User's chart for use of computer resources and internet services
This document, associated to the "Règlement
intérieur du LOA",
is first of all a good behavior code. The aim is to make clear
the responsibilities of the users, according to the law, in order to
settle proper use of the computer resources and of the Internet, with
a few rules granting consideration and respect of the other users.
The head of Service Informatique at the laboratory
will provide users with any additional information they might need.
In the following:
"Computer resources" covers every software
and hardware means of computation and management with local or remote
access, whether directly or through the LOA's network.
"Internet services" cover the possibility to
access to the web, Electronic Mail, forum... through local or distant
"Users" are those persons using or accessing
to the computer resources and the Internet services.
Access to the computer resources and to the Internet services
Using computer resources, Internet services and the
network to access to them is allowed exclusively for the users'
professional activity, according to the law.
The statutes of "GIP RENATER", to which CNRS
and Université of Lille I are linked, define professional
activities as follows : Research, teaching, technical development,
technology transfer, diffusion of scientific, technical or cultural
information, experimentation of new services of innovative technical
character, and managerial activity deriving of those activities.
Using LOA's shared computer resources and connecting
new equipment to the network requires an authorization, which is
strictly personal and can not be passed to a third person, even
temporarily. Authorizations can be cancelled at any time. They are
terminated at the end of the professional activity, even temporary,
which justifies them.
When a user has requested an account allowing remote
access on one or several computers of the Laboratory, this user must
keep his distant collaborator informed of the content of the present
document. He must also keep the computer service of the Laboratory
informed of the existence of this remote access.
Rules for use, security and good behavior
Only public or personally granted use of resources is
allowed. Each user is responsible for the use of the computer
resources and of the network to which he may have access. To his
level, he must contribute to the general security.
Users must act reasonably and faithfully in order to
avoid saturation or deviation for personal purposes of the resources.
In particular :
- He must apply the security prescription of the
- He must ensure the security of his information. He is
responsible for the rights he may grant to other users on this
information. He is responsible for protecting his proprietary data by
the various individual recording devices at his disposal.
- He must report every attempt of invasion of his
account, and, in general, every anomaly he might encounter.
- He must follow the rules of the Laboratory with
respect to software installation.
- He must select safe passwords, keep them secret, and
never pass them to any third party.
- He must never provide access to the equipments at his
disposal to a non authorized party.
- He must never use, or attempt to use accounts other
than his own one, and never try to hide his identity.
- He must never attempt to read, modify, copy or
destroy data which are not his own property, directly or indirectly.
He must never change any file containing account or identification
- He must never leave his own machine, or a free access
machine, in a state providing access to computer resources or
Users are granted access only to those data which are
public, shared or their own property.
Access to other users' data is prohibited, even if
those have not been explicitly protected.
This rule also applies to every electronic mail product
which was not sent directly, or copied to the user.
If, for professional use, a user has to build a file to
which the law "informatique et liberté" applies, he
must first, in agreement with the Director of the Laboratory, request
and obtain due authorization for it from "CNIL". This
authorization is only valid for the processing of the file data
presented in the request, not for the file itself.
Abiding laws concerning software
Except for a safety copy, as defined in the
intellectual property code, copying any commercial software, whatever
its use, is strictly prohibited.
Installing computer games is prohibited.
Changing restriction of use of software is prohibited.
Protecting the computer system integrity
The user commits himself not to purposely perturb the
operation of the computer system, whether by non standard use of
equipments or by introducing parasitic software like viruses, worm
. Every kind of work which might violate the rules defined in the
preceding paragraph requires authorization from the Director of the
Laboratory, and strict compliance with the rules he might then
Using Internet services
The user can access Internet services exclusively in
the framework of professional activities. He must abide the general
principles and rules particular to the sites he visits. He must abide
In particular :
He must not connect, or attempt to connect, to a
server by any means other than those normally edited by this server,
or without having been granted authorization by an authoritative
He must not deliberately do action endangering the
proper operation of a site he is visiting.
He must not use third party identity, or intercept
communications of a third party.
He must not use these services for proposing or
providing access to a third party to data which might be
confidential, or against the law.
He must not upload documents on a server, except if
it is the normal destination of this server or if he had been granted
authorization by an authoritative person.
He must use particular politeness in using electronic
mail and forum.
He will not express personal opinions not related to
his professional activity which might be prejudicial to the
Laboratory or to its administration.
He must abide laws applying to publications of
injurious, racist, pornographic or defamatory character.
The Laboratory will never be taken for responsible
for deterioration of information or violations of the laws done by a
user who has not followed these rules.
8- Resources use analysis and control
For maintenance and technical management purpose, the
use of hardware, software and network may be monitored and
controlled, according to the law.
9- Reminder of the main French laws
Every person on the French territory must abide
the French law, particularly in the field of computer security.
- the law of "6 janvier 1978" « informatique
et libertés », ( cf. http://www.cnil.fr/)
- the legislation relating to the computer fraud
(articles 323-1 à 323-7 du code pénal),
( cf. http://www.legifrance.gouv.fr/citoyen/code.cgi)
the legislation relating to the intellectual property
( cf. http://www.legifrance.gouv.fr/citoyen/code.cgi)
the legislation relating to the cryptology
( cf. http://www.telecom.gouv.fr/francais/activ/techno/crypto0698_1.htm)
The content of the present document applies to every
agent working in the Laboratory, whatever his status, and to every
person, whether on a temporary or permanent status, using the
computer system of the Laboratory, whether directly, remotely or
indirectly through the network managed by the Laboratory.
This document will be annexed for information to the
contract agreed with agents hired on a temporary basis, who will have
access to the computer system of the Laboratory.
Every person received by the Laboratory and accessing
its computer system will sign this document. A copy of it will be
kept by the administration of the Laboratory.