Ansvarlig for nettsiden Arne Hatlen - 24/08/2012
Use of ICT-resources at Telemark University College (HiT) - Rules for students
1.Use and security
- These rules apply to students use of ICT-resources at HiT.
- ICT-resources at HiT include computer labs, computers, printers and other peripherals, computer software, electronically stored information, networks and ICT-systems outside HiT accessed from the HiT network, and network in student homes connected to HiT’s ICT-network.
- The purpose of these rules is to ensure that the ICT-resources at HiT are used in accordance with the goals and strategies of HiT, to prevent illegal or unacceptable activities and to protect the functionality and information stored in the ICT-resources with respect to corruption, authenticity and privacy.
2. Who have access to ICT-resources at HiT?
- Registered students who have signed this form have access to HiT’s ICT resources.
- Participants of courses using theICT-systems of the college, with a temporary user account valid for the duration of the course.
- Other students granted user accounts by application to the Computer Services Center (CSC), that have accepted these rules by signature.
3. Publishing, rights and responsibilities.
- According to the rules for web publishing at the college, ICT-users at HiT are personally financially and legally accountable for the text, images, sounds, video or other information they publish on web pages, place in other file storage areas, or transmit to others over the net.
- Users must ensure that information made available to others using ICT-resources at HiT are not liable to copyrights or publishing restrictions. The ICT-user will be responsible for any financial claims made from the holders of property rights.
- Before storing biographical data on HiTs ICT-equipment, a user must if necessary apply for a concession from the Datatilsynet.
- HiT is not financially or otherwise responsible for any loss or disadvantage suffered by the user of the college ICT-equipment due to technical problems, defective systems, incorrect use of the systems or undesired activities performed by students or employees at the college, or by external intruders in the HiT-network.
- The users of HiT’s ICT-resources are responsible for the costs and inconveniences inflicted on others by illegal or negligent use of the ICT-resources directly or indirectly.
4. Use and security
- The username and password is the user’s personal entry code to the computer network.
- The user must always log off the network after use.
- A user must never provide unauthorized persons with access to the use of the computers or network of the college or to premises where computer equipment is available.
- A user must report any misuse, defects or other circumstances relating to the security of the ICT-resources to CSC.
5. Storage, back up and deletion of data
- A user may only store files in the users home directory and in designated areas where the user is explicitly granted write access. Storing data in other locations is prohibited even if the location is not write protected.
- HiT is not responsible for the users data unless a specific agreement has been made with CSC. Students with valued data must secure this with their personal copy on disc or other media for the purpose of high volume data storage.
- Student user accounts and storage areas will be deleted when the account expires, the standard period of study comes to an end or the student leaves the course of study. Students are responsible for making copies of data to be preserved.
- Students leaving HiT are obligated to make sure that data and systems belonging to HiT, or that HiT owns the rights to, are preserved for later use, to return borrowed ICT-equipment and to remove copies of software borrowed from HiT from their private computers.
6. Licensed software and data
- It is not allowed to copy any licensed or private software or data from the college systems without permission granted by CSC.
- It is not allowed to store licensed software on HiT ICT-equipment without prior agreement with CSC.
7. Computer viruses
- Floppy discs must be scanned for viruses if they have been used on a computer that may be infected by viruses.
- If a virus infection is suspected, immediately alert the ICT-staff unless the virus can be removed by the user. No actions that may cause the virus to proliferate must be made.
- Before connecting a private computer to the network, the user must be sure that the computer is free from data viruses and protected against intrusion from others. The ICT may block the connection pc’s that cause trouble for the ICT systems functionality or if these rules or Norwegian legislation are violated.
8. Considerate use of limited resources
- The ICT-equipment at the college is to be used for purposes relevant to the curricular and extracurricular activities of the college.
- Work related to curicular activities of the college take priority in the computer labs.
- Activities that consume a large amount of ICT-resources, e.g. sending of bulk mail, is not allowed without making an agreement with CSC.
- IT-users must show consideration to the work environment and the operational stability of the ICT-workplaces. Hence, ICT users are not allowed to eat or drink nor to leave papers or rubbish in the computer labs or at the printers.
- Downloading of large amounts of data, for instance music files, is prohibited if it disturbs activities relevant to the curricular activities. It is prohibited to expose files for eksternal downloading by using filesharing services.
9. It is not allowed...
- It is not allowed to make commercial use of the college ICT-equipment and software without prior agreement with CSC.
- It is not allowed to make use of the college computers to attempt to gain illegal entry , crack passwords or make illegal use of college or other computer resources.
- It is not allowed to falsify information, e.g. email sender address, to assume a false identity, pass on chain letters or to engage in illegal or dishonest activities on the net.
- It is not allowed to install servers in the network without prior agreement with CSC.
- It is not allowed to move equipment, change configurations, open up equipment or connect/disconnect network equipment without prior agreement with CSC.
- The college computer network must not be used for invasions of privacy, to impart defamatory, discriminating or indecent information, or to invite to or engage in illegal acts.
10. Right of inspection and confidentiality
- Any student who obtains access to private information due to inadequate protection of data, technical problems or by improper use of HiT’s ICT-equipment, is bound to secrecy.
- To ensure computer security and the stability of the network services, CSC may log and monitor activities and traffic in the computer network.
- The CSC has the right to inspect the user’s private storage areas when they suspect violations of the rules for ICT-user conduct, or whe nICT is demanded to maintain the stability of the network services.
11. Sanctions following violation of the rules for ICT-user conduct
- When the HiT rules for ICT-user conduct are violated, CSC may deny the student access to the user account.
- Serious incidents will be submitted to the Director General for possible indefinite denial of access or police prosecution on suspicion of violation of the law.
Printed from: http://www.hit.no/HiT/Student/IT-Services/User-account-and-password/ICT-resources-rules-for-students