Directive of the Dean for the administration and usage of the FBMI IT 1. Term clarification 1.1. 1.2. 1.3. 1.4. 1.5. 1.6. 1.7. 1.8. The term FBMI IT – FBMI information technology – for the purposes of this directive includes all hardware, software and other technical means of computer and telecommunication technology used within the FBMI premises or connected to the FBMI computer network. (remark: e.g. even notebooks connected wirelessly from the surroundings of the FBMI building) The FBMI computer network includes all computers and servers that are used at the FBMI or connected to the computer network, software installed on these computers and servers and all technical equipment ensuring the operation of the computer network. A Computer is a personal computer (PC), notebook or similar device (e.g. a PDA), used for routine user work, teaching, laboratory measurement etc. The directive also applies to computers that aren’t connected to the FBMI computer network, if they are FBMI property. A Server is a computer dedicated to providing network services to other computers and users of the FBMI network. Technical equipment ensuring the operation of the computer network is any device or tool that enables the connection of computers and servers or the connection of the whole computer network to the ČVUT computer network and Internet (active elements, cable distribution, sockets etc.). A User is any person that uses any of the IT FBMI resources. An Administrator is a person charged with the administration of some of the FBMI information technology. A Person responsible is charged with the publishing of information on the FBMI web pages. A list will be given in the appendix. 2. Administrators 2.1. 2.2. 2.3. 2.4. 2.5. 2.6. 2.7. 2.8. The IT administrator is responsible for the FBMI IT as a whole. They design and participate in the implementation of IT development in accordance with the intentions and in cooperation with the FBMI management. They control and check the activity of all the other administrators of individual IT components. The computer network administrator is responsible for the problem free functioning of the whole FBMI computer network. A server administrator is a person charged with the maintenance of one of the servers – software installation and upgrading including the operating system, server configuration, ensuring and checking the security and availability of the server. A network service administrator is a person charged with the administration of one of the network services provided by one of the FBMI servers – service installation and configuration, ensuring the problem free operation of the service, providing the service to the users of the computer network. This includes for example the electronic mail service, the web page service (webmaster, editor), the information system service, data storing services, DNS, DHCP and others. A hardware administrator is a person charged with the maintenance of computer and server hardware and the computer network technical devices. A software administrator is a person charged with the installation and maintenance of the computer software equipment and computer configuration, including the connection and configuration of printers etc. A user administrator is a person charged with (in cooperation with other appropriate administrators) managing the user records, assigning user names and passwords and administrating the access and electronic security systems. A classroom or laboratory administrator is a person charged with the administration of the operation of one of the computer classrooms or laboratories equipped with computer technology. 3. Administrator responsibilities and powers 3.1. 3.2. 3.3. Administrator responsibilities and powers are defined by a hierarchical arrangement: the computer network administrator stands under the IT administrator, the remaining administrators stand under the computer network administrator. The IT administrator is appointed by the FBMI Dean, the other administrators are nominated by the IT administrator in coordination with the FBMI management and the possible supervisor of the given person – the administrator is then appointed by the FBMI Dean. The users of the computer network are obliged to respect the directions and suggestions released by the appropriate administrators, if they are in accordance with this directive or are objectively reasonable with regard to the immediate IT state considering the problem free functioning of the IT. 4. The rules for the use of the FBMI computer network and IT FBMI devices 4.1. 4.2. 4.3. 4.4. 4.5. 4.6. Every user of the FBMI computer network is required to familiarize oneself with the current version of this directive and to abide by it. Every user of the FBMI computer network is required to familiarize oneself with the current version of “The rules of using the ČVUT network“at http://www.cvut.cz/cz/infosys/rulesnet.html and to abide by them. Every user must certify that they know how to use the IT FBMI devices and in writing confirm that they know and will abide by this directive and rules of using the ČVUT network. The user must not pursue any activity that would damage the FBMI IT or would cause damage to or prevent other users from correctly using the FBMI IT. The violation of any item of this directive is punishable. The punishments are scaled with regard to the severity, intention and possible repetition of the occurrence of the violation ranging from a rebuke to the limiting or removal of the rights to use the FBMI IT. 5. The rules for the Albertov worksite 5.1. 5.2. The worksite has its administrator, who is placed under the FBMI IT administrator regarding all things that are related to the use of the FBMI IT in Kladno. In other case he is independently responsible for the Albertov IT and cooperates with the 1.LF UK (1st Faculty of Medicine of Charles University in Prague) network administrator. 6. The rules for the use of computer classrooms and laboratories 6.1. 6.2. 6.3. 6.4. 6.5. 6.6. The code of conduct in the computer classrooms and work with computer technology in laboratories is defined by the appropriate rules and directions for the individual classrooms and laboratories. The wording of these rules is composed by the classroom or laboratory administrator and authorized by the Dean. The rules must not contradict this directive. The respective administrator is responsible for the operation of the computer classroom and the computer technology in a laboratory. They solve any problems that arise in cooperation with the appropriate IT FBMI administrator. The teacher must ensure that the classroom rules are followed during class work. They must immediately inform the classroom administrator about any problems or malfunctions. The routine operation and rule enforcement in an open computer classroom is ensured by a supervision attendant, who falls under the classroom administrator. They must immediately inform the classroom administrator about any problems or malfunctions. The installation of software or hardware in the classrooms or laboratories is only possible with the approval of the classroom or laboratory administrator, or in some cases the software or hardware administrator, who has been charged with this. 7. The rules for the use of personal computers 7.1. 7.2. 7.3. The user, to whom the computer has been assigned to, is responsible for ensuring that the rules for working with a personal computer or notebook are observed. The user must not interfere with the hardware configuration of the computer without the consent of the hardware administrator. They must solve any potential hardware problems with the appropriate hardware administrator. The user may install or configure only legal software. In this case the user is responsible for any damage that the installation may cause. 8. Printers 8.1. 8.2. 8.3. Paper refilling is ensured by the printer user, the classroom or laboratory administrator, the hardware administrator or a person appointed by him. Toner replacement is ensured by the hardware administrator or a person appointed by him. Charged printing in a computer classroom must abide by the rules for the given classroom. 9. User accounts, passwords, codes, the access system 9.1. 9.2. 9.3. 9.4. 9.5. 9.6. The creation and deletion of user accounts in the computer network is within the authority of the user administrator, in cooperation with the FBMI IT administrator. The user administrator informs the users about their access information in a suitable manner, so that it may not be misused. The users are required to keep the access information in secrecy, so that it may not be misused. A user or the person who offered the access information to him is fully responsible for the misuse of their access information. The user administrator is authorized to impose a policy for the creation of secure passwords and their periodic renewal. The user administrator also assigns the codes to the access and electronic security systems to authorized people. A user must handle these codes the same way they would handle computer network passwords and must ensure that they are not misused. The user administrator is responsible for the timely deletion of the access passwords and codes of people that are no longer users of the FBMI IT and for the modification of potential shared passwords and codes. 10. IT device maintenance, outages 10.1. 10.2. 10.3. If any of these activities requires a long term outage of a network service or server, the users are duly informed (mail, web, notice board). This type of activity should preferably be performed during times of low service and server traffic. Operative, unconditionally necessary or urgent maintenance may be performed without warning the users by the administrators. They must try to minimize the time of the unavailability of the service and the impact it has on the users. The security and reliability of operation has precedence before user comfort. 11. Acquiring new HW and SW, solving HW problems, repairs 11.1. 11.2. 11.3. Acquiring new hardware and software is within the power of the respective hardware or software administrator. Users pass on their requests to these administrators, who ensure the selection of an appropriate purchase variety and the coordination of requests from multiple users. Their proposal is realized as an actual purchase after being approved by the IT administrator. 11.4. It is necessary to approach the appropriate hardware administrator with any hardware functionality problems, it is not allowed for a user to attempt to repair the problem without the administrator’s approval. The hardware administrator decides about the next course of action – the purchase of new hardware, providing its repair. He will without delay (at least temporarily) ensure a replacement for the nonfunctional hardware if possible. 12. Connecting devices to the FBMI computer network 12.1. 12.2. 12.3. 12.4. Only registered computers and similar devices can be connected to the FBMI computer network. Registration is performed on the computer physical address level (MAC address). Connecting a device without a registered MAC address is not allowed. This procedure applies to both fixed and wireless connections. Registration is performed by the network service administrator. 13. Data storage services 13.1. 13.2. 13.3. If there are available data storage services on one of the servers, the stored data is protected from being accessed by other users and its use is fully within the power of the user. There may be services for storing shared data on a server that are accessible by a defined user group that enable data exchanges between these users. The code of conduct for using shared data storage services and the access levels are defined by the administrator. 14. Date backup and archiving 14.1. 14.2. 14.3. 14.4. The user of a personal computer is fully responsible for the date on it. Operation data and the server configuration are backed up by the appropriate server or network service administrators. The frequency of the data backups depends on the decision of the administrator and the nature of the backed up data, so that potential losses are minimal. User data stored on servers might be backed up by the server administrator, if the technical and capacity capabilities allow it. The users are informed in a suitable manner if their date is backed up or not. Important data should in any case be backed up by the users themselves. 15. The FBMI web pages 15.1. 15.2. 15.3. 15.4. 15.5. 15.6. The FBMI web pages are created and administered by the network service administrator and they contain the administration system. A person responsible is charged with the publishing of information on the FBMI web pages. Users that don’t have the right to create and administer the FBMI web pages have the possibility to publish information in cooperation with the person responsible. It is necessary to turn to the person responsible for the particular published information in case of inconsistencies or suggestions. It is necessary to contact the webmaster directly about expansion suggestions or the malfunction of individual parts of the website. Information about the possibilities of the FBMI network will be published on the http://it.fbmi.cvut.cz web pages. 16. E-mail 16.1. 16.2. 16.3. 16.4. 16.5. 16.6. Every employee or student of the FBMI computer network must have an email address on the FBMI server. Redirecting mail to a different e-mail address of the given user is solved by the network service administrator. This email address is considered to be one of the official contact methods for the given user. For organizational reason the following so called collective addresses are established: ao@fbmi.cvut.cz, fakulta@fbmi.cvut.cz, gremium@fbmi.cvut.cz, senat@fbmi.cvut.cz, senatp@fbmi.cvut.cz, vedeni@fbmi.cvut.cz, prvak@fbmi.cvut.cz, druhak@fbmi.cvut.cz, tretak@fbmi.cvut.cz. Updates and details are listed at http://it.fbmi.cvut.cz. The email address is intended mainly for communication related to work or studies and can also be used for personal correspondence. In no case may it be used commercially e.g. the distribution of commercial messages of the user etc. The mail server may be equipped with antispam and antivirus software. But this protection shouldn’t be considered as one hundred percent safe and responsible behavior from the user is therefore needed (antivirus software, spam filtration from the user’s side). Deliberate distribution of spam from the user’s email address, computer or server is forbidden. 17. Viruses, antivirus software 17.1. 17.2. Antivirus programs are installed on the computers within technical limits. A user working at this kind of computer must not needlessly turn off or weaken the antivirus protection. 18. Final provisions 18.1. 18.2. 18.3. 18.4. 18.5. 18.6. The directive is approved and declared by the FBMI Dean. Any user may raise suggestions for the supplementation or modification of this directive. Decisions about matters that aren’t explicitly mentioned in this directive are within the power of the IT or other appropriate administrator, if they aren’t in conflict with common obligatory regulations or customs. This directive including any possible appendices comes into effect on the day it is released and is valid until withdrawn or a new version of the directive is published. The names and contact information for the individual administrators must be published in a suitable manner. Users will be duly informed about the release of a new version of the Directive or an addition to it in a suitable manner. Kladno, 12.10.2005 Processed by Pavel Kupka Appendices: Approved