Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SPG:Drafts:Acceptable Use Policy March 2015"

From EGIWiki
Jump to navigation Jump to search
(External Draft - phase 2)
Line 1: Line 1:
[[Category:Security Policy_Group (SPG)]]
[[Category:Security Policy_Group (SPG)]]
= Generalized Operations Policy =
= Acceptable Use Policy =


As discussed and agreed at the March 2015 SPG meeting, we are producing an updated version of the Acceptable Use Policy (AUP):
As discussed and agreed at the March 2015 SPG meeting, we are producing an updated version of the Acceptable Use Policy (AUP):

Revision as of 08:51, 11 March 2015

Acceptable Use Policy

As discussed and agreed at the March 2015 SPG meeting, we are producing an updated version of the Acceptable Use Policy (AUP):

This addresses the following aims:

a. Generalise to include all EGI service offerings (Grids, Clouds, Long Tail of Science, etc.)
b. Add policy requirement to acknowledge support in publications
c. Address liability issues

It is an evolution from the current version (https://documents.egi.eu/document/74).

External Draft Text (phase 2)

This policy is one of a set of documents that together define the Security Policy [Ref]. This individual document must be considered in conjunction with all the policy documents in the set.


Acceptable Use Policy

By registering as a user you shall be deemed to accept these conditions of use:

  1. You shall only use the services to perform work, or transmit or store data consistent with the stated goals, policies and conditions of use as defined by the body or bodies granting you access.
  2. You shall provide appropriate acknowledgement of support or citation for your use of the resources or services provided as required by the body or bodies granting you access.
  3. You shall not use the services for any unlawful purpose and not (attempt to) breach or circumvent any administrative or security controls.
  4. You shall respect intellectual property and confidentiality agreements.
  5. You shall protect your access credentials (e.g. private keys or passwords).
  6. You shall keep all your registered information correct and up to date.
  7. You shall immediately report any known or suspected security breach or misuse of the services or access credentials to the specified incident reporting locations and to the relevant credential issuing authorities.
  8. You use the services at your own risk. There is no guarantee that the services will be available at any time or that they will suit any purpose.
  9. You agree that logged information, including that provided by you for registration purposes, may be used for administrative, operational, accounting, monitoring and security purposes and you agree that it may be disclosed to other organisations, via secured mechanisms, only for the same purposes and only as far as necessary to provide the services.
  10. You agree that the access-granting bodies and service providers are entitled to regulate, suspend or terminate your access, within their domain of authority, and you shall immediately comply with their instructions.
  11. You are liable for the consequences of your violation of any of these conditions of use, which may include but is not limited to the reporting of your violation to your home institute and, if the activities are thought to be illegal, to appropriate law enforcement agencies.