IT regulations

Being considerate is a powerful tool when it comes to information technology. Here we have gathered the most important rules that apply to the University's IT operations together with some advice on how you can protect yourself and your information online in a good way.

Your own responsibility

  • Computer accounts are personal. The account owner is responsible for how the account is used.
  • The passwords you use for access to University resources must not be used for other services, and must not be revealed to other persons.
  • Every IT user is responsible for his/her information security in accordance with what is stated in the regulations.
  • Every IT user shall, at the end of their studies/employment take care of the files and documents that shall be preserved.
  • Changes in circumstances relating to work tasks or studies can lead to changes in access privilege levels in IT systems.
Four students stand in a row in front of a bookshelf. All students look down at their mobile phones. Photo.

Software and Hardware Usage

  • University equipment shall be used with common sense, and be handled with care.
  • Copyright should be observed at all times. It is not permitted to unlawfully download / distribute protected materials such as software, films, music or other items which are protected by copyright.
  • The user of the computer account should not indulge in any disruptive activity.
  • All software should be installed on the University computers by the IT department or with the approval of the IT department.
  • It is not permitted to connect private computers or other equipment other than to the network specifically provided for the task.
  • Installations, or surfing to websites with unlawful, unethical or unsuitable contents is only permitted if work tasks, research or studies specifically require visits to such web pages.
  • Teaching and studies should always be prioritized in computer and project rooms.

Surf wisely

  • Never tell anyone your password.
    • Serious companies will never ask for your password through email.
  • Do not use the same password for different services.
  • Log out when you leave a computer.
  • Maintain a sceptical attitude when you are on the internet.
  • Never open or reply to email unless you are 100 percent sure of who sent it.
  • Be careful when using wireless networks.
  • Keep your laptop, tablet and phone updated.
  • Don’t let unauthorised people in.
  • Save your documents in your personal file space.
  • Reflect once again before sending personal data.
  • Use your good judgement when you are on the internet via the University network.

Measures and surveillance

  • The IT department has the right, without giving advance notice and for the purpose of continuous maintenance management, to intercept net traffic through technical measures in the network and system. In cases where a user is suspected of some unlawful infringement of the regulations, the above rights are extended to include the user’s stored data.
  • The IT department has the right in cases of disruption to net operations, security risks or other suspected infringements or improprieties to temporarily suspend access to individual or collective IT resources.
  • Repeated or serious breaches of these regulations can lead to suspension from the use of computer resources and/or being reported to the student/staff disciplinary committee. Suspected legal infringements can be reported to the police.
  • Information on incidents regarding information security, personal data, etc. can be forwarded to other authorities, following regulations.