Versjonssammenligning

Nøkkel

  • Denne linjen ble lagt til.
  • Denne linjen ble fjernet.
  • Formateringen ble endret.

§ 1 Scope of the guidelines

1.1 These guidelines apply to all IT equipment and all IT systems that are available at Conexus, this also includes private equipment and private systems used in the context of Conexus.

...

1.5 Before each individual user gets access to and the opportunity to dispose of equipment and/or systems at Conexus, there must be confirmation that the person in question has familiarized himself with the applicable guidelines.

§ 2 Purpose and lawful use of IT equipment and systems

2.1 IT equipment and IT systems must only be used for the purpose for which they are intended. The equipment/systems must not be used commercially or for activities that are not connected to the business around Conexus. Nor should it be used for political or religious agitation.

...

2.6 If a user becomes aware that their own or other people's information has gone astray, they must take measures to ensure that more information or data is not lost. Examples of this could be that someone has gained access to your or someone else's account, in which case you should contact IT-Brukerstøtte.

§ 3 Privacy and security

3.1 A user account is strictly personal, you must not let other people use your account.

...

3.9 You yourself are responsible for keeping malware such as viruses and the like out of the compaly systems with the equipment you dispose of or take with you and use with Conexus equipment/systems.

§ 4 Misuse

4.1 The company IT resources are limited and users must show consideration for each other.

...

4.5 It is not permitted to change the system setup or remove the basic program without special permission from the system administrator.

§ 5 Respect for copyright matters

5.1 The user undertakes to respect copyright, i.e. the rights of others to copyright-protected material. It is not permitted to use Conexus equipment/systems to convey or store copyright-protected material in conflict with the copyright holder's interests.

5.2 Users who have gained access to licensed software are not allowed to share the software or the license key or anything else that may be affected by or contravene the provisions.

§ 6 Confidentiality

The Service Operations employees have a duty of confidentiality with regard to information about the user or the user's business that they acquire through the performance of their work. The exception is matters which may represent a breach of the regulations and which must be reported to superiors.

...