Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
sissanetcomppolicy [2009/12/04 13:42]
marina
sissanetcomppolicy [2017/11/29 11:14] (current)
delise
Line 6: Line 6:
 SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\ SISSA is responsible for the security of the networks and computing systems in order to protect them from unauthorized access, and to permit legitimate users to use the systems for their work and research.\\
 \\ \\
-__**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**__\\+**Violation of the regulations regarding the use of computing facilities can lead to disciplinary actions in the form of suspension or revocation of accounts. Permanent revocation of accounts can result from disciplinary actions taken by SISSA following verification of abuses.**\\
  
 Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\ Each user is personally responsible for respecting Italian, European and international laws. Any violation of these laws can lead to civil and penal sanctions by the competent authorities. SISSA is obliged to collaborate with the competent authorities in the course of their investigations,​ by supplying all necessary information (including log and user's files) and support.\\
Line 12: Line 12:
 ===== Use of the account ===== ===== Use of the account =====
  
-The user can obtain an account characterized by an alphanumeric code (userid) that is unique in SISSA'​s domain (sissa.it). The users are solely responsible for actions taken with their userid.\\+The user can obtain an account characterized by an alphanumeric code (username) that is unique in SISSA'​s domain (sissa.it). The users are solely responsible for actions taken with their username.\\
  
     * It is forbidden to obtain an account under false pretenses.     * It is forbidden to obtain an account under false pretenses.
-    * It is forbidden to share an account with another person. The password must not be given to anyone else.+    * It is forbidden to share an account with another person. The password ​or any other authentication token must not be given to anyone else.
     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.     * Facilities put at the legitimate user's disposal must not be used by other unauthorized persons.
-    * It is forbidden to access, modify or cancel ​the data of other users, without their prior consent.+    * It is forbidden to access, modify or delete ​the data of other users, without their prior consent.
     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.     * It is forbidden to damage other users by inappropriate or excessive use of the computing facilities that prevents their use by others.
     * It is forbidden to use SISSA'​s computing resources for commercial purposes.     * It is forbidden to use SISSA'​s computing resources for commercial purposes.
     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.     * It is forbidden to install and use programs that are protected by copyright for which the necessary license has not been obtained.
-    * It is forbidden to copy or store material protected by copyright.+    * It is forbidden to copy or store material protected by copyright ​for which the necessary license has not been obtained.
  
 ===== Electronic mail ===== ===== Electronic mail =====
  
-Each electronic mail message includes the sender'​s name containing an userid. The user is solely responsible for the electronic mail messages sent from their userid.\\+Each electronic mail message includes the sender'​s name and his/her username. The user is solely responsible for the electronic mail messages sent from their userid.\\
  
     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.     * The falsification of electronic mail messages, with the intention of appearing to be someone else, is forbidden.
-    * It is forbidden to read, modify, copy or cancel ​other person'​s ​mails without their prior consent.+    * It is forbidden to read, modify, copy or delete ​other people ​mails without their prior consent.
     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.     * It is forbidden to send unsolicited electronic mail messages (spam) for commercial reasons, for propaganda or for non-requested announcements.
     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.     * It is forbidden to send messages the contents of which are obscene, racist or offensive to human dignity.
Line 40: Line 40:
  
     * It is forbidden to use systems with the aim of obtaining unauthorized access to remote systems.     * It is forbidden to use systems with the aim of obtaining unauthorized access to remote systems.
-    * It is forbidden listen and decrypt network communications and user'​s ​passwords.+    * It is forbidden listen and decrypt network communications and user passwords.
     * It is forbidden to copy and diffuse system configuration files.     * It is forbidden to copy and diffuse system configuration files.
     * It is forbidden to willfully spread computer viruses and other programs that damage or destroy systems or data.     * It is forbidden to willfully spread computer viruses and other programs that damage or destroy systems or data.
Line 47: Line 47:
  
  
-SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy (AUP) (available at [[http://​www.garr.it/​docs/garr-b-aup-engl.shtml]] or in italian at [[http://​www.garr.it/​reteGARR/aup.php]]).\\+SISSA is part of the GARR Consortium, the Italian network of universities and scientific research. Each SISSA user is therefore expected to respect the regulations laid out in the document entitled "GARR Acceptable Use Policy" ​(AUP) (available at [[https://​www.garr.it/​en/acceptable-use-policies]] or in italian at [[https://​www.garr.it/​it/regole-di-utilizzo-della-rete-aup]]).\\
 While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]). While using computers and data networks, the international regulations published in the public document RFC 1855 "​Netiquette Guidelines"​ must be observed (available at [[http://​www.ietf.org/​rfc/​rfc1855.txt|http://​www.ietf.org/​rfc/​rfc1855.txt]]).
 Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.** Reference should be made in particular to Italian law no. 547 dated 23 December 1993 "​**Modifications and integrations of the penal code regulations and of the penal procedure codes concerning computer crimes"​ and to Law no. 675/96 on Privacy "​Safeguarding personal data" and subsequent modifications and integrations.**
  
  
-===== Printable versions of the SISSA Network Computing Policy ===== 
- 
-http://​www.sissa.it/​comp/​docs/​ncp/​SISSA_Network_Computing_Policy.pdf 
- 
-http://​www.sissa.it/​comp/​docs/​ncp/​SISSA_Network_Computing_Policy_it.pdf