Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
sissanetcomppolicy [2011/10/03 13:36] brunato [Security] |
sissanetcomppolicy [2015/04/17 14:36] lanza |
||
---|---|---|---|
Line 15: | Line 15: | ||
* It is forbidden to obtain an account under false pretenses. | * It is forbidden to obtain an account under false pretenses. | ||
- | * It is forbidden to share an account with another person. The password must not be given to anyone else. | + | * It is forbidden to share an account with another person. The password or any other authentication token must not be given to anyone else. |
* Facilities put at the legitimate user's disposal must not be used by other unauthorized persons. | * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons. | ||
- | * It is forbidden to access, modify or cancel the data of other users, without their prior consent. | + | * It is forbidden to access, modify or delete the data of other users, without their prior consent. |
* It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others. | * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others. | ||
* It is forbidden to use SISSA's computing resources for commercial purposes. | * It is forbidden to use SISSA's computing resources for commercial purposes. | ||
* It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained. | * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained. | ||
- | * It is forbidden to copy or store material protected by copyright. | + | * It is forbidden to copy or store material protected by copyright for which the necessary license has not been obtained. |
===== Electronic mail ===== | ===== Electronic mail ===== | ||
Line 28: | Line 28: | ||
* The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden. | * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden. | ||
- | * It is forbidden to read, modify, copy or cancel other people mails without their prior consent. | + | * It is forbidden to read, modify, copy or delete other people mails without their prior consent. |
* It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements. | * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements. | ||
* It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity. | * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity. | ||
Line 52: | Line 52: | ||
- | ===== Printable versions of the SISSA Network Computing Policy ===== | ||
- | |||
- | http://www.sissa.it/download/ncp/SISSA_Network_Computing_Policy.pdf | ||
- | |||
- | http://www.sissa.it/download/ncp/SISSA_Network_Computing_Policy_it.pdf |