Menu

Javascript is not activated in your browser. This website needs javascript activated to work properly.
You are here

Rules for computer networks

local network and international networks
Use of the computer networks is a privilege, not a right. This applies both to Lund University’s local network and to the international networks. Abuse of the networks can lead to temporary or permanent exclusion from use of the networks.

Lund University computer network rules

The following are not permitted:

  • attempting to access network resources to which you do not have a right of access (that something is possible does not mean that it is appropriate or even allowed)
  • attempting to conceal your user identity (except in cases where it is expressly permitted)
  • attempting to disrupt or interrupt the intended use of the networks
  • clearly wasting available resources (network capacity, staff time, hardware, software) – for example by sending chain letters
  • attempting to damage or destroy computer-based information
  • encroaching on other users’ private lives
  • attempting to insult or demean other users
  • using the network for commercial purposes
  • using the network to download software, images, music, or other intellectual property (such as books or videos) unless you have the legal right to do so.

You must at all times follow Swedish laws and regulations while using the computer network at Lund University.

LDC page on security and rules (in Swedish)

Swedish university computer network rules

SUNET connects all the higher education institutions in Sweden. The board of SUNET has laid down ethical rules for connection to and use of SUNET.

The rules mean that you are responsible for keeping your password secret and for choosing sufficiently secure passwords.

  • You are responsible for the contents of your email account
  • Remember that emails cannot be completely protected against unauthorised access; there is always a possibility that someone can read what you write
  • Never send anything by email that you are not prepared to stand for in public
  • You should be aware that network and system administrators have the power and the right to go into the systems and intercept traffic on the network, and that they may need to read information belonging to an individual

Exclusion

Abuse of the networks can lead to temporary or permanent exclusion from use of the networks.

Page Manager: