Brno University of Technology

Rector's Directive no. 3/1999
BUT Computer Network Operating Regulations

Section 1
Fundamental provisions

  1. The computer network of the Brno University of Technology (hereinafter "BUT") is an integral part of the Brno Academic Computer Network (BAPS), established by the universities and other organizations in Brno. It is directly connected to the Czech national research network and through this to the Internet.
  2. "Computer network" in this directive is to be understood as all the hardware and software that serve both for connecting computers as well as for making use of being connected in this way. The purpose of the computer network is to ensure the data linkup of the BUT complexes and their connection to BAPS for the purposes of teaching, research and the operation of the university.
  3. The regulations laid down in this directive are binding on all users of the computer network and all computers and similar devices connected to the computer network. Where particular provisions of the regulations concern only students, the term "student" is used. Where particular provisions of the regulations concern only employees, the term "employee" is used. Where the term "user" is used, the regulation in question concerns both students and employees.
  4. The administration of the computer network is guided by the Regulations for the Administration of the BUT Computer Network. These regulations lay down the rights and obligations of the administrators of the computer network. Appropriate sections of these regulations also apply to users involved in the independent administration of their own computer resources connected to the BUT computer network.
  5. The regulations for access to BAPS and other networks (TEN-155, the Internet) are specified in the operating regulations of these networks.

Section 2
Access and identity

  1. Only authorized users may use the BUT computer network. Authorized users (hereinafter "users") are those who it can be shown have been informed about this directive. The users list is kept by the appropriate computer network administrator.
  2. Employees and students of BUT have a right to become users. The use of the BUT computer network by individuals from other organizations is only possible on the basis of written permission issued by the Dean of the appropriate faculty or the Rector or individuals authorized by them.
  3. Users are obliged to keep themselves informed about updated information and instructions, which are available in electronic form (http://www.vutbr.cz/rules).
  4. If the identity of users is required to log in to the computer network, they must use the username assigned by the administrator of the computer network. Users are obliged to use a non-trivial password to confirm their identity and to keep this password secret in order to prevent its being misused.
  5. Users are forbidden from informing other persons of the assigned username and password. Furnishing them to an individual without access rights or whose access has been blocked is regarded as a serious offence.
  6. Users may not misuse the carelessness of other users (for example, their forgetting to sign off) for the purpose of working under someone else.s identity.
  7. Users. access rights are granted by the administrator of the computer network. Users are forbidden to use any means in order to try to obtain access rights that were not granted to them. If a flaw in the system should lead to users acquiring any access rights to which they are not entitled, they are obliged to report this immediately to the administrator (at the level of the department, complex, faulty or at cert@vutr.cz) and are forbidden from making use of these access rights.
  8. Users are forbidden from misusing the BUT computer network for the purpose of gaining unauthorized access rights to arbitrary information sources accessible through the BUT computer network.

Section 3
Using the BUT computer network

  1. Users may only use the computer resources and computer network for the purposes of education, science, research, development and artistic activities or in connection with tasks linked with the operation and administration of BUT. In particular, using the network for commercial purposes not connected with BUT.s activities; spreading information of a commercial nature; political, religious and racial agitation; the promotion of drugs, and the spread of materials that are against the law are considered infractions of the regulations.
  2. Users only have the right to use legally acquired software. Programs can be copied only when current copyright laws are not breached. Users can only use shareware or freeware obtained with the help of the BUT computer network for purposes listed in subsection 1. The use of the computer network for offering illegally obtained software or data is regarded as a serious offence.
  3. Users may not interfere with the programs, data or hardware of the computer network without the agreement of an administrator. A particularly strict ban is placed on unauthorized changes to the configuration of the computers or other resources that could have an influence on the operation of the computer network. Students are prohibited from installing programs without the agreement of an administrator.
  4. Users have the right to use the assigned disc space, computer resources and computer network only with regard to the overall load. Users are forbidden from deliberately disrupting the work of other users or network operation or performance. They must obey the injunction of the administrator to reduce the load they have generated without delay.
  5. The size of electronic mail and conferences that can be transmitted may be limited. The specific limit is determined by the technical possibilities and is set by the administrator. If the amount of disc space used by an individual user exceeds the user limit, incoming e-mail for the user in question may be automatically blocked.
  6. BUT is not responsible for any loss of user data. Users themselves are responsible for making backup copies of user data and programs.

Section 4
Protection of privacy and the publishing of information

  1. The same rules apply for the use of e-mail and e-conferences as for the use of ordinary post, in which a postal message has the character of an open postal matter.
  2. Users are responsible for ensuring that their messages are precisely addressed and that no unwelcome inconvenience for other users owing to the sending of chain letters or letters addressed to lists of addressees put together without the agreement of those affected.
  3. In sending e-mails, users are obliged to use the assigned username (name of the e-mail box). Sending mail using a false identity for the purpose of deception, intimidation or obtaining unauthorized information is regarded as a serious offence.
  4. The receipt of e-mail from addresses infringing subsections 4 2. and 4 3. can be blocked.
  5. Users are fully responsible for the contents of their own publicly accessible web pages and other information sources, in particular for breaches of copyright law in copying others. material.
  6. Files in users. directories and system mailboxes are the private data of their owners. Users have a right to the protection of their privacy, even when they do not protect their directory. Creating a copy of others. data and eavesdropping on the operation on the computer network with the aim of obtaining the contents of messages or data is regarded as a serious offence.
  7. Administrators have the right to block access to files inconsistent with the intent of the provisions of subsection 3 1. or those threatening the security of the system and the computer network (virusinfested programs, tools for eavesdropping on operations, obtaining improper programs, etc.), and users must remove them immediately when asked to do so by an administrator.
  8. BUT is not responsible for possible misuse of data in the course of the transmission and storage of information in the computer network.
  9. Administrators have the right to take all steps necessary for carrying out their job, including if necessary checking on data and monitoring the activities of users. If users employ encryption in order to keep information secret, they are obliged to make the contents of the data accessible to the administrator in case of doubt as to their use with regard to the intent of subsection 3 1.

Section 5
Regulations for connecting to the computer network

  1. Users are required to ask the network administrator for permission:
    1. before connecting a given device to the computer network;
    2. before a change in configuration of a device that could have an influence on the operation of the network;
    3. before permanently disconnecting a device from the computer network.
    The administrator will register the connected devices in accordance with the Regulations for the Administration of the BUT Computer Network.
  2. The individual responsible for the proper installation of the operating system and network software of a computer connected to the computer network is either an employee authorized by the network administrator to do this, or the user, if he or she has received permission to install the operating system independently (if this is permitted by the operating regulations for the computer network at the level of the relevant faculty or department).
  3. In administering the operation system and network software of computers connected to the computer network independently, users must observe the relevant provisions of the Regulations for the Administration of the BUT Computer Network.
  4. When connecting to the computer system, users may not use a different network address than the one assigned to them (whether this is dynamic or static).
  5. Users may only employ modems and other resources for external connection to the BUT computer network with the agreement of an administrator.
  6. The BUT computer network can only be use within the framework of cooperation in science and teaching on the basis of written authorization from the Rector or the Dean of the relevant faculty.

Section 6
Penalties for students violatin the computer network operating regulations

  1. Violating the computer network operating regulations is regarded as violating regulations in the sense of paragraph 62 (1) g) of Act no. 111/1998 on Higher Education Institutions and on Amendments and Supplements to Some other Acts (the Higher Education Act).
  2. Pursuant to sections 64 and 67 of the above Act, a student can be sanctioned in accordance with the Disciplinary Code and in the case of especially serious violations of the code may be expelled.
  3. If less serious infractions of the computer network operating regulations are observed, the network administrator or an individual authorized by him/her has the right to warn the student.
  4. In the case of more serious infractions, or the repetition of less serious infractions, the administrator or individual authorized by him/her may withdraw the student.s right to use the services of the computer network outside organized teaching for a specified period of time (the maximum being two months). In this case, the student has the right to appeal to the Dean (in the case of a faculty) or to the head of the relevant part of BUT (for example Residences and Catering Facitilies). This appeal does not have suspensive effect.
  5. In cases of repetition, or especially serious infractions, the case will be dealt with as follows:
    1. On the day the infraction of the computer network operating regulations is determined, the student will lose the right to use the network services.
    2. The case will be submitted to the Disciplinary Committee of the relevant BUT faculty.
    3. On the basis of discussions held by the Disciplinary Committee, the Dean of the relevant faculty will decide on sanctions, which may also include closing off access to the services of the BUT computer network for a specified period of time.
    Such a course of action will not limit or preclude possible criminal liability.

Section 7
Penalties for employees violating the computer network operating regulations

  1. In the case of employees, violation of the provisions of this directive is regarded as a violation of the basic responsibilities of an employee (paragraphs 73 (1) c) and d) of the Labour Code) and the appropriate steps pursuant to the provisions of the Labour Code may be taken, dismissal included.
  2. When an infraction of the computer network operating regulations is observed, the administrator or individual authorized by him/her will inform the employee which regulation(s) her or she has broken; in the case of a serious infraction, the leading employee of the relevant unit will be informed of this.
  3. In cases of repetition, the case will be dealt with as follows:
    1. On the day the infraction of the operating regulations for the computer network is determined, the employee will lose the right to use the network services.
    2. The case will be submitted to the Dean of the relevant BUT faculty or the Rector in the case of other constituent parts of BUT, who will decide on what measures to take in the light of the provisions of the Labour Code.
    Such a course of action will not limit or preclude possible criminal liability.

Section 8
Final provisions

  1. By signing the Protocol on Assigning a User Account, users commit themselves to proceeding according to the principles embodied in this directive and take notice of the penalties arising from infractions of the regulations.
  2. The computer network operating regulations at faculties or other constituent parts of BUT may be supplemented by regulations issued by the Dean of the relevant faculty of the head of the relevant constituent part of BUT (for example the Residences and Catering Services). The operating regulations at the faculties and other constituent parts of BUT may not contradict the BUT Computer Network Operating Regulations.
  3. This directive comes into effect on the day it is signed.

 

Prof. Ing. Petr Vavřín, DrSc
BUT rector