Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
sissanetcomppolicy [2009/12/14 13:08]
zanello
sissanetcomppolicy [2015/04/17 14:36]
lanza
Line 6: Line 6:
 SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\ SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\
 \\ \\
-__**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**__\\+**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**\\
  
 Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\ Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\
Line 15: Line 15:
  
     * It is forbidden to obtain an account under false pretenses.     * It is forbidden to obtain an account under false pretenses.
-    * It is forbidden to share an account with another person. The password must not be given to anyone else.+    * It is forbidden to share an account with another person. The password ​or any other authentication token must not be given to anyone else.
     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.
-    * It is forbidden to access, modify or cancel ​the data of other users, without their prior consent.+    * It is forbidden to access, modify or delete ​the data of other users, without their prior consent.
     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.
     * It is forbidden to use SISSA'​s computing resources for commercial purposes.     * It is forbidden to use SISSA'​s computing resources for commercial purposes.
     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.
-    * It is forbidden to copy or store material protected by copyright.+    * It is forbidden to copy or store material protected by copyright ​for which the necessary license has not been obtained.
  
 ===== Electronic mail ===== ===== Electronic mail =====
Line 28: Line 28:
  
     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.
-    * It is forbidden to read, modify, copy or cancel ​other people mails without their prior consent.+    * It is forbidden to read, modify, copy or delete ​other people mails without their prior consent.
     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.
     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.
Line 47: Line 47:
  
  
-SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy"​ (AUP) (available at [[http://​www.garr.it/​docs/garr-b-aup-engl.shtml]] or in italian at [[http://​www.garr.it/​reteGARR/aup.php]]).\\+SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy"​ (AUP) (available at [[http://​www.garr.it/​a/eng/garr-en/aup-eng-home]] or in italian at [[http://​www.garr.it/​utenti/regole-di-accesso/​acceptable-use-policy-aup]]).\\
 While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]). While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]).
 Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.** Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.**
  
  
-===== Printable versions of the SISSA Network Computing Policy ===== 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy.pdf 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy_it.pdf