This site requires JavaScript to be enabled

UL - Rules of use of ICT services of the University of Lapland

30 views

Rules of ICT Service Use at the University of Lapland

Version

Date

Modifications

Author

1.0

13.05.2016

Document created

Esa Mätäsaho

1.0

13.05.2016

Processed in the employee co-operation council

 

1.0

16.05.2016

Approved by the Director of Administration

 

1.01

12.02.2020

Deleted the section on the retention period of files and emails after expiry of access rights.

Esa Mätäsaho

1.02

1.11.2024

Suppliers responsibilities are taken into account

Pekka Halmkrona

 

 

 

 

 

 

 

 

 

1. Rules of ICT Service Use in brief

These binding rules concern all users. Including you.

These rules apply to the use of all of the University's ICT services, hardware, software and networks.

The University authorizes users to access its ICT services by granting user accounts or making services available.

Every user is personally responsible for all use of the services with his/her user account.

The provided ICT services are intended for work- and study-related use.

They may also be used for personal purposes within reason and in keeping with laws and good practices.

Other users' privacy and ownership of information must be respected at all times.

Use of the services for any commercial or propagandistic purposes is forbidden.

Unauthorized use is forbidden.

Use of services is monitored, and breach of these rules will be sanctioned.

2. Rules of ICT Service Use

The Rules of ICT Service Use bind and obligate all members of the university community, users of ICT services and systems, and all units of the University.

These rules apply to all of the University's ICT services and hardware and their use. They also apply to services made available or authorized by the University, for example the services offered by the member organizations of the Lapland University Consortium or the services of the CSC (IT Center for Science), including the services offered by the HAKA Identity Federation, the Funet Communication Network Services, etc.

 

2.1 Usage authorisation

Usage authorisation is granted by issuing a user account or making the service available.

Authorized users are allowed to use the university's ICT services. Compliance with the Rules of ICT Service Use is a prerequisite for authorization.

Usage authorisation is granted for a fixed term

The authorisation expires when

Usage authorization can be restricted if there is justified reason to suspect that information security has been compromised or the services have been abused. The University will delete all files and mailbox contents when 180 days have passed since the expiry of the user account or usage authorization.

The user must remove all personal e-mails and files from the system before the expiry of his/her usage authorization.  University staff members, as well as students who have worked in research teams or participated in other such activities, must transfer all work-related messages and files to the person specified with the supervisor.

All users must uninstall any software based on employee or student licenses from their home computers when their employment or study right ends.

 

2.2 User account

Users are authenticated in ICT Services with the user account. The user account is personal.

Every user is personally responsible for his/her user accounts

User accounts must be protected using strong passwords and complying with other instructions. If there is reason to believe that a password or other account details have been compromised, the password must be changed or the use of the compromised element must be prevented immediately.

Group accounts can be granted upon request for special purposes

The use of group account can compromise the confidentiality of information. For example, in the case of using an administrator-level group account in order to use special software in a computer lab.

 

2.3 Users' rights and responsibilities

The ICT services are intended for work- and study-related use

The University’s ICT services are intended to serve as tools in tasks related to studies, research, teaching or administration in the University of Lapland.

Small-scale private use is allowed

Small-scale private use refers to such actions as private e-mail conversations and online service use. However, private use must never

Laws must be observed

Material that is illegal or against common manners must not be published or distributed.

Everyone is entitled to privacy

The right to privacy, however, does not cover all work-related material that is in an employee's possession.

Information security is everyone's responsibility

Any detected or suspected breaches or vulnerabilities in information security must be immediately reported to ICT Servicedesk: servicedesk@ulapland.fi.

As a precaution, the University is entitled to restrict or revoke the right to use its ICT services.

Setting up unauthorized services is forbidden

Only devices approved by the University may be connected to the ICT network. Only services authorized by the University may be produced using the university's ICT networks.

Bypassing information security mechanisms is forbidden

Usage rights must never be used for any illegal or forbidden activities, such as searching for vulnerabilities in information security, unauthorized decryption of data, copying or modifying network communications, or unauthorized access to ICT systems.

Parts and features of ICT systems that are not clearly made available for public use - such as system administration tools or functions prevented in system settings - must not be used. 

Phishing for information and deceiving users is forbidden

Cheating and unauthorized acquisition of information is forbidden.

3. Other clauses

Validity

These Rules of ICT Service Use become effective 16 May 2016 and replace the earlier version of corresponding rules. After the date specified above, all new ICT services must be produced according to these rules.

Change management

These rules will be reviewed when needed to ensure that they comply with all valid services and laws. Any significant changes to these rules are addressed according to the co-operation procedure. The Chief Information Officer of the University of Lapland makes decisions concerning change needs.

Information about changes is distributed using the regular communication channels, never personally.

Exceptions from the Rules of Use

Permission for exceptions from the Rules of Use can be granted for compelling reasons upon a written application. Exceptional permits are granted by the Chief Information Officer of the University of Lapland. The permits may include additional terms and conditions, restrictions and responsibilities.

Monitoring

Compliance with the Rules of Use is overseen by the ICT Security Manager of the University of Lapland in cooperation with the ICT Services of the Service Centre of the Lapland University Consortium, as well as by supervisors within their job descriptions. Breaches of the rules lead to sanctions according to the applicable Legislation.

The Rules of Use are updated when necessary. The need for updates is monitored by the ICT Security Manager.

Further information

Rules and instructions concerning ICT services are available on the website of the University of Lapland.