Contingent liability and consent
You must sign the contingent liability in order to be able to obtain a key card and a user account. The liability consists of two parts:
- Use of KMH's computer, network and system resources as well as key cards.
- Handling of personal data , GDPR.
Use of KMH's computer, network and system resources, and key cards
Computing facilities, networks, equipment and accounts are owned and operated by the Royal College of Music in Stockholm (KMH) for use in activities authorized by KMH. All other activities, such as development, are only allowed when the regular uses are not disturbed, when these regulations are not violated, when they do not conflict with KMH rules and regulations, SUNET's rules or current legislation.
For the use of KMH computer, network and system resources by authorized persons, the following applies:
- An authorized person in these regulations refers to an individual who is assigned an account or who has by KMH received permission to use KMH computer, network or system resources.
- The authorization and related resources can only be used by authorized account holders.
- The password for an account must be kept secret.
- Authorisation is limited and will be discontinued when study registration, employment, project assignment or similar ends. If no other agreement exists, KMH has the right to terminate any authorization that has been inactive for more than six months.
- Sabotage or disruptive activities against the system or against other users, as well as intrusion or attempted intrusion in any system, locally as well as on systems outside KMH, is prohibited.
- It is not allowed to use misconfiguration, bugs or other methods to acquire extended system rights or powers other than those distributed by the operators.
- It is not allowed to conceal your identity when using KMH networks or associated resources.
Commercial use of KMH's computer resources is prohibited unless otherwise agreed.
- The equipment must not be used to view, download, print or otherwise deal with pornographic, racist or otherwise harassing material.
- All illicit and illegal downloading of copyright material on KMH-owned equipment is prohibited. Upon discovery of such material KMH has the right to immediately delete it and report to the KMH management.
- Anyone discovering faults, shortcomings, irregularities, improprieties or other problems, are obliged to report this within a reasonable time to the system manager or the IT department.
- KMH reserves the right to restrict the ability to publish and distribute material via KMH IT resources.
Sanctions and enforcement at violations
KMH will report any breach of regulations and of applicable laws to the KMH management and/or the police, which can lead to the account holder's suspension from studies and/or lead to legal sanctions.
Upon founded suspicion of impropriety, system managers are entitled to preventing access to KMH computer, network, and system resources.
System managers with permissions to others' information are obliged to observe professional secrecy, except towards law enforcement authorities.
In order to perform the daily maintenance and enforcement of these rules, the system manager has the right, within his or her area of responsibility and without warning, to monitor KMH systems and check the contents of traffic, data, etc. stored or under transmission.
The KMH Keycard
The pass is a valuable document. Cardholders undertake:
- Not to hand over or lend the card to another person.
- Not to store the PIN code (if any) along with the card.
- Not to admit unauthorized persons.
- Not to prop the door open with waste paper baskets or other objects.
- Not to use tape on the the electrical contact point on the door lock or to manipulate it in any other way.
- To see that the doors and windows are shut when leaving.
- To follow instructions so that wrong use does not set off the alarm.
- To follow the special instructions put up in some of the computer rooms.
- On loss of the key card, to report the loss as soon as possible to staff at Internservice.
- To the best of my ability, to contribute to a high level of security in the university premises.
- To inform the Internal Service on the discovery of irregularities or faults.
Anyone who violates the above rules will be liable for the damage incurred.
Your personal data, GDPR
Please note, this is a provisional translation of the original formal document in Swedish.
As student at KMH your personal data will be handled in many different contexts. These handlings and registrations you can not refrain from or avoid—they simply are a part of being a student at KMH.
The general rules for the management of personal data are described in GDPR, the General data protection regulation.
The study registry Ladok
The Higher Education Ordinance specifies moreover that every university or college unit shall maintain a local register of the students and their academic performance. Provisions on how the register is to be used is found in the Regulation on reporting of studies etc. at universities and colleges.
In the study registry, the following information is documented:
- Entry requirements
- Selection Criterion
- Participation in education activities and examinations
- Credits awarded
- Credit transfer
KMH uses the national study documentation system Ladok, in order to locally record information about its students. In the study register each student shall be identified by name and social security number. Full social security number or name may not be used in publication of examination results on the web. This applies also if the web page is protected by password.
Registered personal information is public, subject to the freedom of information principle. This means that the information may be disclosed to the person requesting it. In some cases, however, data may be classified as confidential and will not be disclosed.
Personal data are processed in connection with the following:
- Education planning, such as the scheduling of courses.
- IT administrative purposes such as access to KMH wireless/wired network, file servers, email, Office365.
- Access to KMH premises.
- In the IT systems you use, such as Helpdesk, room bookings, use of virtual rooms and the loan of equipment and library materials.
Your personal information may be used by administrative staff and teachers in the context of teaching, examination, case management, counseling and more. Examples of such uses could be the establishing of lists of participants, service notes and information mailings.
KMH logs all internal data communication in the KMH wired and wireless networks and the IT systems you use. The purpose is to ensure traceability and to maintain IT security in networks and IT systems. On suspicion of crime, log data can be used for investigation purposes.
After your studies, your personal information may be used to contact regarding alumni activities.
In accordance with the provisions of the Data Protection Act, you may, in writing and with your personal signature, request information about your personal data which is registered at KMH. If you discover any errors in the recorded data, you can request that the information be corrected.
Data Protection Representative
Data Protection Officer at KMH is Magnus Dyberg, Administrative Officer at the Management Support Office:
08-16 19 79