Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
sissanetcomppolicy [2011/04/13 13:18]
Marina Picek
sissanetcomppolicy [2017/11/29 11:14]
Andrea Delise
Line 15: Line 15:
  
     * It is forbidden to obtain an account under false pretenses.     * It is forbidden to obtain an account under false pretenses.
-    * It is forbidden to share an account with another person. The password must not be given to anyone else.+    * It is forbidden to share an account with another person. The password ​or any other authentication token must not be given to anyone else.
     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.
-    * It is forbidden to access, modify or cancel ​the data of other users, without their prior consent.+    * It is forbidden to access, modify or delete ​the data of other users, without their prior consent.
     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.
     * It is forbidden to use SISSA'​s computing resources for commercial purposes.     * It is forbidden to use SISSA'​s computing resources for commercial purposes.
     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.
-    * It is forbidden to copy or store material protected by copyright.+    * It is forbidden to copy or store material protected by copyright ​for which the necessary license has not been obtained.
  
 ===== Electronic mail ===== ===== Electronic mail =====
Line 28: Line 28:
  
     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.
-    * It is forbidden to read, modify, copy or cancel ​other people mails without their prior consent.+    * It is forbidden to read, modify, copy or delete ​other people mails without their prior consent.
     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.
     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.
Line 47: Line 47:
  
  
-SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy"​ (AUP) (available at [[http://​www.garr.it/​docs/garr-b-aup-engl.shtml]] or in italian at [[http://​www.garr.it/​reteGARR/aup.php]]).\\+SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy"​ (AUP) (available at [[https://​www.garr.it/​en/acceptable-use-policies]] or in italian at [[https://​www.garr.it/​it/regole-di-utilizzo-della-rete-aup]]).\\
 While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]). While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]).
 Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.** Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.**
  
  
-===== Printable versions of the SISSA Network Computing Policy ===== 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy.pdf 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy_it.pdf