AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
AUK 2011 - 2012 Academic Calendar - American University in Kosovo
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
B. Authorized <strong>University</strong> User:<br />
An authorized user is anyone who has followed proper procedures and has been<br />
granted access to any or all of the comput<strong>in</strong>g or network resources of the <strong>American</strong><br />
<strong>University</strong> <strong>in</strong> <strong>Kosovo</strong> for reasons consistent with the mission of the <strong>University</strong>, and<br />
consistent with this policy.<br />
C. <strong>University</strong> Comput<strong>in</strong>g Resources:<br />
Any comput<strong>in</strong>g, network, or software system donated to or purchased by the<br />
<strong>University</strong> or by a grant that is resident at the <strong>University</strong>.<br />
D. <strong>University</strong> Network:<br />
The network of the <strong>University</strong> comprised of the physical components such as cable,<br />
switches, telecommunications equipment, wireless hubs, routers, as well as the<br />
Internet and Internet connection po<strong>in</strong>ts. The <strong>University</strong> network also has logical<br />
components such as IP addresses, directory services, rout<strong>in</strong>g, and connectivity to<br />
comput<strong>in</strong>g resources.<br />
E. <strong>University</strong> Network Connections:<br />
Any computer or device us<strong>in</strong>g an Internet address assigned to <strong>AUK</strong> or that is<br />
connected to a physical or wireless access po<strong>in</strong>t is considered to be connected to the<br />
<strong>University</strong> network.<br />
F. Personal Comput<strong>in</strong>g Resources:<br />
Personal resources are such as PCs, <strong>in</strong>formation appliances, network<strong>in</strong>g equipment,<br />
etc., which have been purchased and are owned by an authorized <strong>University</strong> user<br />
and are connected to the <strong>University</strong> network.<br />
G. Special Access:<br />
Special access is access to resources on a system that could be used to alter the<br />
behavior of the system, or to access accounts on the system, either directly or<br />
<strong>in</strong>directly. Examples are UNIX "root" or W<strong>in</strong>dows "Adm<strong>in</strong>istrator or System".<br />
H. System Owner:<br />
The system owner is the person with the authority to designate or use special access<br />
account privileges.<br />
I. System or Network Adm<strong>in</strong>istrator:<br />
The person responsible for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the authentication used by the system or<br />
network, controll<strong>in</strong>g authorized use, and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g system and network <strong>in</strong>tegrity<br />
and audit trails.<br />
J. Secure Systems:<br />
These are any hardware or software system whose use is restricted to a subset of the<br />
67 | P a g e