Difference between revisions of "Acceptable Use Policy"

From PDP/Grid Wiki
Jump to navigationJump to search
Line 12: Line 12:
 
# <div class="NavFrame"><div class="NavHead">Comply with the policies of Nikhef's service providers</div><div class="NavContent">Nikhef provides access to and brokers services of third parties for its users, such as connectivity to the public Internet through SURFnet, access to Federated Services, or other hosted services like backup and calendering. You should at all times comply with the policies, terms and conditions of use of these service providers. </div></div>
 
# <div class="NavFrame"><div class="NavHead">Comply with the policies of Nikhef's service providers</div><div class="NavContent">Nikhef provides access to and brokers services of third parties for its users, such as connectivity to the public Internet through SURFnet, access to Federated Services, or other hosted services like backup and calendering. You should at all times comply with the policies, terms and conditions of use of these service providers. </div></div>
 
# <div class="NavFrame"><div class="NavHead">You share resources with others - be nice</div><div class="NavContent">Even when staying within the intended use, it is quite possible to strain resources to such an extent that other users can no longer make use of them. Running CPU intensive applications on the general login server, or using this service for bulk data transport are some examples. Making an outbound telephone call for a phone conference and then put it on hold, but subsequently forget about it - exhausting our telephone lines as well as incurring a high bill. When such incidents are detected, the program or call in question will be terminated by Nikhef CT staff to preserve operational integrity. Users should subsequently refrain for such actions (so do not just try it again) and may work together with system administrators to see if a less disruptive alternative exists.</div></div>
 
# <div class="NavFrame"><div class="NavHead">You share resources with others - be nice</div><div class="NavContent">Even when staying within the intended use, it is quite possible to strain resources to such an extent that other users can no longer make use of them. Running CPU intensive applications on the general login server, or using this service for bulk data transport are some examples. Making an outbound telephone call for a phone conference and then put it on hold, but subsequently forget about it - exhausting our telephone lines as well as incurring a high bill. When such incidents are detected, the program or call in question will be terminated by Nikhef CT staff to preserve operational integrity. Users should subsequently refrain for such actions (so do not just try it again) and may work together with system administrators to see if a less disruptive alternative exists.</div></div>
# <div class="NavFrame"><div class="NavHead">Monitoring and logging of network traffic and e-mail</div><div class="NavContent">Systems and network are monitored in order to detect trouble in an early stage and rapidly mitigate potential damage, for administrative, operational, accounting, monitoring and security purposes only. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail transactions (its source and destinations) are also logged, in a secured system, and retained for a maximum of 90 days. Obviously, user data, including e-mail, will only be inspected if there is a strong and substantiated suspicion of misuse of services or illegal activities. If you want to know what kind of logs are kept about your use of ICT services, you can always contact the CT department. We follow [http://www.cbpweb.nl/downloads_av/av21.pdf CBP guidance on working in networks].</div></div>
+
# <div class="NavFrame"><div class="NavHead">Monitoring and logging of network traffic and e-mail</div><div class="NavContent">Systems and network are monitored in order to detect trouble in an early stage and rapidly mitigate potential damage, for administrative, operational, accounting, monitoring and security purposes only. In order to trace problems on the network to the source, logs of network traffic are kept for a limited time period. E-mail transactions (its source and destinations, but not its content) are also logged, in a secured system, and retained for a maximum of 90 days. Obviously, user data, including stored e-mail, will only be inspected if there is a strong and substantiated suspicion of misuse of services or illegal activities. If you want to know what kind of logs are kept about your use of ICT services, you can always contact the CT department. We follow [http://www.cbpweb.nl/downloads_av/av21.pdf CBP guidance on working in networks].</div></div>
 
# <div class="NavFrame"><div class="NavHead">Enforcement</div><div class="NavContent">Access to services may at any times be suspended or terminated discretionarily for administrative, operational or security purposes. It is common for access to be suspended as part of an incident investigation, even when a violation is merely suspected. As a general matter prior to terminating service, Nikhef will attempt to work with the User to cure violations and to ensure that there is no re-occurrence of the violation. </div></div>
 
# <div class="NavFrame"><div class="NavHead">Enforcement</div><div class="NavContent">Access to services may at any times be suspended or terminated discretionarily for administrative, operational or security purposes. It is common for access to be suspended as part of an incident investigation, even when a violation is merely suspected. As a general matter prior to terminating service, Nikhef will attempt to work with the User to cure violations and to ensure that there is no re-occurrence of the violation. </div></div>
  

Revision as of 21:46, 17 November 2011

Acceptable Use

This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.

Legalese

Liability

In no event will Nikhef be liable to any user or third party for any direct, indirect, special or other consequential damages for actions taken pursuant to this AUP, including, but not limited to, any lost profits, business interruption, loss of programs or other data, or otherwise, even if Nikhef was advised of the possibility of such damages.

Complaints

Complaints regarding violations of this AUP, as well as concerns regarding objectionable material sent from or distributed via Nikhef, will be accepted via e-mail at abuse@nikhef.nl, so long as a valid return address is included. Nikhef must be able to independently verify each instance of abuse: for objectionable email each complaint must include the COMPLETE TEXT OF THE OBJECTIONAL MESSAGE, INCLUDING ALL HEADERS. Please do NOT send excerpted parts of a message; sending a copy of the entire message, including headers, helps to prevent misunderstandings based on incomplete information, or information used out of context. Full headers demonstrate which path the message has taken, and enable us to determine whether any part of the message has been forged. This information is vital to our investigation. If you consider material located on Nikhef resources (e.g. published via its web site) to infringe on your rights, provide the complete URL, the time you visited this URL, and complete and sufficient evidence as to why you consider such a publication to infringe on your rights under Dutch Law.

Responsibility

Nikhef is not responsible for the content of email communications sent by its users, not for information published on user personal home pages. This responsibility rests with the user. At its sole discretion, Nikhef reserves the right to remove materials from its servers and to terminate access to services for the user that Nikhef determines has violated this AUP.

Modifications

Nikhef retains the right to modify the AUP at any time. Such modifications shall become effective at the moment they are adopted by Nikhef and will apply to all users, current and future.