14.01.2013 Views

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

AUK 2011 - 2012 Academic Calendar - American University in Kosovo

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B. Authorized <strong>University</strong> User:<br />

An authorized user is anyone who has followed proper procedures and has been<br />

granted access to any or all of the comput<strong>in</strong>g or network resources of the <strong>American</strong><br />

<strong>University</strong> <strong>in</strong> <strong>Kosovo</strong> for reasons consistent with the mission of the <strong>University</strong>, and<br />

consistent with this policy.<br />

C. <strong>University</strong> Comput<strong>in</strong>g Resources:<br />

Any comput<strong>in</strong>g, network, or software system donated to or purchased by the<br />

<strong>University</strong> or by a grant that is resident at the <strong>University</strong>.<br />

D. <strong>University</strong> Network:<br />

The network of the <strong>University</strong> comprised of the physical components such as cable,<br />

switches, telecommunications equipment, wireless hubs, routers, as well as the<br />

Internet and Internet connection po<strong>in</strong>ts. The <strong>University</strong> network also has logical<br />

components such as IP addresses, directory services, rout<strong>in</strong>g, and connectivity to<br />

comput<strong>in</strong>g resources.<br />

E. <strong>University</strong> Network Connections:<br />

Any computer or device us<strong>in</strong>g an Internet address assigned to <strong>AUK</strong> or that is<br />

connected to a physical or wireless access po<strong>in</strong>t is considered to be connected to the<br />

<strong>University</strong> network.<br />

F. Personal Comput<strong>in</strong>g Resources:<br />

Personal resources are such as PCs, <strong>in</strong>formation appliances, network<strong>in</strong>g equipment,<br />

etc., which have been purchased and are owned by an authorized <strong>University</strong> user<br />

and are connected to the <strong>University</strong> network.<br />

G. Special Access:<br />

Special access is access to resources on a system that could be used to alter the<br />

behavior of the system, or to access accounts on the system, either directly or<br />

<strong>in</strong>directly. Examples are UNIX "root" or W<strong>in</strong>dows "Adm<strong>in</strong>istrator or System".<br />

H. System Owner:<br />

The system owner is the person with the authority to designate or use special access<br />

account privileges.<br />

I. System or Network Adm<strong>in</strong>istrator:<br />

The person responsible for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the authentication used by the system or<br />

network, controll<strong>in</strong>g authorized use, and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g system and network <strong>in</strong>tegrity<br />

and audit trails.<br />

J. Secure Systems:<br />

These are any hardware or software system whose use is restricted to a subset of the<br />

67 | P a g e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!