Privacy Policy

Regarding this site

This is the official web-portal of “Goce Delcev” University (hereinafter UGD) in Ship. The web-portal is run and maintained by the employed in the Public Relation Center of "Goce Delcev" University.
The web-pages that are part of this site have this form of addresses: www.ugd.edu.mk/index.php/stranica, www.ugd.edu.mk/link_kon_dokument или https://poddomen.ugd.edu.mk/.
There are several important points below that have to be taken into consideration when searching through this web-portal:

• There are 13 organizational units of the University, with the responsible person for each one that delivers information about the unit. Each unit is independent and responsible for the contents published on the web-page.
• Moreover, there are centers as special organizational units within the University, responsible for editing the content published in the part Centers of the web-page of the University.
• There are several other services within the University, which can have their on web-pages, with people responsible for the information in these services.
• The pages of the organizational units can have web-addresses with the following form: http://ceu.ugd.edu.mk

The characteristics of the web-portal are used for expressing the official attitude of the University and they are established by its Statute.

Availability
The main web-page is designed according to the W3C (World Wide Web Consortium) instructions.

Searching and maps
The searching through the web-portal is enabled by the web-application and it serves for searching the pages visible to the whole public.
The central site uses Google Maps.

Availability
The main web-page is designed according to the W3C (World Wide Web Consortium) instructions.

Searching and maps
The searching through the web-portal is enabled by the web-application and it serves for searching the pages visible to the whole public.
The central site uses Google Maps.

Portal design
The portal of UGD is created in the web-application (Content Management System - CMS) Joomla 2.5.

The portal is optimized for:
PC - Firefox, IE 9, Google Chrome, Mac - Firefox 3 and 2, Opera and Safari. It is not compatible with the older versions of Internet Explorer, therefore, if you use an older version of IE, we recommend you to upgrade it.

LEGAL NOTICE
The electronic web page (web–page) of "Goce Delcev” University is composed of three parts:

1. A part intended for informing the public. This part gives information of public character about the events, the developments and the work of the University. The information about the employed i.e. the teaching and scientific staff, the assistants and the administrative staff are shown. The data published and connected to the employed of the University are protected with the Law on personal data protection and their misuse shall be punished in accordance with the Law.
2. A part intended only for the employed on permanent and temporary basis of the University. This part is protected and it can be accessed only with username and password assigned by UGD. The username and password are authentic for each user and they cannot be transferred to third parties by electronic or other type of communication. Every intentional or unintentional sharing of these data can lead to reducing of data safety and protection. Hence, the University shall not be responsible for any consequences that may occur from it. The data located in this protected part of the web-page are intended for making the work easier and timely informing of the employed, they are not intended for the whole public, therefore the employed are responsible for their forwarding to third parties or sharing with people without authorized access to this part.
3. A part intended for students of the University. This part is protected and it can be accessed only with username and password assigned by UGD. The username and password are authentic for each user and they cannot be transferred to third parties by electronic or other type of communication. Every intentional or unintentional sharing of these data can lead to reducing of data safety and protection. Hence, the University shall not be responsible for any consequences that may occur from it. The data located in this protected part of the web-page are intended for the students in any cycle studies, they are not intended for the whole public, and therefore the student is responsible for their forwarding to third parties or sharing with people without authorized access to this part.

Provisions that regard the protection of databases
LAW ON COPYRIGHT AND RELATED RIGHTS
(“Official Gazette of the RM" No. 115/10 and 140/10 – consolidated)

Databases
Article 15

(1) The database shall be a copyright work.
(2) The database, regarding the paragraph 1 of this article, shall be a collection of data, arranged in certain systematic or methodical way, and individually accessible through electronic or other means.

SECTION 6. Rights of the database creator
Notion of the database creator
Article 118

 

The creator of a database shall be a legal or natural entity who undertakes the initiative and responsibility for investing into the creation of a database, if he/she can demonstrate that he/she has carried out a qualitative and/or quantitative substantial effort in the obtaining, verification or presentation of its contents.


Content of the rights of the database creator
Article 119


(1) The database creator shall have exclusive right to authorize or prohibit the reproduction (extraction) and/or distribution of copies, making it available to the public, or any form of communication to the public of the whole or substantial parts of the database (re­utilization).
(2) The first sale of a copy of a database by the holder of the right or with his consent shall exhaust the right to control further resale of the copy.
(3) The rights under paragraph 1 of this Article shall apply without violation of the current rights in the parts of the database.


Scope of protection
Article 120


(1) The protection of the rights of the database creator shall include:
1) The entire contents of the database;
2) The substantial part of its contents, evaluated qualitatively and/or quantitatively and
3) The insubstantial parts of its contents, when used in repeated and systematic acts which are contrary to the normal use and to unreasonable extent violate the legitimate interests of the database creator.
(2) The protection of the database shall not apply to computer programs used for creation or operation of databases accessible through electronic means.


Rights and obligations of the lawful user
Article 121


(1) The creator of a disclosed database may not prevent the lawful user of the entire database or of a part thereof, where he/she is authorized to use only that part, from using the insubstantial parts of its contents, evaluated qualitatively and/or quantitatively, for any purpose.
(2) The lawful user of a published database may not perform acts which are contrary to the normal use and/or which violate to unreasonable extent the interests of the creator of the database.
(3) The lawful user of a published database may not cause damage to the holder of copyright or related rights regarding the works or subject - matters of related rights contained in the database.


SECTION 6. Duration of the right of the database creator
Article 128

(1) The rights of the database creator shall last for 15 years after the completion of the creation of the database. If, within this period, the database is lawfully published, the rights shall last for 15years after the publishing.
(2) The term of protection stipulated under paragraph 1 of this Article shall begin to run anew following any substantial change, evaluated qualitatively and/or quantitatively, to the contents of the database, including any substantial change resulting from the accumulation of successive additions, deletions or alterations, which would result in the database being considered to be a substantial new effort, evaluated qualitatively and/or quantitatively.


CRIMINAL CODE “Official Gazette of the RM” No. 37/96; 80/99; 4/2002; 43/2003, 19/2004, 81/2005, 60/2006, 73/2006,7/2008, 139/2008, 114/2009
Damage and unauthorized entering into a computer system
Article 251

(1) The person that will, without authorization, erase, change, damage, cover or in other way make unusable a computer data or program or device for maintenance of the computer system, or will make impossible or more difficult the use of a computer system, data or program or the computer communication, shall be sentenced with a fine or imprisonment up to three years.
(2) The sentence stipulated in the paragraph (1) shall be also imposed to one that will, without authorization, enter in somebody else's computer or system with intention to use his/her data or programs in order to obtain illegal material or other gain for himself/herself or for other or with intention to cause material or other damage or transfer the computer data that are not intended for him/her and which are obtained without authorization.
(3) The sentence referred in paragraph (1) of this article shall be applicable to anybody who unlawfully intercepts, using technical means, a transfer of non-public computer data to, from and within some computer system, including electromagnetic emissions from a computer system that supports such computer data.
(4) The person that will perform the crimes stipulated in paragraphs 1, 2 and 3 of this article toward a computer system, data or programs that are protected with special measures of protection or are used in the activities of the state authorities, public enterprises or public institutions or in international communications, or as a member of a group that is formed with intention to perform that crimes, shall be sentenced wits imprisonment of one to five years.
(5) If greater material gain is obtained with the crime stipulated in paragraphs 1, 2 and 3 of this article or if greater damage is caused, the perpetrator shall be sentenced with imprisonment of six months to five years.
(6) If greater material gain is obtained with the crime stipulated in the paragraph 3 or if greater damage is caused, the perpetrator shall be sentenced with imprisonment of one to ten years.
(7) Any person who unlawfully produces, purchases, sells, keeps in possession or makes it available to others the following: special facilities, computer passwords, access codes and similar data, thus providing access to one part or to the entire computer system, computer programs or computer data that are intended or suitable for the committal of the offenses referred to in paragraphs (1), (2) and (3) of this article shall be fined or sentenced to imprisonment of up to one year.
(8) The attempt for the crimes stipulated in the paragraphs 1 and 2 is punishable.
(9) If the crime referred to in this article is committed by a legal entity, he/she shall be sentenced with a fine.
(10) The special facilities, equipment, computer programs or data intended for the crime shall be confiscated.


Regards,
“Goce Delcev” University – Shtip