translated by Google

These rules apply to computer users and other devices connected to the Faculty of Computer Science (FI) network. The term network includes both technical and program resources, as well as the data acquired and transmitted by it. A user means anyone using any of these means.
  1. The right to have an account on FI computers and the right to enter the computer classrooms and laboratories is only for students and FI staff. Written requests for exceptions for others are assessed by the Head of the Computing Center (CVT). For positively settled billing requests, these will be set up for one year. The Dean decides on any appeal. By terminating or interrupting a study, ending the employment relationship, or bypassing the reasons for which the account was set up, the right to own the account expires.
  2. The user may use the network in accordance with the academic, educational and research mission of the network. The network is also intended for administrative and operational purposes of the faculty. The use of a network for commercial activities not related to the activities of the faculty, political, religious or racial agitation is considered to be a violation of the rules.
  3. The user works on the network only under the user names assigned to him or with whom he has permission to work. The password for his / her user account is non-trivial and must not pass it on to another person. If a user reaches the session of an unauthorized user, they must end it without delay. The user is prohibited from performing any action aimed at finding a password other than his / her own. It is also forbidden to refer to another or anonymous user (except services that anonymity admits - eg Web and ftp) or in any way to falsify their own identity. A particularly gross violation of the rules is deemed to be the provision of your authentication credentials (username and password) to a user who is not eligible to set up an FI account or who has been blocked access or specific service.
  4. Administrative agendas, files in user directories, and mail process are the personal data of their owners and are entitled to the same privacy protection as other types of personally-owned documents. Violation of this rule is considered as gross. CVT or FI are not responsible for possible data misuse. Personnel are responsible for personnel within the scope of general legal standards.
  5. The user has the right to use disk space, CPU performance, line transfer capacity, etc. only with respect to the total load of local and remote systems and networks. The user must immediately obey the administrator's instructions to reduce the load he has generated.
  6. Network Administrator, respectively. administrator of the computer, has the right to perform all the operations necessary to perform its function, including. directory controls, user activity monitoring, etc. However, the information obtained is of a purely confidential nature.
  7. The user has the right to use only legal software and legal data sets, ie those obtained in accordance with the law, copyright. Providing software and data files (including video or audio files) can only be provided under the applicable license terms.
  8. A particularly gross violation of rules is considered to be intercepting traffic on transmission media, making copies of messages passing through network nodes, or generating spoiled messages.
  9. Computer users are required to abide by other CVT instructions and administrative arrangements governing access to the resources used without delay.
  10. The computer user in the classroom is not eligible for electronic locking. CVT employees have the right to unlock locked computers and terminate their session violently.
  11. There is a ban on computer games in computer classrooms, laboratories and FI computers. The ban applies at any time, and it also applies to on-line communications (chat type) that are not directly related to FI.
  12. The mailbox is designed primarily for users to ensure easy communication with the faculty. The user may not reduce the reliability and credibility of delivering mail to his mailbox (for example, redirecting mail to less reliable machines). In case of problems with delivery of mail caused by the local recipient of the letter, the administrator is obliged to immediately correct (eg cancel redirection) and notify the recipient of the situation. When repeating the problem with the recipient, the administrator is allowed to block the recipient accounts.
  13. It is forbidden to change the identity of applications that are both running or just stored on a disk. This prohibition applies in particular to applications whose startup could lead to violation of operating rules.
  14. CVT staff are not responsible for the loss of data generated in any way. However, this does not remove the obligation to perform periodic backups of the main server disk contents.
  15. Bulk mail to multiple emails conferences or newsgroups and the distribution of chain letters is forbidden. It is forbidden to bother users and to burden the transmission capacity of lines by sending bulk electricity. letters containing spam (spam).
  16. The use of vulgar and strongly emotive expressions is prohibited in open communication. The user bears full responsibility for any defective content of their own publicly accessible Web sites or other proprietary publicly available information resources.
  17. It is forbidden to put into service and operate information or other service servers connected to the FI network without the prior approval of the CVT manager.
  18. Not all steps are taken to reduce security or lead to possible violation of operating rules, both conscious and unconscious. The user should, where possible, increase system security and use secure communications (eg ssh).
  19. Computer piracy and unauthorized access to any node over a network is considered as a particularly gross violation of the rules. Without the prior consent of the network administrator, it is strictly forbidden to transfer computer viruses and security interfering with programs for any purpose.
  20. The user may not change the configuration of the computer, which would lead to undesired behavior of the device. In case of non-compliance with this rule, the network administrator has the right to disconnect the unwanted computer or part of the network. A particularly gross violation of the rules is such conscious interference with any operating system or computer that leads to its collapse, malfunction or undesirable behavior. A student may only manipulate the technique on a general user level. Engineering interventions are performed by an employee only. Interventions in computer networks only by a CVT worker. For a particularly gross violation of the rules, the connection of the computer or device being brought into the FI computer network without the prior approval and assistance of the CVT worker where the connection of own devices is not explicitly permitted. Connecting non-assisted devices is allowed in the wireless network and in rooms designed to connect your own laptops.
  21. It is forbidden to operate or test wireless connection points without the prior permission of the CVT manager.
  22. Computer and computer labs and laboratories are forbidden to bring food and drinks.
  23. The user is required to observe and unconditionally comply with all CVT operating instructions communicated both in writing and electronically. CVT is allowed to respond to the current situation by operating instructions that do not conflict with these rules.
  24. Upon expiration of the account, the user is prompted by an electronic letter to clear his / her data within three weeks. After this deadline, its unreadable data will be deleted.
  25. Users who have detected violations of policies or guidelines have the right to block accounts for 1 to 4 weeks. In case of proven repeated violation of the rules, the blocking period after the Dean's approval will be extended up to 1 semester. Account blocking has no effect on the lessons learned. In addition, in cases of particularly gross or repeated breach of the rules, disciplinary proceedings with the option of exclusion from the study and the requirement of financial compensation for the damage caused will be introduced.
In Brno, September 1, 2005 prof. RNDr. Jiří Zlatuška, CSc. Dean