Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
sissanetcomppolicy [2009/07/22 16:12]
brunato
sissanetcomppolicy [2012/07/09 16:32]
zanello [Printable versions of the SISSA Network Computing Policy]
Line 6: Line 6:
 SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\ SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\
 \\ \\
-__**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**__\\+**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**\\
  
 Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\ Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\
Line 12: Line 12:
 ===== Use of the account ===== ===== Use of the account =====
  
-The user can obtain an account characterized by an alphanumeric code (userid) that is unique in SISSA'​s domain (sissa.it). The users are solely responsible for actions taken with their userid.\\+The user can obtain an account characterized by an alphanumeric code (username) that is unique in SISSA'​s domain (sissa.it). The users are solely responsible for actions taken with their username.\\
  
     * It is forbidden to obtain an account under false pretenses.     * It is forbidden to obtain an account under false pretenses.
Line 25: Line 25:
 ===== Electronic mail ===== ===== Electronic mail =====
  
-Each electronic mail message includes the sender'​s name containing an userid. The user is solely responsible for the electronic mail messages sent from their userid.\\+Each electronic mail message includes the sender'​s name and his/her username. The user is solely responsible for the electronic mail messages sent from their userid.\\
  
     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.
-    * It is forbidden to read, modify, copy or cancel other person'​s ​mails without their prior consent.+    * It is forbidden to read, modify, copy or cancel other people ​mails without their prior consent.
     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.
     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.
Line 40: Line 40:
  
     * It is forbidden to use systems with the aim of obtaining unauthorized access to remote systems.     * It is forbidden to use systems with the aim of obtaining unauthorized access to remote systems.
-    * It is forbidden listen and decrypt network communications and user'​s ​passwords.+    * It is forbidden listen and decrypt network communications and user passwords.
     * It is forbidden to copy and diffuse system configuration files.     * It is forbidden to copy and diffuse system configuration files.
     * It is forbidden to willfully spread computer viruses and other programs that damage or destroy systems or data.     * It is forbidden to willfully spread computer viruses and other programs that damage or destroy systems or data.
Line 47: Line 47:
  
  
-SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy (AUP) (available at [[http://​www.garr.it/​docs/garr-aup-00-engl.shtml|http://​www.garr.it/​docs/garr-aup-00-engl.shtml]]).\\+SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy" ​(AUP) (available at [[http://​www.garr.it/​a/eng/garr-en/aup-eng-home]] or in italian at [[http://​www.garr.it/​utenti/regole-di-accesso/​acceptable-use-policy-aup]]).\\
 While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]). While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]).
 Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.** Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.**
  
  
-===== Printable versions of the SISSA Network Computing Policy ===== 
  
-http://​www.sissa.it/​comp/​docs/​ncp/​SISSA_Network_Computing_Policy.pdf 
- 
-http://​www.sissa.it/​comp/​docs/​ncp/​SISSA_Network_Computing_Policy_it.pdf