Polityka bezpieczenstwa SK UMK wyciag/en
Z Uniwersyteckie Centrum Informatyczne
< Polityka bezpieczenstwa SK UMK wyciag
Wersja Twoln@umk.pl (dyskusja | edycje) z dnia 13:29, 21 maj 2018
This extract contains rulesthat directly concern the users of the UMK network.
Chapter 1 General concepts
§ 1
- At Nicolaus Copernicus University in Toruń, hereinafter referred to as the "NCU", there is a computer network.
- The computer network of NCU, hereinafter referred to as "SK UMK", covers all UMK objects, in particular locations in Toruń, Piwnice and Bydgoszcz, as well as network services provided by NCU on its own or foreign resources.
- The basic role of SK UMK is to support didactic, scientific and university management processes.
- UMK shall not be liable for losses resulting from the failure of SK UMK.
- SK UMK may be used in a manner that does not violate applicable legal regulations.
- Through UMK SK it is not allowed to distribute content or images of commercial, advertising, political, etc. without the consent of the rector or chancellor.
§ 2
- The security policy of SK UMK, hereinafter referred to as "Policy", introduces unified operating principles for users and network and service administrators to ensure proper data protection.
- The policy consists of the main document issued as the Rector's order and three annexes defining detailed procedures for the following areas of SK UMK:
- account management - attachment No. 1 ;
- domain management - attachment No. 2 ;
- external services, provided by the account in SK UMK - attachment No. 3 .
- Responsibility for maintaining the Policy, in particular for submitting update proposals resulting from changes in law and technology, rests with the Information & Communication Technology Centre of the Nicolaus Copernicus University, hereinafter referred to as "UCI"
- The policy is accompanied by internal documents, approved by the UCI director, specifying the detailed rules of operation within the subsystems constituting SK UMK.
- If the word should and its variants is used in this text, then should be interpreted that any exceptions for a given rule must be justifiable and documented.