Difference between revisions of "Acceptable Use Policy"

From PDP/Grid Wiki
Jump to navigationJump to search
m
m
Line 9: Line 9:
 
# <div class="NavFrame"><div class="NavHead">Do no harm to Nikhef, it's services, staff or reputation</div><div class="NavContent">Harm is more easily done than repaired! Data is easily deleted or modified but hard or impossible to recover. A rash document (as well as of course offensive material) put up on your home page is quickly indexed by search engines and will never disappear from the web again. Confidential data accidentally disclosed will never be a secret again. A defamatory remark will live forever in cyberspace. An infected home laptop or smartphone will quickly poison other systems at Nikhef and many person months will be wasted to recover from the incident. So do no harm.</div></div>
 
# <div class="NavFrame"><div class="NavHead">Do no harm to Nikhef, it's services, staff or reputation</div><div class="NavContent">Harm is more easily done than repaired! Data is easily deleted or modified but hard or impossible to recover. A rash document (as well as of course offensive material) put up on your home page is quickly indexed by search engines and will never disappear from the web again. Confidential data accidentally disclosed will never be a secret again. A defamatory remark will live forever in cyberspace. An infected home laptop or smartphone will quickly poison other systems at Nikhef and many person months will be wasted to recover from the incident. So do no harm.</div></div>
 
# <div class="NavFrame"><div class="NavHead">Comply with the policies of Nikhef's service providers</div><div class="NavContent">Nikhef provides access to to brokers services of third parties for its users, such as connectivity to the public Internet through SURFnet, access to Federated Services, or other hosted services like backup and calendering. You should at all times also comply with the policies, terms and conditions of use of these service providers. </div></div>
 
# <div class="NavFrame"><div class="NavHead">Comply with the policies of Nikhef's service providers</div><div class="NavContent">Nikhef provides access to to brokers services of third parties for its users, such as connectivity to the public Internet through SURFnet, access to Federated Services, or other hosted services like backup and calendering. You should at all times also comply with the policies, terms and conditions of use of these service providers. </div></div>
# '''You share resources with others - be nice'''
+
# <div class="NavFrame"><div class="NavHead">You share resources with others - be nice</div><div class="NavContent">Even when staying within the intended use, it is quite possible to strain resources to such an extent that other users can no longer make use them. Running CPU intensive applicaitons on the general login server, or using this service for bulk data transport are some examples. Making an outbound telephone call for a phone conference, put it on hold, but then forget about it - exhausting our telephone lines as well as incurring a high bill. When such incidents are detected, the program or call in question will be terminated by Nikhef CT staff to preserve operational integrity. In such cases users should refrain for such actions and may work together with system administrators to see if a less disruptive alternative exists.</div></div>
#:Even when staying within the intended use, it is possible to strain resources to such an extent that other users can no longer make use them. In such cases users should work together with system administrators to find less disruptive alternatives.
 
 
# <div class="NavFrame"><div class="NavHead">Monitoring and logging of network traffic and e-mail</div><div class="NavContent">Systems and network are monitored in order to detect trouble in an early stage and rapidly mitigate potential damage, for administrative, operational, accounting, monitoring and security purposes only. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail transactions (its source and destinations) are also logged, in a secured system, and retained for a maximum of 90 days. Obviously, user data, including e-mail, will only be inspected if there is a strong and substantiated suspicion of misuse of services or illegal activities. If you want to know what kind of logs are kept about your use of ICT services, you can always contact the CT!</div></div>
 
# <div class="NavFrame"><div class="NavHead">Monitoring and logging of network traffic and e-mail</div><div class="NavContent">Systems and network are monitored in order to detect trouble in an early stage and rapidly mitigate potential damage, for administrative, operational, accounting, monitoring and security purposes only. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail transactions (its source and destinations) are also logged, in a secured system, and retained for a maximum of 90 days. Obviously, user data, including e-mail, will only be inspected if there is a strong and substantiated suspicion of misuse of services or illegal activities. If you want to know what kind of logs are kept about your use of ICT services, you can always contact the CT!</div></div>
 
# <div class="NavFrame"><div class="NavHead">Enforcement</div><div class="NavContent">Access to services may at any times be suspended or terminated discretionarily for administrative, operational or security purposes. It is common for access to be suspended as part of an incident investigation, even when a violation is merely suspected. As a general matter, Nikhef will attempt to work with the User to cure violations and to ensure that there is no re-occurrence of the violation prior to terminating service. </div></div>
 
# <div class="NavFrame"><div class="NavHead">Enforcement</div><div class="NavContent">Access to services may at any times be suspended or terminated discretionarily for administrative, operational or security purposes. It is common for access to be suspended as part of an incident investigation, even when a violation is merely suspected. As a general matter, Nikhef will attempt to work with the User to cure violations and to ensure that there is no re-occurrence of the violation prior to terminating service. </div></div>

Revision as of 21:58, 26 April 2011

This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.

  1. Obey the law
  2. Respect intellectual property and confidentiality agreements