Time of work
Pursuant to the regulation of the Director of cMIT No. 4 (from 25-03-2014), cMIT rooms can be used every day of the week from 7:00 to 22:00, except for non-working holidays (New Year, Three Kings, Easter, Labor Day, Constitution of the 3rd May, Pentecost, Corpus Christi, Assumption Day, All Saints, National Independence Day, Christmas). During non-working holidays, the access cards will not work. If one need the access to the building during holidays free of work, one must obtain a written consent from the Director of cMIT. Information on obtaining the Director’s consent should be provided to the person managing the access control system or the cMIT Administrative and Economic Manager.
Access to the rooms
The cMIT building has an access control system. In order to obtain consent for access to cMIT rooms, you must complete the PDF form available on the cMIT website (open it using, for example, Adobe Acrobat Reader DC and fill in on the computer). The author of the authorization may be a person who has permission to issue authorizations.
Authorization should be given to the person managing the access control system or the cMIT Administrative and Economic Manager.
On the basis of authorization, the personalized access control card and information for the cMIT Concierge are issued. In the case of students, an access card is a student card.
For short-term visits Guest Cards are available at the cMIT Concierge. Guest Cards are issued at the request of the person having permission to issue authorizations.
The cMIT building has video monitoring, which serves to protect the property of NCU and the property and safety of persons staying in the cMIT building and its immediate vicinity. The video monitoring data is stored and processed in accordance with the Personal Data Protection Act (from 10-05-2018 with later amendments).
Network at cMIT
In particular, it is prohibited to: connect wireless access points to the network without consulting the administrator, sharing your passwords and access certificates with others, scanning and eavesdropping the network to capture information flowing through the network.