Guidelines for the use of IT equipment at Inland Norway University of Applied Sciences.
§1 The scope of the guidelines
1.1 These guidelines apply to all IT equipment available at Inland Norway University of Applied Sciences (INN University), including private equipment or other equipment used in connection with INN University’s IT systems/networks and for handling INN University's Information.
1.2 The guidelines shall be available electronically. The latest version can be found at any time on INN University's website. They can also be provided by contacting IT user support.
1.3 Every user is obligated to keep herself/himself updated and informed about the current guidelines, any supplementary provisions and local supplementary provisions.
1.4 Questions regarding interpretation of the guidelines can be addressed to IT user support.
1.5 Before each user is granted access to, and usage of equipment or other systems related to INN University, confirmation must be made that she or he has been made aware of the applicable guidelines.
§2 Purpose and legitimate use of IT Equipment
2.1 Computer equipment shall only be used for its intended purpose. The equipment should not be used commercially or for activities that are not associated with INN University’s operation. It should also not be used for political or religious agitation.
2.2 INN University's equipment shall not be used for anything that contravenes Norwegian/international law and the rules and regulations applicable at INN University.
2.3 Users are obligated to identify themselves with username and password at login. Users should not attempt to hide their identity or pretend to be someone else.
2.4 Users take it upon themselves to familiarize themselves with the operating instructions, documentation etc. in a reasonable way as to reduce the risk that ignorance may create a risk of operational interruption or loss of information (data), programs or equipment.
2.5 Users should not distribute or disclose their own or anyone else's login information. It is not allowed to use other people's software/equipment without the consent of the owner of the software or equipment.
2.6 If a user becomes aware that their own or others' information has been compromised, it is their duty to implement measures that prevent more information or data from being lost. An examples of this could be that someone has gained access to your account, in which case you must change your password and contact IT user support.
§3 Privacy and security
3.1 A user account is strictly personal; one should not let other people use their account.
3.2 Each user is responsible for their own account, files and equipment and must take precautions to prevent others from using it without permission. Such precautions include, but should not be limited to, careful choice of password and limitation of information sharing.
3.3 The user is obligated to prevent unauthorized access to, among other things, networks, data, facilities or equipment. This also includes not being allowed to give students or outsiders access to employee information or equipment.
3.4 The user shall not use or attempt to gain unauthorized access to other people's information, data or other personal information without specific permission. This also includes cases in which other users – with or without intention – have made these available.
3.5 Valuable data should be stored at backup locations. IT user support can at any time inform about the locations that are included in the backup.
3.6 Users should not use equipment in a way that may bother or offend others. This includes insulting or obscene emails or debate posts.
3.7 If you receive emails or are on websites or similar locations that may seem unsafe to share, download or retrieve information from, contact IT user support before proceeding. It is your responsibility to pay attention to where you collect or share information and whether it is safe to retrieve/share the information.
3.8 INN University allows the use of own/private equipment with INN University’s equipment/network. You are responsible for ensuring that your own/private equipment is in good working order and that its use does not violate the guidelines set out in this document.
3.9 You are responsible for keeping harmful products such as viruses or malware outside INN University’s systems with the equipment you use or take with you and use with INN University’s equipment/network.
4.1 INN university's IT resources are limited and users must show consideration for each other.
4.2 Access to IT resources at INN University is not a matter of course; in case of misuse or unreasonable use this may impose restrictions on access for all users. You have the right to say whatever you wish to say to whomever you want, but INN University is under no obligation to provide you with equipment to do so. When using INN University’s resources or equipment such as Email or anything else you use for publishing and communication, INN University will automatically have some responsibility for the content or tone of the message. “In short, be polite” is a good rule of thumb for such messages.
4.3 Users must not:
- 4.3.1 Destroy machine, software, or other IT equipment. This also includes equipment that is located in auditoriums, classrooms and common areas.
- 4.3.2 One should not destroy or alter the data of other users.
- 4.3.3 One should not restrict or prevent authorized use of computer equipment, with or without the use of knowledge of special passwords or loopholes in the system.
4.4 Users must not:
- 4.4.1 Use accounts belonging to other users
- 4.4.2 Pretend to be someone else.
- 4.4.3 Seek to discover or break others' passwords or encryptions.
- 4.4.4 Try to gain access to extra resources or rights.
- 4.4.5 Access a system for which necessary authorization is not granted
- 4.4.6 Undermine access restrictions
4.5 It is not allowed to attempt to change system setup or remove basic programs without special permission from system administrators.
§5 Respect for copyright conditions
5.1 The user is bound by the duty to respect copyright, i.e. the rights of others to copyrighted material. It is not permitted to use INN University’s equipment to disseminate or store copyrighted material in violation of the interests of the copyright owner.
5.2 Users who have access to licensed software are not allowed to share the software or license key or anything else that may be affected by, or violate, the regulations.
The IT department's employees have a duty of confidentiality regarding information about users or users’ activities that they acquire through the performance of their work. The exception is circumstances that may represent a violation of the regulations and which must be reported to superiors.
Supplementary provisions for the use of computer systems for students
§7 The scope of the supplementary provisions
7.1 These Supplementary provisions apply to all students who use or access computers, equipment and services through Inland Norway University of Applied Sciences (INN University).
7.2 The guidelines shall be available electronically. The latest version can be found at any time on INN University's website. They can also be provided by contacting IT user support.
7.3 Questions regarding interpretation of the guidelines can be directed to IT user support.
§8 Proper use of computer equipment
8.1 The possibility to use the equipment is a privilege, which one may lose the right to if the guidelines are violated.
8.2 One should not unnecessarily prevent others from using equipment for extended periods.
8.3 It is not allowed to make changes to, or remove equipment without special permission from the IT department.
8.4 Personal equipment that is used in connection with INN University is your own responsibility, and you must make sure that you do not introduce harmful malware/viruses or create issues for others in INN University's IT systems or other equipment.
8.5 It is not allowed to set up servers/services without special permission from the IT department.
9.1 One should not use his or her own equipment or INN University’s equipment in such a way that it may offend or bother others.
9.2 All rooms with IT equipment at the disposal of students shall be used for the purpose for which it is intended. Equipment in the room must be treated in a respectful manner.
§10 Data retention/storage
Data and personal information shall be stored in accordance with applicable legislation at all times, all personal data shall be processed in accordance with the same legislation.