Date: Fri, 29 Mar 2024 13:24:31 +0200 (GMT+02:00) Message-ID: <1787043055.3389.1711711471687@8ce979c46d4d> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_3388_369434414.1711711471687" ------=_Part_3388_369434414.1711711471687 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
General Policy on the Use =
of Information Systems - Updated 21.11.2022
This document describes the General policy on the use of information sys= tems in Metropolia. These rules apply to everyone who uses Metropolia's inf= ormation systems. The rules also apply to workstations in general use at th= e University and to all devices connected to the Universities network.
A summary of the general policy can be found below, which contains the m= ost important points.
University of Applied Sciences must ensure the confidentiality, integrit= y and usability of the data of all its different user groups, and provide a= reliable and secure environment for data processing. These and other polic= ies are written to help the different user groups to know the rights, respo= nsibilities and obligations that are tied to the user rights. Even unintent= ional negligence of responsibilities linked to the user rights can endanger= the integrity, confidentiality and usability of data belonging to other us= ers.
All computer users within the University shall follow, in addition to th= ese policies, the other rules and advice for information systems given by t= he University, good manners and Finnish legislation. Usage against this pol= icy or other policies or rules concerning information system usage will be = dealt with according to the policy of consequences for IT offences.
The major principles governing all use and interpretation of usage polic= ies are:
The University information systems are meant as tools for tasks related = to studying, research, teaching and administration within Metropolia Univer= sity of Applied Sciences. Other use requires separate agreements.
All users shall participate in taking care of general information securi= ty matters. Even if a single user has nothing special to secure, other user= s may have. All users share a personal responsibility for the overall secur= ity of the information system. Observed or suspected insufficient informati= on security and misuse shall be reported to the helpdesk.
Users are responsible for the protection of their own files, and ultimat= ely of making back-ups. The University makes back-ups of centrally stored f= iles, but will not be liable for damages caused by possible eradication of = files.
It is forbidden to connect computers or other equipment to University's = physical network without permission from network administrator. When connec= ting equipment given guidelines must be followed. Personal computers should= be connected to wireless LAN.
User rights may not be transferred. If there is a reason to suspect that= a password or other identifier has come into another person's possession, = the password shall be changed or the use of the identifier shall be prevent= ed immediately. The Password shall be changed at regular intervals and it m= ust be difficult to guess or break.
Tietoj=C3=A4rjest= elmien yleiset k=C3=A4ytt=C3=B6s=C3=A4=C3=A4nn=C3=B6t