Directive of the Dean for the administration and usage of the FBMI IT

advertisement
Directive of the Dean for the administration and usage of the
FBMI IT
1. Term clarification
1.1.
1.2.
1.3.
1.4.
1.5.
1.6.
1.7.
1.8.
The term FBMI IT – FBMI information technology – for the purposes of this directive includes all
hardware, software and other technical means of computer and telecommunication technology
used within the FBMI premises or connected to the FBMI computer network. (remark: e.g. even
notebooks connected wirelessly from the surroundings of the FBMI building)
The FBMI computer network includes all computers and servers that are used at the FBMI or
connected to the computer network, software installed on these computers and servers and all
technical equipment ensuring the operation of the computer network.
A Computer is a personal computer (PC), notebook or similar device (e.g. a PDA), used for routine
user work, teaching, laboratory measurement etc. The directive also applies to computers that
aren’t connected to the FBMI computer network, if they are FBMI property.
A Server is a computer dedicated to providing network services to other computers and users of
the FBMI network.
Technical equipment ensuring the operation of the computer network is any device or tool that
enables the connection of computers and servers or the connection of the whole computer
network to the ČVUT computer network and Internet (active elements, cable distribution, sockets
etc.).
A User is any person that uses any of the IT FBMI resources.
An Administrator is a person charged with the administration of some of the FBMI information
technology.
A Person responsible is charged with the publishing of information on the FBMI web pages. A list
will be given in the appendix.
2. Administrators
2.1.
2.2.
2.3.
2.4.
2.5.
2.6.
2.7.
2.8.
The IT administrator is responsible for the FBMI IT as a whole. They design and participate in the
implementation of IT development in accordance with the intentions and in cooperation with the
FBMI management. They control and check the activity of all the other administrators of individual
IT components.
The computer network administrator is responsible for the problem free functioning of the whole
FBMI computer network.
A server administrator is a person charged with the maintenance of one of the servers – software
installation and upgrading including the operating system, server configuration, ensuring and
checking the security and availability of the server.
A network service administrator is a person charged with the administration of one of the network
services provided by one of the FBMI servers – service installation and configuration, ensuring the
problem free operation of the service, providing the service to the users of the computer network.
This includes for example the electronic mail service, the web page service (webmaster, editor),
the information system service, data storing services, DNS, DHCP and others.
A hardware administrator is a person charged with the maintenance of computer and server
hardware and the computer network technical devices.
A software administrator is a person charged with the installation and maintenance of the
computer software equipment and computer configuration, including the connection and
configuration of printers etc.
A user administrator is a person charged with (in cooperation with other appropriate
administrators) managing the user records, assigning user names and passwords and
administrating the access and electronic security systems.
A classroom or laboratory administrator is a person charged with the administration of the
operation of one of the computer classrooms or laboratories equipped with computer technology.
3. Administrator responsibilities and powers
3.1.
3.2.
3.3.
Administrator responsibilities and powers are defined by a hierarchical arrangement: the computer
network administrator stands under the IT administrator, the remaining administrators stand under
the computer network administrator.
The IT administrator is appointed by the FBMI Dean, the other administrators are nominated by
the IT administrator in coordination with the FBMI management and the possible supervisor of the
given person – the administrator is then appointed by the FBMI Dean.
The users of the computer network are obliged to respect the directions and suggestions released
by the appropriate administrators, if they are in accordance with this directive or are objectively
reasonable with regard to the immediate IT state considering the problem free functioning of the
IT.
4. The rules for the use of the FBMI computer network and IT FBMI devices
4.1.
4.2.
4.3.
4.4.
4.5.
4.6.
Every user of the FBMI computer network is required to familiarize oneself with the current version
of this directive and to abide by it.
Every user of the FBMI computer network is required to familiarize oneself with the current version
of “The rules of using the ČVUT network“at http://www.cvut.cz/cz/infosys/rulesnet.html and to
abide by them.
Every user must certify that they know how to use the IT FBMI devices and in writing confirm that
they know and will abide by this directive and rules of using the ČVUT network.
The user must not pursue any activity that would damage the FBMI IT or would cause damage to
or prevent other users from correctly using the FBMI IT.
The violation of any item of this directive is punishable.
The punishments are scaled with regard to the severity, intention and possible repetition of the
occurrence of the violation ranging from a rebuke to the limiting or removal of the rights to use the
FBMI IT.
5. The rules for the Albertov worksite
5.1.
5.2.
The worksite has its administrator, who is placed under the FBMI IT administrator regarding all
things that are related to the use of the FBMI IT in Kladno.
In other case he is independently responsible for the Albertov IT and cooperates with the 1.LF UK
(1st Faculty of Medicine of Charles University in Prague) network administrator.
6. The rules for the use of computer classrooms and laboratories
6.1.
6.2.
6.3.
6.4.
6.5.
6.6.
The code of conduct in the computer classrooms and work with computer technology in
laboratories is defined by the appropriate rules and directions for the individual classrooms and
laboratories.
The wording of these rules is composed by the classroom or laboratory administrator and
authorized by the Dean. The rules must not contradict this directive.
The respective administrator is responsible for the operation of the computer classroom and the
computer technology in a laboratory. They solve any problems that arise in cooperation with the
appropriate IT FBMI administrator.
The teacher must ensure that the classroom rules are followed during class work. They must
immediately inform the classroom administrator about any problems or malfunctions.
The routine operation and rule enforcement in an open computer classroom is ensured by a
supervision attendant, who falls under the classroom administrator. They must immediately inform
the classroom administrator about any problems or malfunctions.
The installation of software or hardware in the classrooms or laboratories is only possible with the
approval of the classroom or laboratory administrator, or in some cases the software or hardware
administrator, who has been charged with this.
7. The rules for the use of personal computers
7.1.
7.2.
7.3.
The user, to whom the computer has been assigned to, is responsible for ensuring that the rules
for working with a personal computer or notebook are observed.
The user must not interfere with the hardware configuration of the computer without the consent of
the hardware administrator. They must solve any potential hardware problems with the
appropriate hardware administrator.
The user may install or configure only legal software. In this case the user is responsible for any
damage that the installation may cause.
8. Printers
8.1.
8.2.
8.3.
Paper refilling is ensured by the printer user, the classroom or laboratory administrator, the
hardware administrator or a person appointed by him.
Toner replacement is ensured by the hardware administrator or a person appointed by him.
Charged printing in a computer classroom must abide by the rules for the given classroom.
9. User accounts, passwords, codes, the access system
9.1.
9.2.
9.3.
9.4.
9.5.
9.6.
The creation and deletion of user accounts in the computer network is within the authority of the
user administrator, in cooperation with the FBMI IT administrator.
The user administrator informs the users about their access information in a suitable manner, so
that it may not be misused.
The users are required to keep the access information in secrecy, so that it may not be misused.
A user or the person who offered the access information to him is fully responsible for the misuse
of their access information.
The user administrator is authorized to impose a policy for the creation of secure passwords and
their periodic renewal.
The user administrator also assigns the codes to the access and electronic security systems to
authorized people. A user must handle these codes the same way they would handle computer
network passwords and must ensure that they are not misused.
The user administrator is responsible for the timely deletion of the access passwords and codes of
people that are no longer users of the FBMI IT and for the modification of potential shared
passwords and codes.
10. IT device maintenance, outages
10.1.
10.2.
10.3.
If any of these activities requires a long term outage of a network service or server, the users are
duly informed (mail, web, notice board). This type of activity should preferably be performed
during times of low service and server traffic.
Operative, unconditionally necessary or urgent maintenance may be performed without warning
the users by the administrators. They must try to minimize the time of the unavailability of the
service and the impact it has on the users.
The security and reliability of operation has precedence before user comfort.
11. Acquiring new HW and SW, solving HW problems, repairs
11.1.
11.2.
11.3.
Acquiring new hardware and software is within the power of the respective hardware or software
administrator.
Users pass on their requests to these administrators, who ensure the selection of an appropriate
purchase variety and the coordination of requests from multiple users.
Their proposal is realized as an actual purchase after being approved by the IT administrator.
11.4.
It is necessary to approach the appropriate hardware administrator with any hardware functionality
problems, it is not allowed for a user to attempt to repair the problem without the administrator’s
approval. The hardware administrator decides about the next course of action – the purchase of
new hardware, providing its repair. He will without delay (at least temporarily) ensure a
replacement for the nonfunctional hardware if possible.
12. Connecting devices to the FBMI computer network
12.1.
12.2.
12.3.
12.4.
Only registered computers and similar devices can be connected to the FBMI computer network.
Registration is performed on the computer physical address level (MAC address). Connecting a
device without a registered MAC address is not allowed.
This procedure applies to both fixed and wireless connections.
Registration is performed by the network service administrator.
13. Data storage services
13.1.
13.2.
13.3.
If there are available data storage services on one of the servers, the stored data is protected from
being accessed by other users and its use is fully within the power of the user.
There may be services for storing shared data on a server that are accessible by a defined user
group that enable data exchanges between these users.
The code of conduct for using shared data storage services and the access levels are defined by
the administrator.
14. Date backup and archiving
14.1.
14.2.
14.3.
14.4.
The user of a personal computer is fully responsible for the date on it.
Operation data and the server configuration are backed up by the appropriate server or network
service administrators.
The frequency of the data backups depends on the decision of the administrator and the nature of
the backed up data, so that potential losses are minimal.
User data stored on servers might be backed up by the server administrator, if the technical and
capacity capabilities allow it. The users are informed in a suitable manner if their date is backed
up or not. Important data should in any case be backed up by the users themselves.
15. The FBMI web pages
15.1.
15.2.
15.3.
15.4.
15.5.
15.6.
The FBMI web pages are created and administered by the network service administrator and they
contain the administration system.
A person responsible is charged with the publishing of information on the FBMI web pages.
Users that don’t have the right to create and administer the FBMI web pages have the possibility
to publish information in cooperation with the person responsible.
It is necessary to turn to the person responsible for the particular published information in case of
inconsistencies or suggestions.
It is necessary to contact the webmaster directly about expansion suggestions or the malfunction
of individual parts of the website.
Information about the possibilities of the FBMI network will be published on the
http://it.fbmi.cvut.cz web pages.
16. E-mail
16.1.
16.2.
16.3.
16.4.
16.5.
16.6.
Every employee or student of the FBMI computer network must have an email address on the
FBMI server. Redirecting mail to a different e-mail address of the given user is solved by the
network service administrator.
This email address is considered to be one of the official contact methods for the given user.
For organizational reason the following so called collective addresses are established:
ao@fbmi.cvut.cz, fakulta@fbmi.cvut.cz, gremium@fbmi.cvut.cz, senat@fbmi.cvut.cz,
senatp@fbmi.cvut.cz, vedeni@fbmi.cvut.cz, prvak@fbmi.cvut.cz, druhak@fbmi.cvut.cz,
tretak@fbmi.cvut.cz. Updates and details are listed at http://it.fbmi.cvut.cz.
The email address is intended mainly for communication related to work or studies and can also
be used for personal correspondence. In no case may it be used commercially e.g. the distribution
of commercial messages of the user etc.
The mail server may be equipped with antispam and antivirus software. But this protection
shouldn’t be considered as one hundred percent safe and responsible behavior from the user is
therefore needed (antivirus software, spam filtration from the user’s side).
Deliberate distribution of spam from the user’s email address, computer or server is forbidden.
17. Viruses, antivirus software
17.1.
17.2.
Antivirus programs are installed on the computers within technical limits.
A user working at this kind of computer must not needlessly turn off or weaken the antivirus
protection.
18. Final provisions
18.1.
18.2.
18.3.
18.4.
18.5.
18.6.
The directive is approved and declared by the FBMI Dean.
Any user may raise suggestions for the supplementation or modification of this directive.
Decisions about matters that aren’t explicitly mentioned in this directive are within the power of the
IT or other appropriate administrator, if they aren’t in conflict with common obligatory regulations
or customs.
This directive including any possible appendices comes into effect on the day it is released and is
valid until withdrawn or a new version of the directive is published.
The names and contact information for the individual administrators must be published in a
suitable manner.
Users will be duly informed about the release of a new version of the Directive or an addition to it
in a suitable manner.
Kladno, 12.10.2005
Processed by Pavel Kupka
Appendices:
Approved
Download