Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Last revision Both sides next revision | ||
sissanetcomppolicy [2012/07/09 16:32] zanello [Printable versions of the SISSA Network Computing Policy] |
sissanetcomppolicy [2015/04/17 14:36] lanza |
||
---|---|---|---|
Line 15: | Line 15: | ||
* It is forbidden to obtain an account under false pretenses. | * It is forbidden to obtain an account under false pretenses. | ||
- | * It is forbidden to share an account with another person. The password must not be given to anyone else. | + | * It is forbidden to share an account with another person. The password or any other authentication token must not be given to anyone else. |
* Facilities put at the legitimate user's disposal must not be used by other unauthorized persons. | * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons. | ||
- | * It is forbidden to access, modify or cancel the data of other users, without their prior consent. | + | * It is forbidden to access, modify or delete the data of other users, without their prior consent. |
* It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others. | * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others. | ||
* It is forbidden to use SISSA's computing resources for commercial purposes. | * It is forbidden to use SISSA's computing resources for commercial purposes. | ||
* It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained. | * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained. | ||
- | * It is forbidden to copy or store material protected by copyright. | + | * It is forbidden to copy or store material protected by copyright for which the necessary license has not been obtained. |
===== Electronic mail ===== | ===== Electronic mail ===== | ||
Line 28: | Line 28: | ||
* The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden. | * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden. | ||
- | * It is forbidden to read, modify, copy or cancel other people mails without their prior consent. | + | * It is forbidden to read, modify, copy or delete other people mails without their prior consent. |
* It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements. | * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements. | ||
* It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity. | * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity. | ||
Line 50: | Line 50: | ||
While using computers and data networks, the international regulations published in the public document RFC 1855 "Netiquette Guidelines" must be observed (available at [[http://www.ietf.org/rfc/rfc1855.txt|http://www.ietf.org/rfc/rfc1855.txt]]). | While using computers and data networks, the international regulations published in the public document RFC 1855 "Netiquette Guidelines" must be observed (available at [[http://www.ietf.org/rfc/rfc1855.txt|http://www.ietf.org/rfc/rfc1855.txt]]). | ||
Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes" and to Law no. 675/96 on Privacy "Safeguarding personal data" and subsequent modifications and integrations.** | Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes" and to Law no. 675/96 on Privacy "Safeguarding personal data" and subsequent modifications and integrations.** | ||
- | |||