Systems Access Agreement
Category : 未分类
a. the user loses access to all computer resources (for a specified or complete period, depending on the nature of the injury); When my employment ends at university or my professional responsibility no longer requires access to the data or the extent of the required access changes, I have a shared responsibility with the Data Proprietor to ensure that my access to the system is properly revoked or changed. If my access is not changed in time, they will notify the data owner. j. to try to gain unauthorized access to other computer systems, data or resources, inside or outside the university; or (9) If an authorized user violates the terms of this directive, access may be restricted or revoked. Violations of this directive are notified to the university or the relevant regulatory authority or the police in order to take appropriate measures depending on the nature and seriousness of the offence. (11) CIDO (or nominee) may temporarily deny or restrict access to computer resources, including e-mails, to: (26) In response to requests for help from authorized users with computer resources, Service Desk employees may use software that allows them to remotely control another computer in the university network. Staff can only try remote access with the consent of the authorized user and only for the performance of tasks directly related to their work. (16) When authorized users leave university, their user accounts – including documents, emails and Internet access (and access protocols) – are archived and removed. Before leaving university, it is the responsibility of users to clean their own documents and mailboxes, to ensure that their managers or teams have the information necessary to protect the company, to make copies of all the personal information they need and to contact internal or external correspondents to let them know that the university`s email address is removed (for more information , check the staff separation checklist). While copies of personal data are acceptable, the university business remains the property of the university; No outgoing authorized user is allowed to take digital information from the university.
For more information, see the Intellectual Property Directive.