The network resources of SCinet support the activities of the SC17 conference. As a user of these services and facilities, you have access to valuable conference materials, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical and legal manner.
Acceptable use means respecting the rights of other network users and the integrity of the physical facilities. If an individual is found to be in violation of the Acceptable Use Policy, the SC17 conference will take action, including the restriction and possible loss of network privileges. Individuals are also subject to federal, state and local laws governing many interactions that occur on the Internet.
This document establishes specific requirements for the use of all network resources of SCinet at the SC17 conference.
This policy applies to all users of networking resources (wired and wireless) owned or managed by SCinet and the SC17 conference, regardless of the ownership of the computer or device connected to the network.
2.1 Your Rights and Responsibilities
As an attendee of the SC17 conference, SCinet provides you with availability of wired and wireless networking resources that facilitate access to conference materials and to the Internet. You have a reasonable expectation of unobstructed use of these resources, of certain degrees of privacy, and of protection from abuse and intrusion by others sharing these resources.
3.1 Acceptable Use
- You are individually responsible for appropriate use of all resources and thus accountable to SCinet and the SC17 conference for all use of such resources. You may not enable unauthorized users to access the network.
- You should make a reasonable effort to protect your passwords and privacy, and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing SCinet in an unauthorized manner
- You must not attempt to access restricted portions of the network, or connected systems, without appropriate authorization.
- You must not use SCinet in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other users, or damage or degrade performance of the network.
- Do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password ‘crackers,’ vulnerability scanners, network sniffers, etc.)
3.2 Fair Share of Resources
SCinet expects to maintain an acceptable level of performance and must assure that frivolous, excessive or inappropriate use of the resources by anyone does not degrade performance for others. The network is shared, requiring that resources be utilized with consideration for others who also use them. Therefore, the use of any automated processes to gain technical advantage over others is explicitly forbidden.
3.3 Adherence with Federal, State, and Local Laws
Attendees of the SC17 conference are expected to uphold local ordinances and state and federal law. As a user of SCinet you must:
- Abide by all federal, state and local laws.
- Abide by all applicable copyright laws and licenses.
- Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified and sent over the Internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy and copyright infringement.
- Do not use, copy or distribute copyrighted works (including but not limited to graphics, audio files, videos, trademarks, software and logos) unless you have a legal right to use, copy, distribute or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.
3.4 Privacy and Personal Rights
All users of SCinet resources are expected to respect the privacy and personal rights of others.
While the SC17 conference does not generally monitor or limit content of information transmitted on SCinet, it reserves the right to access and review such information under certain conditions. These include: investigating performance deviations, determining if an individual is in violation of this policy or, as may be necessary, to ensure that the SC17 conference is not subject to claims of misconduct.
3.5 User Compliance
When you use SCinet you agree to comply with this and all other computing related policies.