Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
sissanetcomppolicy [2011/10/03 13:36]
Davide Brunato [Security]
sissanetcomppolicy [2015/04/17 14:36]
Antonio Lanza
Line 15: Line 15:
  
     * It is forbidden to obtain an account under false pretenses.     * It is forbidden to obtain an account under false pretenses.
-    * It is forbidden to share an account with another person. The password must not be given to anyone else.+    * It is forbidden to share an account with another person. The password ​or any other authentication token must not be given to anyone else.
     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.
-    * It is forbidden to access, modify or cancel ​the data of other users, without their prior consent.+    * It is forbidden to access, modify or delete ​the data of other users, without their prior consent.
     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.
     * It is forbidden to use SISSA'​s computing resources for commercial purposes.     * It is forbidden to use SISSA'​s computing resources for commercial purposes.
     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.
-    * It is forbidden to copy or store material protected by copyright.+    * It is forbidden to copy or store material protected by copyright ​for which the necessary license has not been obtained.
  
 ===== Electronic mail ===== ===== Electronic mail =====
Line 28: Line 28:
  
     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.
-    * It is forbidden to read, modify, copy or cancel ​other people mails without their prior consent.+    * It is forbidden to read, modify, copy or delete ​other people mails without their prior consent.
     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.
     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.
Line 52: Line 52:
  
  
-===== Printable versions of the SISSA Network Computing Policy ===== 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy.pdf 
- 
-http://​www.sissa.it/​download/​ncp/​SISSA_Network_Computing_Policy_it.pdf