19

Oct
Fri
16:27

IT regulations ch. 3-6

3. Personal use
4. Data security
5. Privacy
6. Proper use ​

3. Personal use

3.1. Users of BI’s IT services must be registered users with a user-identity provided by BI. Other users can be provided access if this is explicitly accounted for in the agreement of association between the specific organization or unit and BI.

3.2. The user-identity and password are strictly confidential, and must not be shared with others. Should a user nonetheless become aware of, or suspect that, a password has been made available to others, the IT department should be contacted immediately.

3.3. When logging onto BI’s IT systems users must always use their own user-identity and password. Use of, or the attempt to use, other users’ identities and/or passwords is forbidden.

3.4. It is forbidden to assume a false identity in connection with any and all use of BI’s IT services.

4. Data security

4.1. Norwegian law is the basis for all use of BI’s IT services.

4.2. As there is always a risk for unauthorized entry into the system, and consequently into users’ personal storage area on the net or PCs, files that should not be read by other persons should not be stored on BI’s computers or systems. 

4.3. Users are required to heed instructions from operations personnel. Conditions and situations that might have consequences for the security of BI’s IT services should be reported to the relevant IT department.

4.4. Users are required to make themselves acquainted with relevant guidelines, instructions and documentation in order to avoid malfunction of the system or loss of data and programmes. This kind of information will be available at “Studentportalen - IT Brukerstøtte” on http://www.bi.no/ .

4.5. Users are required to assist in hindering unauthorized access to BI’s IT services and equipment.

4.6. Users themselves are required to assure that an updated and effective anti-virus programme is installed in each and every PC connected to BI’s network. Information and instructions for the installation and downloading of anti-virus programmes are available at “Studentportalen - IT Brukerstøtte” on http://www.bi.no/

4.7. Users are themselves responsible for taking appropriate measures to avoid loss of data. Such measures include appropriate routines for making backup copies and for saving media, prudent use of the net and for use of protective measures, such as anti-virus programmes. BI is not responsible for loss or damage experienced by the user as a result of inadequate security precautions.

4.8. Relocating or removing BI’s computer equipment or changing their configurations is prohibited.

4.9. BI’s IT equipment is to be treated with care. Vandalism and irresponsible use of the equipment will result in appropriate action from BI’s management as well as demand for financial compensation. Refer to the Academic regulations.

4.10. It is prohibited for users to set up their own information servers (www, ftp, irc, etc.) or multi-use systems (Linux, Unix, NT, etc.) without the express, written permission of the IT department. A separate application form is available here. (Only in Norwegian)

4.11. BI and BI’s IT services reserve the right to check, change or remove any file or system resource that might damage or create a significant hinder for authorized use of the school’s computer equipment.

5. Privacy

5.1. Any attempt to gain access or acquire information about ​elements of security or other users’ passwords or to obtain unauthorized access to others’ data is strictly forbidden. This applies regardless of whether the data is protected or not.

5.2. Unauthorized entry, or any attempt at unauthorized entry into other persons’ machines, areas or systems via BI’s network is strictly forbidden.

5.3. User monitoring of data traffic on the net is not permitted.

6. Proper use

6.1. It is prohibited to use BI’s equipment for defaming or discriminating communication, or to transmit pornography, racist material or material that is classified as confidential, nor is it permitted to violate the personal privacy of others or to encourage or abet activities that are in conflict with Norwegian law or this document.

6.2. Use of BI’s IT services for commercial purposes without affiliation to the activities of BI is not permitted without the express, written permission of the school.

Last Modified: 09/07/2012 13:48