Difference between revisions of "Acceptable Use Policy"

From PDP/Grid Wiki
Jump to navigationJump to search
 
Line 15: Line 15:
 
# '''Monitoring and logging of network traffic and e-mail'''
 
# '''Monitoring and logging of network traffic and e-mail'''
 
#:The network is being monitored in order to detect trouble in an early stage, and have a rapid response to mitigate possible damage. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail traffic is logged in a secured system, and retained for a maximum of 90 days. User e-mail will only be inspected if there is a heavy suspicion of misuse of services, or illegal activities.
 
#:The network is being monitored in order to detect trouble in an early stage, and have a rapid response to mitigate possible damage. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail traffic is logged in a secured system, and retained for a maximum of 90 days. User e-mail will only be inspected if there is a heavy suspicion of misuse of services, or illegal activities.
 +
# '''Enforcement'''
 +
#:Access to the services may at all times be suspended or terminated if this is deemed necessary to prevent serious consequences.

Revision as of 01:16, 17 November 2010

This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.

  1. Use for intended purpose
    Nikhef offers the services to enable the users (employees, students and collaborators) to do their work. The services may not be used for commercial or political purposes. A limited amount of private use is allowed as long as it does not interfere with normal duties.
  2. Obey the law
  3. Respect the authorization restrictions set by Nikhef system administrators
  4. Respect intellectual property and confidentiality agreements
  5. Protect your access keys (passwords and certificates)
  6. Report suspected security breaches and misuse
  7. Do no harm to Nikhef, it's services, staff or reputation
  8. Comply with the policies of Nikhef's service providers
    Nikhef is connected to the internet through Surfnet, and thus needs to comply with their network traffic rules.
  9. You share resources with others - be nice
    Even when staying within the intended use, it is possible to strain resources to such an extent that other users can no longer make use them. In such cases users should work together with system administrators to find less disruptive alternatives.
  10. Monitoring and logging of network traffic and e-mail
    The network is being monitored in order to detect trouble in an early stage, and have a rapid response to mitigate possible damage. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail traffic is logged in a secured system, and retained for a maximum of 90 days. User e-mail will only be inspected if there is a heavy suspicion of misuse of services, or illegal activities.
  11. Enforcement
    Access to the services may at all times be suspended or terminated if this is deemed necessary to prevent serious consequences.