be considered a disciplinary offence, and in the case of employees a gross violation of labour discipline.
  2. This policy applies to both equipment connected to the faculty network and to the IT equipment that is the property of the faculty but is not connected to the computer network.
  3. This policy shall enter into force on the date of issuance.

 

PhDr. Jakub Končelík, Ph.D.

Dean of the Faculty

In charge of accuracy:

Karel Janko

Head of CIVT