Rules for Unibz It And eurac.edu



Similar documents
USE OF INFORMATION TECHNOLOGY FACILITIES

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

Acceptable Use Policy (AUP) School Computing

Terms and Conditions of Use of the Mediastore / Data Asset Management Platform of Konica Minolta Business Solutions Europe GmbH

UK Dedicated Servers Limited. Acceptable Use Policy

Service Description for the Webhosting/HomepageTool

TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

Acceptable Usage Policy

Terms and Conditions

Acceptable Use Policy - NBN Services

Internet usage Policy

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

MNI Networks Limited Acceptable Use Policy

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

Policy on the Security of Informational Assets

Declaration Form for EP Online/ WP Online User Agreement

SPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

FAX-TO- END-USER LICENSE AGREEMENT

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES

General Terms for the e-banking Application of Valartis Bank (Liechtenstein) AG, Gamprin-Bendern

INFORMATION TECHNOLOGY SECURITY STANDARDS

Federal law on certification services in the area of the electronic signature

Acceptable Use Policy

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

GENERAL TERMS OF USE MYGEONAUTE.COM

CENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT

SURE Services Terms and Conditions SURE MAIL

Acceptable Use Policy

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

Dene Community School of Technology Staff Acceptable Use Policy

Acceptable Use Policy

Direct Language Hub -

ELECTRONIC FILER AGREEMENT [REVISED JANUARY 1, 2014]

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

INTERNATIONAL MONEY EXPRESS (IME) LIMITED ONLINE REMIT USER AGREEMENT

INFORMATION TECHNOLOGY CHARTER

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Acceptable Use Policy

Policy for the Acceptable Use of Information Technology Resources

Soltec Computer Systems Limited ( THE COMPANY ) Suite 1 Castlethorpe Court, Castlethorpe, Brigg, North Lincolnshire, DN20 9LG

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

How To Protect Decd Information From Harm

Forrestville Valley School District #221

COMPUTER, INTERNET, & USE POLICY

WEB HOSTING AGREEMENT

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

2016 VANCOUVER WELLNESS SHOW CONTEST RULES

1.3 Your access to and use of the Site, including your order of Products through the Site, is subject to these terms and conditions.

GENERAL TERMS AND CONDITIONS

BUSINESS ONLINE BANKING AGREEMENT

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Covered California. Terms and Conditions of Use

Acceptable Use Policy

Website Terms and Conditions

Corporate Policy. Data Protection for Data of Customers & Partners.

SAMPLE RETURN POLICY

Lumous standard terms and conditions web design and development

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Transcription:

Index 1 Access...2 2 Applications...2 3 Responsibility...2 4 Personal details...2 5 Commercial Activities...2 6 Rules of use... 3 7 System security... 3 8 Safety... 3 9 Software Use... 4 9.1 Legal aspects... 4 9.2 Transfer of software... 4 9.3 General rules of behaviour for users... 4 9.4 On-site assistance... 4 10 Changes to the rules... 4 11 Declaration of consent... 4 12 Declaration of consent... 5

Rules for Unibz.it and eurac.edu 1 Access The free access to the scientific network and to Internet is a privilege that requires responsible behaviour on the part of the users. Access to the Scientific network of South Tyrol is disciplined by the following regulations and thus is binding. 2 Applications The present regulations apply to those who make use of the Scientific network of South Tyrol. Specifically, this applies to the users of Unibz.it and eurac.edu as well as those who receive data through the Scientific network of South Tyrol. 3 Responsibility Each user is solely responsible for his or her own Internet use and for any data transmitted and/or made public either directly or indirectly through the Scientific network of South Tyrol. This is valid in civil and criminal cases in particular. The Information and Communication Technology division will not adopt any technical measures to deny access to data for users (or some users). In consideration of the decentralised, international structure of the Internet there could occur cases where data are retrieved that are considered illegal by Italian legislation or are subject to the law concerning the protection of minors. Within the Scientific network of South Tyrol there is no censorship; the Free University of Bolzano/Bozen and the of Bolzano however do reserve the right to adopt action concerning this. For aspects that are not mentioned directly, the guidelines on netiquette apply (Netiquette Guidelines RFC 1855), and these give indications as to the behaviour to be adopted in the case of various Internet services. In the case that a user retrieves data that are against the law, an immediate cancellation of that account will be undertaken. 4 Personal details The Scientific network of South Tyrol stores the personal details of the users that are essential to the functioning of the domain. For the administration of accessing the network there have been log files created that cannot be accessed by the public and that then the system administrators use only in the case of error location, for planning purposes and as proof in the event of regulation violation. Participation in the Scientific network of South Tyrol requires that the user should declare his or her agreement for the use of his or her personal details for the aforementioned purposes at the time of registration. 5 Commercial Activities It is forbidden through the use of the Internet with Unibz.it or eurac.edu to engage in any commercial activities. Commercial activities are considered as: Offers of paying services via mail, news or www Using the e-mail address on a visiting card for commercial purposes Downloading of files for a non private use Publication of commercial services through Internet access PiAle, 21.09.09 3709_en.doc Page 2/5

6 Rules of use Users are requested to inform themselves of the rules and conventions for all the Internet resources of which they make use. 7 System security 8 Safety The Scientific network of South Tyrol operates in order to guarantee fast and efficient access to the network (both Intranet and Internet). It is therefore forbidden to engage in activities that could slow down the traffic or services on the network, or engage in activities that could cause problems to the system without having evaluated the consequences. The activities of a single user cannot compromise the working of other users. It is forbidden to overload the system; the importing or transmission of large quantities of data should therefore be carried out outside peak hours. This is valid for traffic of data within the Scientific network of South Tyrol and to external sites. This kind of service is reserved for the network administrators. Exceptions are only granted in single cases, as long as they have valid motives and have prior authorisation. Users are required to communicate any abuse and external intervention immediately to the system administrators who will then be able to adopt appropriate measures. It is forbidden to try to access the computers or data without the proper authorisation, to overload the computer or to exploit any holes in the system s security. It is also forbidden to intercept or transmit data. Such behaviour will expel the user from the network and could also lead to legal action being taken for interception of data, falsification of technical findings, modifications to data or sabotage of the computers. It is strictly forbidden to sabotage or manipulate the hardware or software linked to the server or on the computers, as well as sabotaging or manipulating equipment linked into the network, such as printers, scanners, etc. It is forbidden to modify the address assigned to the user by the system administrators, using a false name or manipulating information on the network without prior authorisation. The installation of hardware and software are tasks given exclusively to the Information and Communication Technology department. If a user contravenes these rules, he or she will be immediately excluded from the network. The institutions which have responsibility for the network then reserve the right to seek compensation. The verification of the system s security is the sole responsibility of the system administrators or those who have been authorised to do so by the former. Users are not allowed to undertake personal research with the view to finding any breaches in the security system. Any intervention on data of an evident or presumed importance concerning the system s security will be seen as an attempt to access the network without the proper authorisation. The user is responsible for his or her own account and for its use. Thus, the user should make sure his or her account is not accessed by unauthorised users. Users are not allowed to communicate their account details to third parties. The following general rules of behaviour contribute to safeguarding access: Use a password of 8 characters containing at least one non-alphabet character (e.g. a number) that does not give any indication as to who is the user; use the password with discretion Change the password regularly (around every 3 months) PiAle, 21.09.09 3709_en.doc Page 3/5

Do not allow third parties to use or know your password Do not transmit your password using the network 9 Software Use 9.1 Legal aspects By law software programs are subject to security norms of a contractual nature or prescribed by law. Any violation of these security norms and/or copyright regulations may require compensation for damages and will create legal consequences for the nonauthorised use of copyrighted material. In order to observe this regulation it is essential that there be co-operation from the user whose correct behaviour will contribute to the general security of the data and defend against any type of alien software. 9.2 Transfer of software The rights to all the software products used within the scientific network are reserved to the Free University of Bolzano/Bozen and to the and cannot be transferred to third parties. Copying software for private use and importing private software onto a system of the Free University of Bolzano/Bozen and the is strictly forbidden. 9.3 General rules of behaviour for users Users have to make use of the software in a way that conforms with the license They don t have to use software that is owned privately The system has to be disactivated if there is an interruption in prolonged work, if the user leaves the workplace (for example for meetings or during the lunch break) and once the work has ceased. 9.4 On-site assistance The Information and Communication Technology department will endeavour to provide assistance and consultancy for all the aforementioned points (1 9.3) and in the acquisition of software necessary for the activities in the institutions using the Scientific network of South Tyrol. 10 Changes to the rules The Free University of Bolzano/Bozen and the are able to modify (separately) and add to the present regulations. All users will be informed of any modifications via e-mail and have 2 weeks to withdraw from the users' agreement if they do not agree with the modifications. If after 2 weeks there have not been any objections the new regulations will enter into immediate effect without necessitating the users to sign a new agreement. 11 Declaration of consent The undersigned declares that he/she has read and agreed to all the rules for accessing the network. PiAle, 21.09.09 3709_en.doc Page 4/5

12 Declaration of consent The undersigned declares that he/she has read and agreed to all the rules for accessing the network.... Name and surname (block capitals)... Signature PiAle, 21.09.09 3709_en.doc Page 5/5