Utskrift från Malmö högskolas webbplats www.mah.se

Computer rules

Rights and Obligations of the computer User

Computer user refers to anyone using the IT-services of Malmo University.Explanatory notes at the end of this document

What governs the computer users use of the IT-systems of Malmo University?

  1. Applicable laws and regulations
  2. The regulations of SUNET and other external agreements (1)
  3. Malmo University's objective of equality and equal value
  4. This text

To all user identities at Malmo University it applies that: (2)

  • All computer usage at Malmo University is linked to a personal computer identity given to each student, researcher and employee. It is personal and the owner is responsible for its use. Visitors may be given a restricted computer identity when needed.
  • He/she who signs for and uses a computer identity is obliged to follow paragraphs 1-4 above.
  • Only the owner of a computer identity has the right to use the resources associated with the identity.
  • Permitted use is such use that is not contrary to current restrictions.
  • The IT resources at the University are first and foremost intended to be used in teaching, research and the administration that follows thereof.
  • Computer identities that has not been active during the last 18 months will be terminated without liability unless otherwise has been agreed. (3)

To all use of IT-resources at Malmo University it applies that:

  • Sabotage and disruptive activities are not allowed.
  • Attempts to circumvent security and gain escalated system access is not allowed. (4)
  • Installation of programs or applications without permission is not allowed.• All material must be handled in accordance with copyright laws. (5)
  • Malmo University can not be held responsible for the function or availability of the IT-systems.
  • Malmo University reserves the right to restrict publication and distribution of material through the IT-systems of the University.
  • The IT-technicians of the University is obliged not to reveal information to others than the legal authorities.
  • Logging of traffic information is done i accordance with Swedish law. (6)
  • At suspicion of irregularities an investigation can be carried out without prior warning. (7)
  • At ongoing irregularities a computer user can be disconnected from the IT-systems without prior warning. (8)

Sanctions

  • Crimes will be reported to the police
  • Violations of the external agreements or these rules will be handled by the University's disciplinary board and may result in sanctions depending on the circumstances.

Registration of personal information.

  • Name and personal number are registered for every holder of a computer identity.
  • Computer identity and name are registered for every holder of print credits
  • Name and personal number are registered for every user in IT:s learning
  • Name, personal number and picture (if the registree consents) are registered for every holder of an access card

All personal information is erased when the connected account expires.
All documents are available at www.mah.se

Explanatory notes

  1. SUNET stands for Swedish University Network and this organization is the Internet service provider to the Swedish universities. The regulations of SUNET applies to all connected universities. These rules are about how we behave on the Internet and how we present ourselves. These rules also prohibits all commercial use of the university networks. SUNET's rules can be found at:http://basun.sunet.se/html_docs/extregler.html
  2. A computer identity is the user ID that a person logs on to the network with. Connected to this computer identity are a number of resources like the home directory. Every computer user has access to one computer identity, but may have access to additional computer identities depending on the work situation. Since you, as computer user, are responsible for the actions done in the name of your computer identity it is vital that you use a secure password and not to let it be known to others. If you suspect that someone may have access to your computer identity you must contact the helpdesk/servicedesk without delay.
  3. This means that all material in the home directory will be erased when the computer identity expires. As computer user it is your responsibility to copy any material that you would like to keep after your studies or when you plan on taking a study break longer than 18 months.  If you are uncertain of what to do you may contact thehelpdesk/servicedesk.
  4. This pertains to all activities that disrupts or limits legitimate use of IT resources by others. This applies to all servers and services of the Internet and not only those belonging to the University. It also applies to preparatory activities such as port scanning and sniffing etc.
  5. For all material that you have created yourself it is your own decision whether or not to make it public, but for any other material you need the consent of the copyright owner before you may publicize it. Please note that it may not be allowed to distribute material containing personal information due to restriction in the law about personal information (personuppgiftslagen) or contents in violation of Swedish law.
  6. EU has issued directives regarding logging of traffic information, and members are required to adapt their national legislation in accordance. Traffic information is information about who has communicated with whom and when, but not the contents of the communication. As a comparison we can say that in regards to a letter sent by post, the traffic information is what can be read on the outside of the envelope but not the contents of the letter inside the envelope. Logging of traffic information is done by  the IT department.
  7. This means that if traffic information indicates a breach of these rules, the trafficitself may be collected and read.If a suspicion that arise from the gathered traffic information, and is confirmed by investigation, the computer identity may be blocked immediately by the Network Administrator pending investigation by the disciplinary board.  
Last updated by Karin Björkenrud