- The user of the information system is a person who, using the user login and password (authorised user) received in accordance with the prescribed procedures, or free public access (unauthorized user), accesses the system functions.
- Any information relating to an identified or identifiable person shall be considered as personal data within the meaning of these Regulations.
- Public and authorized use of the information system is possible. Public use is available to anyone without identifying themselves with the name and password of the user and using only the data intended for that purpose. An authorized use is available with an unique identifier and password issued to the person.
- Any user of the information system must comply with the following rules:
- The user may use the information received only for the purposes specified by the institution of higher education. The information obtained can not be used for any commercial purposes. It is categorically prohibited for the user to use the information obtained in activities not directly related to the performance of tasks imposed by the institution of higher education.
- The user cannot pass user authorization data (user name and password) to third parties. User authorization data should be used only by the specific user (a person) to whom they are assigned. An authorized user should change the password at regular intervals (not less than once a month).
- The user must not perform any action that is directed against the security and safety of the system, by using unexpected connection capabilities. When finishing (stopping) the work with system, the user must close the browser. The user cannot save the used password, using the browser capabilities.
- The user must not carry out illegal copying of data, system or parts thereof (all activities that do not use the allowed, on-screen commands, or are executed automatically, without human involvement in the process of forming requests for information, regardless of the purpose of these actions, are considered illegal).
- The user must not modify, publish, transfer or sell the received information, reproducing in its entirety or partially. Any processing activity carried out with acquired data, including but not limited to data collection, recording, input, storage, arranging, modification, use, transfer, transmission, disclosure, blocking or deletion, may be carried out only in accordance with the procedures specified by the institution of higher education.
- The user may not use the information received for the development of other data processing systems without written co-ordination with the supervisor of the higher education.
- The user may not store the information received in publicly available places.
- It is the responsibility of users to notify the resource administrator or LU IT service without delay (working days by phone 67034999, sending non-working messages by e-mail email@example.com) in the following cases:
8.1. If there is a suspicion that the user's password has been learned by another person;
8.2. By spotting deviations in the operation of the information system.
Last modified: Wednesday, 12 December 2018, 4:34 PM