Responsibility Student

Published: 29 August 2018

To enable your user account, you must read and accept current computer rules at LTU. Here you can review what you have agreed on.

Welcome as a student at Luleå University of Technology!

 

Main Rule

The use of computers at Luleå University of Technology must be related to the University´s activities

Norms

The human communication or publication that takes place in computer activities does not differ from the communication that takes place between people in other contexts. The ethical norms and rules that are accepted in the rest of society are to apply. Moreover, Luleå University of Technology has decided that the following values are to apply to the University´s activities:  

  • Our working methods are to be characterised by openness and efficiency.  
  • Our mode of working is to be competent by personal initiative and personel responsibility.  
  • Our members of staff are to be comptetent and dedicated.  
  • We are to make use of the experience and outlook of both women and men.  
  • Our work is to be enriched by different cultures.  
  • Our activities are to be characterised by environmental consciousness.  
  • We are always striving to become better.

The name "Luleå University of Technology" constitutes a great asset. It represent our image and we shall strive to associate it with the values listed above User ID.
Your user ID belongs to Luleå University of Technology and you have it on loan from the University. The right to use your user ID ceases when your studies or your appointment ends. Each user is personally responsible for all the computer activities performed using his or her user ID.

Password

The purpose of passwords is to ensure the security of users and computer systems. Passwords are personal and must not be accessible to others. Each user is responsible for keeping his or her password out of reach other people. Computer and Networks
The University has pledged itself to following Sunet´s rules and all users are obliged to follow these rules, as well as the University´s additions to them. The rules are outlined below. Attempted infringement is regarded as the equivalent of an infringement. It is therefore not permitted to:

  • use the resources available for commercial purpose;  
  • obtain access to netword resources or computer resources without having the right to do so;  
  • conceal your identity (except when this is expressly permitted);  
  • disturb or interrupt the intended use of networks or common computers (e.g. through re-configuring computer systems or running software for computer games);  
  • blatantly waste available resources (e.g. cause an extra load on personnel, hardware or software);  
  • damage or destroy computer-based information;  
  • invade the privacy of other people;  
  • insult or humiliate other individuals or organisations;

According to the Data Protection Act it is forbidden, without the proper authorisation, to look at, erase or change other people´s information in computers and on data media. It is also forbidded to intercept data.

E-mail

Spamming (i.e. the mass distribution of unsolicited messages via e-mail) is only permitted when it is to the obvious advantage of the University. Users shall otherwise act in such a way that they do not harm Luleå University of Technology or any person or organisation outside the University, by causing them unnecessary costs or bringing them into disrepute.

Homepages

Documents published via the University´s computer network (i.e. documents containing the University´s domain name) must relate to the activities of the University. Homepages that contain other information may be allowed on condition that they do not damage the University directly or indirectly, or do not conflict with the University´s values or policy. Therefore, the information on Web pages, for example, must conform to reasonable standards concerning veracity and objectivity. Such information must comply with the intentions of the Freedom of the Press Act and the rules applicable to printed publications. This means that child pornography, illegal descriptions of violence, libel, the publication of secret documents, etc. mus not take place. That which is permissible according to the Freedom of the Press Act but conflicts with the policies of the University must not be published or linked to (e.g. pornography or attacks on a person´s character), unless it is of obvious scientific or general interest. It mus always be evident who is responsible for publishing information on the network and it is particularly important that the user should not be under the impression that the University supports information published by individuals. It is forbidden to sell or make available network capacity or information space on the network to other organisations without special permission from Sunet.

Penalties

If the above rules are broken, students or members of staff can be warned or barred from the University´s network and computer resourses by a Head of Department, by the Vicepresident for Administrative Affairs or by the University´s network manager. The maximum duration of such a bar is one week. In the event of a more serious infringement of the rules, the matter must be reported to the President. Such an infringement can, in a case of students (according to the Higher Education Ordiance) "be regarded as the disturbance or prevention of teaching, examinations or other activities within the framwork of the education provided by the university, or the disturbance of activities at the university library or other special facility within the university". Consequently, such an infringement falls within the sphere of the Disciplinary Committee. The penalty may be a warning from the President or being barred from ones course or study programme. The person in question is barred from the network and computer resources until the President has made a decision conserning the matter.

Appeals

Only students who have received a warning from the President can appeal to the Disciplinary Committee.

References 

  1. The Postal Services Act (SFS 1993:1684) §8 and §10 
  2. The Higher Education Ordiance, Chapter 10, §1, the 2nd, 3rd and 4th paragraph, as well as §2-14. 
  3. The Data Protection Act (SFS 1973:289 - reprinted in SFS 1992:446) §21.

CAS – Central Authentication Service
[SFS = Svensk författningssamling - Swedish Code of Statutes]