• No results found

MMK IT Policy

N/A
N/A
Protected

Academic year: 2022

Share "MMK IT Policy"

Copied!
2
0
0

Loading.... (view fulltext now)

Full text

(1)

MMK IT Policy

___________________________________________________________________________

Page 1 of 2 Rev 1.2 2020-06-01

Jan-Erik Kaarre

Rules for employees/students use of computer, network and system facilities at MMK.

Employees/students at MMK who have access to computing facilities should study these rules and confirm them by signing the enclosed form (encl 1). The responsibility of ensuring that employees/students read and confirm these rules lies with the head of department.

Furthermore, MMK has the following local rules and regulations:

1 General conditions

1. The account is for personal use only and may not be used by another person without permission from head of department. Any exploitation of defective configurations, program errors or other methods in order to secure a higher level of privilege than authorized is prohibited.

2. The account is limited in time and will be closed when the holder’s employment comes to an end.

3. The password for an account must be kept secret and should be chosen so that it is not easy to guess or hack.

4. A user that detects errors or flaws that might affect the safety or the system management must report this to the system manager.

5. The account owner should always logout from his/her computer at the end of the day.

2 Specific conditions

1. Available computing facilities may not be lent or let out without permission from the head of department.

2. Sabotage or other damaging or disruptive activities directed against the facilities or other users, as well as unauthorized access or attempts to gain unauthorized access is prohibited. This is applicable to MMK´s resources as well as those outside MMK.

3. Available facilities, such as e-mail, torrent, FTP, chat and WWW, may not be used to slander, insult or humiliate individuals or organizations. The user may not hide

his/hers identity when using MMK´s computing facilities (except in cases where this is explicitly permitted).

3 Maintenance and enforcement

1. For the purpose of regular maintenance and enforcement of these rules, system managers of MMK are entitled to log and examine traffic and data, files or suchlike that are stored or transmitted.

2. System managers are entitled to close individual or common accounts if infringement of laws or regulations is suspected.

3. The head of department is entitled to suspend users temporarily if infringement of these regulations is suspected.

4. Repeated or grave infringements of these regulations may be reported to the management team or to the law enforcement agency.

(2)

MMK IT Policy

___________________________________________________________________________

Page 2 of 2 Rev 1.2 2020-06-01

Jan-Erik Kaarre

Rules for employees’ use of computer, network and system facilities (IT-resources) at MMK.

This is to confirm that I have read and understood the rules and instructions concerning the use of MMK´s IT-resources.

_______________________________________________

Date

_______________________________________________

Signature

________________________________________________

KI username

_______________________________________________

Research group

_______________________________________________

Name (block letters)

References

Related documents

There are a lot of barriers to be found in Bloemendal, and the most obvious barrier is Chatty River Valley that divides the area into two parts, with KwaNoxolo on one side and

If we compare the responses to the first three questions with those to the last three questions, we notice a clear shift towards less concern for relative

This self-reflexive quality of the negative band material that at first erases Stockhausen’s presence then gradually my own, lifts Plus Minus above those ‘open scores’

In order to answer our research question, it is useful to consider these different risk management approaches to better understand how savings banks have interpreted and implemented

The objective with this study was to investigate how supportive documents can be incorporated into undergraduate courses to promote students written communication skills.

The figure looks like a wheel — in the Kivik grave it can be compared with the wheels on the chariot on the seventh slab.. But it can also be very similar to a sign denoting a

In this thesis we investigated the Internet and social media usage for the truck drivers and owners in Bulgaria, Romania, Turkey and Ukraine, with a special focus on

When Stora Enso analyzed the success factors and what makes employees "long-term healthy" - in contrast to long-term sick - they found that it was all about having a