Rules for computer, network and system facilities at Royal Institute of Art
General
Computer resources, computer networks, peripherals and user accounts are owned and operated by KKH for use in activities authorized by KKH. All other activities, such as own development, are only allowed when:
- the regular use is not disturbed
- the activities do not violate these rules
- does not conflict with the school's rules, KKH's regulations, SUNET's rules or applicable laws.
For the purposes of these regulations, "authorized" means a person who has been assigned a user account or another person who has been authorized to use KKH's computer, network or system resources.
The following applies to user account holders:
- The credential and associated resources may only be used by the authorized user.
- The password associated with the user account must be kept secret. For detailed information on password rules see separate document.
- The authorization is time-limited and will expire when the studies, employment, project or equivalent ends. KKH has the right to terminate user accounts that have been inactive for more than six months unless otherwise agreed.
The following applies to the use of KKH's computer, network and system resources:
- Sabotage or disruptive activities against the systems or other users, as well as intrusion or attempted intrusion into systems, locally as well as on systems outside KKH, is prohibited.
- Exploiting misconfigurations, bugs or other methods for the purpose of obtaining extended system rights or authorizations other than those granted by the system operators is not allowed.
- Commercial use of the KKH's computer resources is prohibited unless otherwise agreed. In these cases, the KKH cannot be held responsible for the functioning or availability of the systems.
- Anyone who discovers errors, deficiencies, breaches of rules, irregularities or other problems must report this within reasonable time to the system manager, preferably via IT support.
- Only material where it is clearly stated that sharing is permitted may be copied or distributed. All copyrighted material may only be copied or distributed with the permission of the the copyright holder.
- KKH reserves the right to restrict the possibility of publishing and distributing material via KKH's property.
Sanctions and actions in case of rule violations
- KKH will report violations of these regulations and applicable legislation to the disciplinary committee and/or the police, which may lead to the account holder's suspension from studies and/or legal sanctions.
- System administrators with access to personal data are subject to a confidentiality obligation, but not towards law enforcement authorities.
- The system administrators have the right to, in case of well-founded suspicion of a breach of rules, to restrict access to KKH's computer, network and system resources.
- To manage day-to-day operations and to check that these regulations are complied with, system administrators have the right, within their area of responsibility and without prior notice, to monitor KKH's systems and to check the content of traffic, data, etc. stored or in transit.