Operating Regulations of the TUL Computer Network

Contents

  1. Introductory provisions
  2. Scope of application
  3. Terminology
  4. Access to the network
  5. User rights and obligations
  6. Prohibited activities
  7. Central network services
  8. Non-central computer and appliance services
  9. Administrator rights
  10. Sanctions for non-compliance with the rules
  11. Other provisions

1. Introductory provisions

These operating regulations define the rules for using the Technical University of Liberec's computer network (hereinafter, the “network”). The aim is to ensure secure, efficient and responsible access to the university’s network and computing resources.

2. Scope of application

These rules apply to all network users – students, employees, guests, partners, and other authorized persons.

3. Terminology

The network infrastructure consists of cabling, wireless frequencies, and active components (switches, routers, Wi-Fi access points, etc.), as well as all other connected devices (computers, servers, disk arrays, computer classrooms, uninterruptible power supplies, and more).

A network user (the "user") is a person who uses the network's infrastructure and/or central services.

The network administrator (the "Administrator") is the Information Systems Department at the Rector's Office. You can contact the Administrator at net@tul.cz, through the Helpdesk system, or through other information systems operated by the Administrator.

4. Access to the network

Any employee, student, guest, or supplier of the Technical University of Liberec (TUL) can become a user.

Account creation

User accounts are created automatically when a person is added to the employee or student registry. For guests and suppliers, accounts are created upon request submitted to the Administrator. The account is provided to:

  1. TUL employees for the duration of their employment relationship (longer than three months).
  2. TUL students for the duration of their studies. The account is typically set up for one academic year and automatically renewed if the student enrolls for the next academic year and is listed in IS/STAG.
  3. TUL guests, based on a justified request submitted by a TUL employee; guest accounts are always limited to the shortest necessary time period.
  4. Suppliers on the basis of a contractual relationship, to the extent necessary for contract performance.

Account termination

A user account on the network is terminated:

  1. at the user's request,
  2. for employees upon termination of employment at TUL; in the case of retirement, the email address may be retained and redirected at the employee’s request,
  3. for students upon completion of studies; for 30 days thereafter, access to email, IS/STAG, and cloud storage is retained,
  4. for guests upon expiration of the account validity period,
  5. for suppliers upon termination of the contractual relationship,
  6. in the case of a serious violation of these operating rules.

5. User rights and obligations

User rights

Users have the right to:

  1. access the university network and services in accordance with their status and needs,
  2. use the network for educational, research, operational, and administrative purposes,
  3. use central network services to the extent determined by the Administrator.

User obligations

Users are required to:

  1. use sufficiently strong access credentials and protect them,
  2. comply with network security and integrity principles, including proper care of equipment used for access,
  3. use computing resources efficiently and sparingly.

6. Prohibited activities

Users are prohibited in particular from:

  1. Unauthorized access – logging in under another person’s identity or bypassing security mechanisms.
  2. Spreading malicious software – distributing viruses, worms, spyware, ransomware, or other malicious code.
  3. Commercial misuse – business activities, advertising, or paid services without permission.
  4. Copyright infringement – illegal sharing or use of unlicensed software or media.
  5. Cyberbullying and harassment – sending threatening or abusive messages.
  6. Excessive network load – operating game servers, P2P networks, or large-scale streaming.
  7. Infrastructure modification – connecting unauthorized active elements or machines.
  8. Legal violations – activities contrary to Czech, EU, or international law.

7. Central network services

Central network services are provided within the scope of user authorization and include:

  1. access to the Internet and other networks,
  2. e-mail,
  3. authentication services, including national and international infrastructures,
  4. secure remote access (VPN),
  5. access mediation to third-party services,
  6. use of installed software.

8. Non-central computer and appliance services

Rules for devices not administered by the network administrator and used by multiple users are set by device administrators, who are required to:

  1. consult the network administrator in advance for non-standard or high-load connections,
  2. maintain usage records and provide them upon request,
  3. establish and enforce usage rules consistent with these regulations.

Failure to comply may result in device disconnection from the network.

9. Administrator rights

The network administrator is authorized to:

  1. assign network addresses and hostnames,
  2. maintain user records and manage authentication data,
  3. restrict or disconnect network segments or devices when justified,
  4. temporarily or permanently restrict or terminate user accounts,
  5. monitor network traffic for diagnostic purposes,
  6. set or refuse conditions for device connections.

10. Sanctions for non-compliance with the rules

Violations are handled in accordance with Czech law, TUL internal regulations, and contractual provisions.

Breaches may result in warnings, access restrictions, disciplinary proceedings, or criminal charges.

11. Other provisions

Network services are provided on a best-effort basis and are not guaranteed. The administrator may suspend services temporarily without prior notice, especially in urgent situations.

Devices requiring continuous availability may only be connected with administrator approval. The administrator is not liable for damages caused by service unavailability.

Where possible, users will be informed of planned maintenance by e-mail.

Exemptions may be granted by the TUL Cybersecurity Committee after consultation with the administrator.