Translated using DeepL

Machine-translated page for increased accessibility for English questioners.

This policy applies to users of computers and other devices connected to the Faculty of Informatics (FI) network. The term network includes both the technical and software resources and the data acquired and transmitted through it. A user is defined as anyone who uses any of these resources.
  1. The right to have an account on FI computers and the right to enter computer rooms and laboratories belongs only to FI students and staff. Written requests for exceptions for other persons are considered by the Head of the Computer Centre (CVT). For those requests for accounts that are granted, they will be set up for 1 year. The Dean will decide on any appeals. Upon termination and interruption of studies, termination of employment or the cessation of the reasons for which the account was established, the right to hold the account will cease.
  2. The user may use the network in accordance with the academic, educational and research mission of the network. The network is also intended for administrative and operational purposes of the faculty. It is considered a violation of the rules to use the network for commercial activities unrelated to the activities of the faculty, political, religious or racial agitation.
  3. A user shall work on the network only under those usernames assigned to him/her or with which he/she is authorized to work. The user shall choose a non-trivial password for his/her user account and shall not disclose it to any other person. If the user accesses an absent user's session, he/she shall terminate the session without delay. The user is prohibited from taking any action to establish a password other than his/her own. It is also forbidden to impersonate another or anonymous user (except for services that allow anonymity -- e.g., Web and ftp) or to falsify one's identity in any way. It is considered a particularly serious violation of the rules to provide one's authentication data (username and password) to a user who is not eligible to set up an account on the FI network or whose access or a particular service has been blocked.
  4. Administrative agendas, files in user directories and mail processing are the personal data of their owners and are entitled to the same privacy protection as other types of personally owned documents. Violations of this rule are considered particularly egregious. Neither CVT nor the FI is responsible for possible misuse of data. Employees are responsible for personnel data to the extent of general legal standards.
  5. The user has the right to use disk space, processor power, line capacity, etc. only with regard to the overall load on systems and networks, both local and remote. The user must obey the administrator's instructions to reduce the load generated by the user without delay.
  6. The network administrator, or computer administrator, has the right to perform all operations necessary to perform his/her function, including checking the contents of directories, monitoring user activity, etc. However, the information obtained in this way is strictly confidential.
  7. The user has the right to use only legal software and legal data files, i.e. those obtained in accordance with the law, including copyright. Software and data files (including video and audio files) may only be made available in compliance with the applicable licence conditions.
  8. Eavesdropping on traffic on transmission media, making copies of messages passing through network nodes or generating spoofed messages are considered particularly serious violations of the rules.
  9. Computer users are required to comply without delay with other CVT staff instructions and administrative measures regulating access to the resources used.
  10. The user of a computer in the classroom is not entitled to have it electronically locked. CVT staff have the right to unlock locked computers and forcibly terminate sessions on them.
  11. Computer gaming is prohibited in computer labs, classrooms and on FI computers. The ban applies at any time and extends to online communications (chat) that are not directly related to the work of the FI.
  12. A mailbox is set up for users primarily to ensure easy communication with the faculty. The user must not reduce the reliability and trustworthiness of mail delivery to his/her mailbox (e.g., by redirecting mail to less reliable machines). If problems with mail delivery caused by the local recipient of a letter are detected, the administrator must immediately take corrective action (e.g., cancel the redirection) and notify the recipient of the situation. If problems caused by the recipient recur, the administrator is authorized to block the recipient's accounts.
  13. It is forbidden to change the identity of applications both running and stored on disk. This prohibition applies in particular to applications whose execution could lead to violations of the operating rules.
  14. CVT personnel are not responsible for any loss of data resulting from any means. However, this does not relieve CVT of the obligation to perform regular backups of the contents of the disks of the main servers.
  15. Bulk mailing to multiple mailing lists or newsgroups and the sending of chain letters is prohibited. It is prohibited to harass users and burden line capacity by sending bulk mail containing unsolicited content (spam).
  16. The use of vulgar and highly emotive language is prohibited in open communication. The user bears full responsibility for any defective content of his own publicly accessible Web pages or other publicly accessible information sources.
  17. It is forbidden to commission and operate information or other service servers connected to the FI network without the prior approval of the CVT manager.
  18. Any actions aimed at reducing security or leading to possible violations of operating rules, both knowingly and unknowingly, are unacceptable. The user should, where possible, increase the security of the system by using secure communication (e.g. ssh).
  19. Computer piracy and unauthorised access to any node via the network is considered a particularly egregious breach of the rules. Transmission of computer viruses and security-violating programs for any purpose without prior approval from the network administrator is strictly prohibited.
  20. The user must not make changes to the computer configuration that would lead to undesirable behaviour of the device. In the event of non-compliance with this rule, the network administrator has the right to disconnect the unwanted computer or part of the network. A particularly egregious violation of the rules is considered to be such deliberate interference with any operating system or computer that leads to its crash, malfunction or undesired behavior. Students may manipulate technology only at a general user level. Interference with technology is to be performed only by a staff member. Interference with computer networks by a CVT staff member only. It is considered a particularly egregious violation of policy to connect a brought computer or device to the FI computer network without prior approval and assistance from a CVT staff member where connecting one's own devices is not explicitly permitted. Connecting one's own devices without assistance is permitted to the wireless network and in rooms designated for connecting one's own laptops.
  21. Operating or testing wireless connection points without prior approval of the CVT manager is prohibited.
  22. Food and beverages are prohibited in the computer lab, computer labs, and computer labs.
  23. The user is required to follow and unconditionally comply with all CVT operating instructions communicated both in writing and electronically. CVT is authorized to additionally respond to the current situation with operating instructions that do not conflict with these rules.
  24. Upon termination of the account, the user is requested by electronic letter to clean up his/her data within three weeks. After this period, his data will be deleted without possibility of recovery.
  25. Users found to be in violation of the rules or guidelines will have the right to have their accounts blocked by the administrator for a period of 1 to 4 weeks. If repeated violations of the rules are proven, the blocking period will be extended up to 1 semester with the approval of the Dean. Account blocking does not affect tuition remission. In addition, for particularly egregious or repeated violations of the rules, disciplinary action will be instituted with the possibility of suspension from the program and the requirement of financial restitution for damages.
In Brno, 1 September 2005 Prof. RNDr. Jiří Zlatuška, CSc. dean