User registration: Terms

If you want to get a personal e-mail account or to change a forgotten password, you must familiarise yourself with "Procedure for use of Mykolas Romeris University Information and Communication Technologies" and adhere to it.

Note. Students and those doctoral students that want to get an e-mail box must register using this address: https://stud.mruni.eu/en/


  Approved by
Mykolas Romeris University Rector
Dec. 5th, 2018
Order Nr. 1I-96

PROCEDURE FOR USE OF MYKOLAS ROMERIS UNIVERSITY
INFORMATION AND COMMUNICATION TECHNOLOGIES

I SECTION
GENERAL PROVISIONS

1. Mykolas Romeris University (from hereon – University) Information and Communication Technologies Procedure for Use (from hereon – Procedure) outlines rules for information and communication technologies use by University administration, lecturers, scientists, researchers and other University staff for activities (from hereon – Employees), also students, auditors, and other University guests

2. In the Procedure, the following definitions are used:

2.1. University computer system – a complete set of connected and interacting computers, their peripherals and software for preparing and solving user tasks.

2.2. Users of the University computer system – University Employees, students, auditors and other natural and legal persons in their activities using University  computer system resources (from hereon – Users).

2.3. Communication/telecommunication technologies – the technologies used to transmit information.

2.4. Information technologies – the means and ways to overall process information (collect, keep, transmit and to process) by computer.

2.5. Computer hardware – computers, their parts, peripherals, computer network equipment, an uninterrrupted electric current, etc.

2.6. Software – computer programs for managing computer hardware and solving user tasks on a computer (operating system, programming systems, office programme packets, antivirus, archiving and other applications).

2.7. Computer networks – servers and workstation computers connected by computer network equipment (cables and dedicated computer network devices) to a common system to provide users with fast information exchanges, collective use of computer software and the Internet.

2.8. Computer resources – computer hardware, software, information systems, services (e-mail, etc.), computer network.

II SECTION
USE OF INFORMATION AND COMMUNICATION TECHNOLOGIES

3. The University administration, taking into account the Employee’s position in the Office, allocates computer resources to Employees.

3.1. Employees of the University Information Tech Centre (from hereon – ITC), taking into account agreements entered into by students with the University and other persons, allows Users to connect to and use computer resources.

4. The equipment belongs to the University and is to be used only for work or study or for other needs, connected with University activities.

5. The University computer system is the property of the University and should be used only to undertake University administrative functions, studies or for research or for research-related work.

6. Users of the University computer system must use the resources of the University computer system, according to the designated function and not violating any laws of the Republic of Lithuania, University Statutes, Lithuania’s research and studies computer network LITNET Users’ Rules and other normative acts and Internet etiquette.

7. Users, who use University computers are strictly forbidden:

7.1. to publicize confidential University information and use it for personal purposes;

7.2. to use electronic mail and Internet for non-work related or non-study related functions, or for activities forbidden by the laws of the Republic of Lithuania, or libelous, defamatory, threatening, or contrary to the morals of society and information contrary to moral principles, computer viruses, malicious information (spam) to send or for other purposes, which can cause harm to University or other persons’ lawful interests;

7.3. to have unauthorized access to others computer resources: to copy and use programs and data without the owner’s knowledge and consent, to connect to other employee’s or persons computers without proper (computer users) permission, etc.;

7.4. to transfer to third parties University IT and telecommunications hardware and software belonging to the University, if such transfer is not related to the performance of work functions or may in any manner harm University interests;

7.5. to transfer or distribute graphic, audio-visual material, games and software not directly related to work, research or study, send data that is infected with viruses, have various other software code files that may interfere with the functioning of computer or telecommunication equipment, software and security;

7.6. to unilaterally change, modify, information technology and telecommunications hardware and software;

7.7. to unilaterally change computer hardware and system software configuration and computer network settings (IP address, computer name, etc.);

7.8. install, store, use or distribute any unauthorized, unlawful, infringing on copyrights or other personal computer software;

7.9. to use programmes, which obstruct or interfere with the operation of the computer network (for example network scanning programs, network blocking programs);

7.10. to arbitrarily use and organize other computer connections or to other external networks than those specified;

7.11. use of equipment for unauthorized access to data or systems, system security checks, scanning, monitoring of network traffic data in the computer network;

7.12. to connect non-University hardware to the University computer network without the knowledge of IT employees;

7.13. to distribute or to reveal to others the names, passwords, codes or other data that are issued to access computer resources;

7.14. to perform other actions not related to the performance of the functions provided in Line 5 of the Procedure or in conflict with legal acts.

8. The University does not guarantee the confidentiality of personal information, when using University resources for personal purposes.

9. Users, who notice computer hardware or software malfunction or environmental factors that could adversely affect hardware and software, should immediately notify IT Center personnel.

10. When an Employee’s Labour Contract is terminated or ends, the Employee must return the allocated technical and software in accordance with Rules and the Order Nr. 11-246 approved May 31st, 2018 and in the Mykolas Romeris University Order outlined for returning equipment, materials.

11. The University uses computer programmes in accordance with valid legal acts of the Republic of Lithuania, specific computer programme licensing requirements and this Procedure.

12. Hardware and software configurations are identified, configured, maintained and repaired by IT employees.

III SECTION
RESPONSIBILITY

13. Users are responsible for safe, proper and economic use of information and the communication means allocated to them.

14. For loss or damage of these means, Users are responsible, according to the procedure outlined in Laws of the Republic of Lithuania. For violations of the Procedure, the User may temporarily lose the right to use all or part of computer resources. If there is another violation, the User may lose the right to use services permanently.

IV SECTION
CONCLUSION PROVISIONS

15. Ownership or management of the information and communication technology used by the University shall not violate the privacy of the Users’ personal communications.

16. The Procedure applies to all members of the University community, - Employees, students, auditors, and other guests. Users are acquainted with this Procedure and changes by publication on the University internet website and sending an Announcement about the Procedure to University Employees and students by e-mail. Violations of this Procedure can be held to be labour violations for which there can be liability as outlined in the Labour Code of the Republic of Lithuania.