Документ взят из кэша поисковой машины. Адрес оригинального документа : http://www.atmob.org/library/policies/NetworkAcceptableUse.pdf
Дата изменения: Tue Dec 9 20:58:11 2008
Дата индексирования: Mon Oct 1 21:18:12 2012
Кодировка:

Поисковые слова: п п п п п п п п п п п п п п п п п п п п п п п
ATMoB Network Acceptable Use Policy
Created 6/1/2005

The Amateur Telescope Makers of Boston, Incorporated provides this network terminals for its members. The connections to the Internet and to other networks provided by special permission of MIT and Lincoln Laboratories. Any misuse of Acceptable Use Policy may result in termination of this permission and severance of Internet connection.

and are this the

Each terminal and network user must acknowledge that they have read and understand this document and that they will adhere to the policy. They understand that the network is monitored by IT Security at all times, and that violation of this policy may result in losing the privilege to use the network, and could result in permanent disconnection of the entire ATMoB network from the internet. System Requirements Any device connected to the network shall have; 1. 2. 3. A currently supported operating system. This operating system shall have all up to date service packs and security patches installed. A currently supported anti-virus program installed and operating, and all virus definitions shall be up to date. A currently supported anti-spyware filter. Recommended and free filters are LavaSoft Ad-Aware or SpyBot S&D. All spyware definitions installed shall be up to date.

As of February 18, 2005, the only Microsoft Windows Product that is supported is Windows XP, including Tablet and Media Edition. Macintosh, Unix and Linux systems are acceptable as long as they meet the criteria above.

General Guidlines
1. Users must respect the privacy of others. Users shall not intentionally seek information on, or represent themselves as, another user unless explicitly authorized to do so by that user. Nor shall Users obtain copies of, or modify files, other data, or passwords belonging to others. Users must respect the legal protection applied to programs, data, photographs, music, written documents and other material as provided by copyright, trademark, patent, licensure and other proprietary rights mechanisms. Users must respect the integrity of other public or private computing and network systems. Users shall not intentionally develop or use programs that harass other users or infiltrate any other computer, computing system or network and/or damage or alter the software components or file systems of a computer, computing system or network. Use should be consistent with guiding ethical statements and accepted community standards. Use of the Services for malicious, fraudulent, or misrepresentative purposes is not acceptable. The Services may not be used in ways that violate applicable laws or regulations.

2.

3.

4.

5.


6.

The Services may not be used in a manner that precludes or significantly hampers network access by others. Nor may the Services be used in a manner that significantly impairs access to other networks. Connections that create routing patterns that are inconsistent with the effective and shared use of the Services may not be established. Unsolicited advertising is not acceptable. Advertising is permitted on some Web pages, mailing lists, news groups and similar environments if advertising is explicitly allowed in that environment. Repeated, unsolicited and/or unwanted communication of an intrusive nature is strictly prohibited. Continuing to send e-mail messages or other communications to an individual or organization after being asked to stop is not acceptable.

7. 8.

9.

Prohibited Uses
The following are specifically prohibited; 1. The creation or transmission of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material; The creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety; The creation or transmission of defamatory material; The transmission of material such that this infringes the copyright of another person; The transmission of unsolicited commercial or advertising material; Deliberate unauthorized access to facilities or services accessible via the network; Deliberate activities with any of the following characteristics: a. Corrupting or destroying other users' data; b. Violating the privacy of other users; c. Disrupting the work of other users; d. Using the network in a way that denies service to other users (for example, deliberate or reckless overloading of access links or of switching equipment); e. Continuing to use an item of networking or networked software or hardware after ATMOB, MIT or Lincoln Labs has requested that use cease; 8. 9. Other misuse of the Internet or networked resources, such as the introduction of "viruses". Where the network or devices are being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of our network. No Wireless Networking Access Points are allowed.

2. 3. 4. 5. 6. 7.

10.

The intent of this policy is to identify certain types of uses that are not appropriate, but this policy does not necessarily enumerate all possible inappropriate uses. Using the guidelines given above, ATMoB, MIT or Lincoln Laboratories may at any time make a determination that a particular use is not appropriate.