IT Regulations for Students at VID
All users of our resources must be aware of their roles and their responsibility. Let security start with you: Let a proper security attitude be a part of your daily routines.
- 
	Implemented Security measures must be adhered to. I have read and understand the regulations in this statement. 
- 
	User-ID: I am responsible for my ID usage. My user-ID cannot be shared with others. The computer must be locked or logged off during absences. 
- 
	The password/pincode establishes me as the rightful owner of my user-ID. The password/pincode must be personal, and I must not reveal it to others or write it down (i.e. on a 'Post-it' note) for others to see. If others get access to my password, it must be changed immediately. If I suspect any misuse of my password, I must notify the IT section. 
- 
	Copying licensed software is illegal, unless explicitly stated otherwise in the University’s agreement with the supplier. 
- 
	Responsible use of the University’s IT resources implies that the user does not violate the IT regulations, other University regulations or legal rules. The user must refrain from using the IT resources to jeopardize the University’s reputation. The user is responsible for all actions taken from the user’s login-ID. 
- 
	Portable storage media (such as USB-memory sticks, CD/DVDs, recording equipment, paper documents etc.) with information that is owned and/or administered by VID, must be securely handled to prevent it from being misused. 
- 
	Private use of VID’s IT equipment is only permitted on a limited basis. The use of VID’s IT equipment or software in private business activities is not permitted. 
- 
	The user must delete his/her data when the time of study is concluded. Data, which is not deleted within 3 months, can be deleted by the IT section. 
- 
	Primarily, Internet should only be used as a tool in connection with my student status. For security reasons, all internet activity may be logged. 
- 
	Downloading new software from unknown suppliers and/or websites is forbidden without approval from the IT manager. Downloads must not be in violation of Norwegian Law, i.e. copyright regulations. It is forbidden to use the University’s IT-resources to download (or share) material protected by copyright regulations. 
- 
	Privacy protection. Unauthorized access to other people’s data is not accepted. It is not permitted to access the University’s IT-equipment through someone else’s user-ID. 
- 
	You must respect the provisions associated with data and computer programs. If you are in doubt about these provisions, you must ask a teacher or the IT section. Programs and data made available to the user by the University must not be used in violation with the University’s agreements with the rights holder. Resources that belong to the University must not be shared beyond the framework of the study situation. Caution must be exercised when using sensitive data and digital learning resources to prevent them from being compromised. You are not permitted to install software on the University’s IT systems. 
- 
	Control against hostile code: Cautiousness must be shown when opening e-mails from unknown senders, the use of chat-services, activation of links and attachments in unknown e-mails, websites etc. Everything that is received through USB-memory sticks, CD/DVDs etc. must be checked for viruses, regardless of the origin. If a virus is suspected, the IT section must be notified immediately. 
- 
	Reporting: Security incidents and suspicion of security incidents must be reported to your teacher or the IT section. 
- 
	Liability. The user is responsible for the use of resources available through the University’s IT systems. The University is not responsible for any loss inflicted upon the user as a result of errors or deficiencies in the computer programs, data etc. that are available to the user through the University’s IT resources. 
- 
	Entrance card and pin-codes are personal and must be stored in a safe place, inaccessible to others. 
- 
	Access to the user’s reserved areas. The IT section is entitled to search through the user’s reserved areas in order to secure safe operations of the IT resources. The IT section has a duty of confidentiality concerning any information gained about the user and the user’s activities. 
- 
	Private equipment cannot be connected to the University’s network and it is not permitted to disconnect the University’s equipment and replace it with private equipment. 
- 
	Sanctions: Violations to the above may result in sanctions in the form of permanent or temporary termination of user privileges. Sanctions may also be implemented according to other University provisions.