Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Laptops are meant for work use only by the school’s personnel. Only authorized personnel are allowed to use them.
  • It is not allowed to connect laptops that are not managed by the school’s IT services to the wired network. Use always WLAN where it is available.
  • It is not allowed to alter or modify a computer’s hardware/software configuration or settings. It is forbidden to modify any kind of security settings.
  • Never leave your laptop unattended or visible in a car or exposed place, even if it is for a short period of time.
  • Laptops should be connected to our school’s network regularly or every fortnight to receive the necessary antivirus and security updates.
  • When wireless services (WLAN and Bluetooth) are not needed or in use, switch them off. Same rule applies to mobile phones that these features are available. In Nokia phones, one can switch Bluetooth off by pressing * for 2-3 seconds.

...

Internet

  • The internet connection is to be used for work and/or study related purposes, as agreed with the employer.
  • The internet connection is secured by a firewall. Data traffic and server logs are monitored to ensure that no violation occurs according to the law of Protection of Privacy, systems and their security settings are secure, services are not misused and for technical development and troubleshooting.
  • Do not download from the internet non-work related programs or materials.
  • If you suspect that a system is hacked or any kind of security breach (not only internet related), contact IT services immediately.
  • It is forbidden to use without permission the employer’s credit card for online purchases.
  • Keep in mind that you are a representative of your employer, whenever you access the internet. Your computer’s IP address that is transmitted onto the internet is registered to Metropolia.
  • Clean up your browser’s cookies frequently.
  • Use of the following applications is not permitted due to security risks:
    • Music and video download programs such as Napster, KaZaA, DC or similar.
    • Downloaded screensavers that consume a workstation’s resources, such as SETI@home (Search for Extra Terrestrial Intelligence) or similar @home applications.
    • Programs that bypass security protocols and services, such as decryption breaking software.

...

  • Protection of Privacy in Working Life Act (759/2004)
    • The employer shall collect personal data about the employee primarily from the employee him/herself.
    • Retrieving and opening electronic mail messages belonging to the employer
    • The employer’s obligations regarding necessary arrangements
      • the employee can, with the aid of the electronic mail system’s automatic reply function, send notification to a message sender about his/her absence and the length of absence, and information about the person who is to take care of the tasks of the absent employee; or
      • the employee can direct messages to another person approved by the employer for this task or to another employer-approved address of the employee; or
      • the employee can give his/her consent to an arrangement whereby in his/her absence another person of his/her choosing and approved by the employer for the task can receive messages sent to the employee
      • The employer has the right, assisted by the person vested with the authority of information system administrator, to find out on the basis of information concerning the message sender, recipient or title, whether the employee has, in his/her absence, been sent, or has sent or received immediately before the absence, messages belonging to the employer about which it is otherwise essential that the employer has information in order to complete negotiations concerning his operations or to serve customers or safeguard his operations
        A report about the opening shall be drawn up, signed by the persons involved, stating which message was opened, why it was opened, the time of opening, the persons performing the opening and to whom the information on the content of the opened message was given

Supervisors are responsible for assuring that subordinates know how to do their work safely

...

Lyhyt tietoturvaohje