The Rules of The Computer Network


The CAMK computing center exists to help fulfill the statutory tasks required of CAMK. It has been organized such that the Users can carry out their scientific research using the tools which it provides.

A. The CAMK computer network, hereafter referred to as 'the network', consists of:

  1. all computing equipment, in particular desktop computers, portable computers, servers;
  2. peripherals, in particular printers, monitors, scanners, etc.;
  3. the physical network, including cabling, switches and sub-networks;
  4. the separate mains power supply, marked by red Legrand mains sockets;
  5. wireless networking hardware;
    other ancillary equipment.

B. General rules; please:

  1. use the computers and network in such a way as not to adversely affect other people's work;
  2. use the local disks of the computer you are working on as much as possible;
  3. familiarize yourself with the communiques sent out by the administrator;
  4. all requests, comments and suggestions should be sent to only, to ensure an effective response, except for situations where this is impossible;
  5. do not overload the Internet connection by transferring excessive amounts of data. The Administrators will help you with specific cases.

C. Accounts:

  1. staff, CAMK graduate students and long-term collaborators are given permanent accounts;
  2. guests receive accounts which remain active during their stay and for two weeks afterwards;
  3. guests with minimal requirements may receive guest* accounts which will be deleted immediately after they leave;
  4. accounts are activated by the administrator after approval by the head of the computer center, who will announce his decision not later than 10 working days after the request is submitted to;
  5. the staff member looking after a guest or graduate student is responsible for acquainting him or her with the rules of the computing center and for submitting a request for an account to;
  6. the user is solely responsible for the contents of their account during the time that they have access to it. In particular, this includes software or files without documents confirming the right to use them, such as a valid license.

D. Functioning and security of the CAMK network:

  1. it is forbidden to connect, disconnect or move any equipment which is part of the network without the permission of the system administrators. This applies in particular to switching off or restarting public or grant computers;
  2. any changes in the configuration of the computers requires the permission of the system administrators or the head of the computer center;
  3. passwords should be non-trivial, longer than 6 characters and changed at least every six months;
  4. any suspicion of unauthorized access to a user's account should be reported immediately to the system administrators;
  5. the system administrator retains the right to disable the account of any user whose password has been discovered;
  6. passwords should be kept strictly private and must not be given to other people; violation of this rule will result in immediate disabling of the account;
  7. the same password should not be used in the CAMK network and on computers outside CAMK;
  8. the following TCP/IP services should be used for communication outside CAMK: email, ssh, www, anonymous-ftp. Other services should be used only after obtaining permission from the system administrator.

E. Use of public computers:

  1. only one program of any given user, of estimated CPU time 3 minutes, can be run with full priority;
  2. programs likely to run for a long time should have their priority reduced (using the command: nice +19 program-name; instructions: man nice);
  3. no more than three CPU-intensive programs should be run simultaneously on any given machine;
  4. user processes violating these rules may be killed by the system.

F. Use of grant computers by users not included in said grant:

  1. is possible only after obtaining permission from the primary investigator of that grant;
  2. the conditions of use should be communicated to the computing center –

G. Use of the computer room:

  1. the keys to the computer room are given by the porter to persons authorized to use the computer room;
  2. the person given the keys to the computer room is responsible for the room being used only by people authorized to do so according to the list available at the reception desk;
  3. the user, while in the room, is responsible for the functioning and use of all the equipment in the room. Any anomalies should be reported to the administrator or the porter immediately;
  4. before returning the keys to the porter the security of the room should be checked; in particular, the doors and windows should be locked and the lights switched off;
  5. the keys may be passed to another authorized person, provided that they agree and the porter is informed immediately;
  6. leaving the computer room unattended is particularly reprehensible, and may result in the removal of those responsible from the list of authorized persons.

H. Closing statements:

  1. any questions or disagreements regarding the correct use of the CAMK computer system will be decided by the system administrator and the head of the computer center, whose decision is final and binding;
  2. the system administrator and the head of the computer center have the authority to issue binding instructions regarding all matters relating to use of the network, including restricting the right to use the network, up to and including disabling of accounts;
  3. the system administrators should be informed immediately of any major failure of the network. A list of contact telephone numbers is available at the reception desk.