CoEPP RC
 

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
coc [2015/07/28 14:24]
goncalo [Introduction]
coc [2015/07/28 14:26]
goncalo [Liability and sanctions]
Line 19: Line 19:
 ===== Basic principles ===== ===== Basic principles =====
  
-5. Authorization to use CoEPP computing facilities is at the discretion of the CoEPP Research Computing Team and node directors.+**5.** Authorization to use CoEPP computing facilities is at the discretion of the CoEPP Research Computing Team and node directors.
  
-6. CoEPP computing facilities are intended for the attainment of the Organization'​s aims. Their use must come within the professional duties of the user. The scope of personal use of the CoEPP computing facilities is specified in the Annex.+**6.** CoEPP computing facilities are intended for the attainment of the Organization'​s aims. Their use must come within the professional duties of the user. The scope of personal use of the CoEPP computing facilities is specified in the Annex.
  
-7. The use of CoEPP computing facilities must cause no material or moral damage to the Organization,​ nor disrupt their operation.+**7.** The use of CoEPP computing facilities must cause no material or moral damage to the Organization,​ nor disrupt their operation.
  
-8. CoEPP computing facilities must be used in conformity with : +**8.** CoEPP computing facilities must be used in conformity with : 
-a) the present rules; +  ​* ​a) the present rules; 
-b) special instructions which one of the CoEPP Research Computing managers may draw up in a particular case.+  ​* ​b) special instructions which one of the CoEPP Research Computing managers may draw up in a particular case.
  
-9. Although the Organization endeavours to maintain and protect its computing facilities, it cannot guarantee their proper functioning or the confidentiality of information stored by them. CoEPP therefore accepts no liability for any loss of information or any breach of confidentiality.+**9.** Although the Organization endeavours to maintain and protect its computing facilities, it cannot guarantee their proper functioning or the confidentiality of information stored by them. CoEPP therefore accepts no liability for any loss of information or any breach of confidentiality.
  
-<br/>+===== Users' access to accounts and data =====
  
-== Users' ​access to accounts and data ==+**10.** Accounts, whether single or shared ​access, may only be used for the purpose for which they have been allocated ​to the user.
  
-10Accountswhether single ​or shared access, may only be used for the purpose for which they have been allocated to the user.+**11.** All accounts must have appropriate access protectionsuch as account codes or passwords.
  
-11All accounts must have appropriate ​access ​protection, such as account ​codes or passwords.+**12.** The user shall take the necessary precautions to protect his personal computer or work station against unauthorized ​access. The user shall also protect details of his personal ​account, particularly by avoiding obvious ​passwords ​and shall not divulge his passwords to any third party. Upon request from the CoEPP Research Computing Team Security, the user shall select a new password.
  
-12. The user shall take the necessary precautions to protect his personal computer or work station against unauthorized ​access. The user shall also protect details of his personal account, particularly by avoiding obvious passwords and shall not divulge his passwords ​to any third party. Upon request from the CoEPP Research Computing Team Security, ​the user shall select a new password.+**13.** The user must keep confidential all information obtained from access to CoEPP computing facilities that the user may reasonably be expected to understand is confidential or sensitive in nature.
  
-13. The user must keep confidential all information obtained from access to CoEPP computing facilities ​that the user may reasonably be expected to understand is confidential ​or sensitive in nature.+**14.** The user shall not seek unauthorized ​access to accounts which have access protection and shall not look for, disclose or exploit any security weaknesses in the CoEPP computing facilities or use these facilities to do so with respect to any other computing facilities.
  
-14. The user shall not seek unauthorized ​access to accounts which have access protection and shall not look fordisclose ​or exploit any security weaknesses in the CoEPP computing facilities or use these facilities to do so with respect to any other computing facilities.+**15.** The user must report any unauthorized ​use of his personal computerwork station ​or accounts to the CoEPP Research Computing team.
  
-15. The user must report any unauthorized use of his personal computer, work station or accounts to the CoEPP Research Computing team. +**16.** Users shall respect the proprietary rights related to CoEPP computing facilities, including software copyrights.
- +
-16. Users shall respect the proprietary rights related to CoEPP computing facilities, including software copyrights.+
  
 ===== Third party access to users' accounts and data ===== ===== Third party access to users' accounts and data =====
  
-17. The CoEPP Research Computing Team shall have access to information contained in CoEPP computing facilities. Such access is subject to the following conditions : +**17.** The CoEPP Research Computing Team shall have access to information contained in CoEPP computing facilities. Such access is subject to the following conditions : 
-a) The above-mentioned persons shall not exchange among themselves information acquired thereby unless it is expressly required for the execution of their duties at CERN. +  ​* ​a) The above-mentioned persons shall not exchange among themselves information acquired thereby unless it is expressly required for the execution of their duties at CERN. 
-b) Access must always be consistent with the professional duties of the abovementioned persons and is only permitted for : +  ​* ​b) Access must always be consistent with the professional duties of the abovementioned persons and is only permitted for : 
-  * i) the resolution of problems affecting CoEPP computing facilities, including upgrades or the installation of new facilities;​ +    * i) the resolution of problems affecting CoEPP computing facilities, including upgrades or the installation of new facilities;​ 
-  * ii) the detection of computer security weaknesses or computer security violations;​ +    * ii) the detection of computer security weaknesses or computer security violations;​ 
-  * iii) the monitoring of resources available to ensure the adequacy of CoEPP computing facilities;​ +    * iii) the monitoring of resources available to ensure the adequacy of CoEPP computing facilities;​ 
-  * iv) the investigation of a suspected infringement of this circular by a user; +    * iv) the investigation of a suspected infringement of this circular by a user; 
-  * v) the reallocation of access to or deletion of accounts when a user's relation with CoEPP is terminated or when his activities are no longer compatible with the aims of the Organization;​ +    * v) the reallocation of access to or deletion of accounts when a user's relation with CoEPP is terminated or when his activities are no longer compatible with the aims of the Organization;​ 
-  * vi) the normal operations of the organic unit of the user where the absence of the user would seriously interfere with operations.+    * vi) the normal operations of the organic unit of the user where the absence of the user would seriously interfere with operations.
  
 ===== Liability and sanctions ===== ===== Liability and sanctions =====
  
-18. The user concerned shall be liable for damage resulting from any infringement of the present circular.+**18.** The user concerned shall be liable for damage resulting from any infringement of the present circular.
  
-19. In such cases, and as a general rule, the CoEPP Research Computing Team, shall inform the user concerned and explain the nature of the problem that has been detected or of the infringement that has been identified. If the incident occurs again, the user concerned shall be notified in writing by one of the above persons which of the provisions of this circular have not been correctly applied.+**19.** In such cases, and as a general rule, the CoEPP Research Computing Team, shall inform the user concerned and explain the nature of the problem that has been detected or of the infringement that has been identified. If the incident occurs again, the user concerned shall be notified in writing by one of the above persons which of the provisions of this circular have not been correctly applied.
  
-20. In the event of repeated infringement following the measures provided for under §19 above, or at any time when justified by the seriousness of the infringement,​ the Organization may withdraw access rights to CoEPP computing facilities from the user concerned and/or initiate disciplinary and/or legal proceedings against him.+**20.** In the event of repeated infringement following the measures provided for under §19 above, or at any time when justified by the seriousness of the infringement,​ the Organization may withdraw access rights to CoEPP computing facilities from the user concerned and/or initiate disciplinary and/or legal proceedings against him.
  
 ===== Annex ===== ===== Annex =====
coc.txt · Last modified: 2015/07/28 14:26 by goncalo
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Share Alike 4.0 International
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki