3. Personal use
3.1. Users of BI’s IT services must be registered users with a user-identity
provided by BI. Other users can be provided access if this is explicitly
accounted for in the agreement of association between the specific organization
or unit and BI.
3.2. The user-identity and password are strictly confidential, and must not
be shared with others. Should a user nonetheless become aware of, or suspect
that, a password has been made available to others, the IT department should be
3.3. When logging onto BI’s IT systems users must always use their own
user-identity and password. Use of, or the attempt to use, other users’
identities and/or passwords is forbidden.
3.4. It is forbidden to assume a false identity in connection with any and
all use of BI’s IT services.
4. Data security
4.1. Norwegian law is the basis for all use of BI’s IT services.
4.2. As there is always a risk for unauthorized entry into the system, and
consequently into users’ personal storage area on the net or PCs, files that
should not be read by other persons should not be stored on BI’s computers or
4.3. Users are required to heed instructions from operations
personnel. Conditions and situations that might have consequences for the
security of BI’s IT services should be reported to the relevant IT department.
4.4. Users are required to make themselves acquainted with relevant
guidelines, instructions and documentation in order to avoid malfunction of the
system or loss of data and programmes. This kind of information will be available
at “Studentportalen - IT Brukerstøtte” on http://www.bi.no/ .
4.5. Users are required to assist in hindering unauthorized access to BI’s IT services and equipment.
4.6. Users themselves are required to assure that an updated and effective
anti-virus programme is installed in each and every PC connected to BI’s network.
Information and instructions for the installation and downloading of anti-virus
programmes are available at “Studentportalen - IT Brukerstøtte” on http://www.bi.no/ .
4.7. Users are themselves
responsible for taking appropriate measures to avoid loss of data. Such measures
include appropriate routines for making backup copies and for saving media,
prudent use of the net and for use of protective measures, such as anti-virus
programmes. BI is not responsible for loss or damage experienced by the user as a
result of inadequate security precautions.
4.8. Relocating or removing BI’s computer equipment or changing their
configurations is prohibited.
4.9. BI’s IT equipment is to be treated with care. Vandalism and
irresponsible use of the equipment will result in appropriate action from BI’s
management as well as demand for financial compensation. Refer to the Academic
4.10. It is prohibited for users to set up their own information servers
(www, ftp, irc, etc.) or multi-use systems (Linux, Unix, NT, etc.) without the
express, written permission of the IT department. A separate application form is
available here. (Only in Norwegian)
4.11. BI and BI’s IT services reserve the
right to check, change or remove any file or system resource that might damage
or create a significant hinder for authorized use of the school’s computer
5.1. Any attempt to gain access or acquire information about elements of
security or other users’ passwords or to obtain unauthorized access to others’
data is strictly forbidden. This applies regardless of whether the data is
protected or not.
5.2. Unauthorized entry, or any attempt at unauthorized entry into other
persons’ machines, areas or systems via BI’s network is strictly forbidden.
5.3. User monitoring of data traffic on the net is not permitted.
6. Proper use
6.1. It is prohibited to use BI’s equipment for defaming or discriminating communication, or to transmit pornography, racist material or
material that is classified as confidential, nor is it permitted to violate the
personal privacy of others or to encourage or abet activities that are in
conflict with Norwegian law or this document.
6.2. Use of BI’s IT services for commercial purposes without affiliation to
the activities of BI is not permitted without the express, written permission of