Rules for using the systems

The importance of the user rules

The aim of Porvoo Commercial College is to provide the students with the opportunity to use the computer systems and the data communications. In order to guarantee functioning working conditions, the agreed rules are to be followed.

Data security

The term data security means the physical, technical and functional protection of the equipment, the software, the data communication and the information.

Everyone working in the school should attend to the data security.

The system should be used carefully and in a good manner.

Usernames and passwords

A person studying in the school is given a username to the computers intended for the students. When receiving the username, the student signs a user obligation document and at the same time confirms that the data security instructions have been read.

When the student graduates from the school, the username will be removed. The username will also be removed if he/she drops out of or otherwise quits the school.

The password is complying to the stricter security classification, which means it includes upper- and lower-case characters and numbers, and is at least seven characters long. The password is to be changed every fourth month or more often if the system so requires.

Logging on to the computer

The student uses a personal username to log on to the computer. It is every user’s own responsibility to keep the password safe so that it will not get into other people’s hands. The password cannot be given for use to other persons.

If the password is forgotten, the student himself /herself has to ask the IT support for a new password and also has to provide ID.

Working on the computers

When a student is working in class or in other premises meant for IT work, he/she has to observe the principles of good work etiquette.

PLEASE REMEMBER TO LOG OFF THE SYSTEM WHEN YOU HAVE FINISHED YOUR WORK.

Unauthorized use and copying of the software

The programs on the workstation can be used freely in connection to the studies, unless otherwise stated. Copying of the programs to one’s own computer is prohibited. The installation of one’s own programs on to the computers of the school is prohibited.

The rights of the administrator

The administrator of the computer systems of the school has the permission to monitor, restrict and adjust the use of the computer systems and data communication, and if necessary copy, move, delete or read information on the computers or in the networks.

If the connections are overloaded, too expensive or the use of them is causing security risks, the administrators can limit the data communication.

The administrators have the right to interfere in the users’ files and network communications without the permission of the user only if a problem with the system so requires or if abuse or illegal activities is suspected.

The obligations of the administrator

The administrator is bound by professional secrecy regarding information.

The administrators should inform of the effects of changes to the systems and if required give adequate assistance.

The rights of the users

The users can take initiative to the development of the administration of the ADP services.

A user can make a written complaint to the Headmaster of the school if he/she is not content with the administration’s measures towards him/her.

The obligations of the users

In order to maintain good working conditions, the users should use the systems responsibly and take the other users of the system into consideration. The users should attend to matters related to shared data security.

Every user is responsible for all use with their username.

Even if the administrator is doing his utmost to provide for backup, the user himself/herself is responsible for the safety and backup of his/her files.

The user should take other users of the system into consideration, and is not allowed to cause problems to other users, the school or the data systems.

The advice of the staff of the school is to be observed.

The limitations of use

Circumventing or trying to circumvent the quotas and other limitations of use is prohibited.

Searching for and using known or new security flaws is prohibited.

The use of the data systems and data networks to break into or try to break into other systems is prohibited.

The distribution of computer viruses is prohibited.