cheru-solo.gif (2161 byte)

matuniton_ita.jpg (9382 byte)

italian.gif (1114 byte)

Access policies for the use of the computing and network resources of the Department of Mathematics

Introduction

Computing resources are defined to be the computing  facilities of the Department and the remote ones, available directly or indirectly from the departmental network (dm.unipi.it or 131.114.6).

Network resources are defined to be the set of services supplied locally or remotely -via Internet- servers ,  regarding various information: Web, electronic mail, etc.

The technicians of the Computing Center are defined to be system administrators: they have the responsibility to install and to manage the computing systems of the departmental network to guarantee the best possible operation.

Access to the resources

The use of the computing and network resources of the Department and the connection of a new computer to the departmental network are subject to authorization of the Director of the Computing Center , with a delegation from the Director of the Department.

The authorizations are strictly individual and not transferable. Such authorizations have an expiration date and terminate with cessation of the activity that justified them or upon the expiration date in the absence of a renewal.

The use of the computing and network resources is authorized exclusively for aims relating to the professional activity of the users; in particular, for research activity, instruction, study, technological developments, scientific, technical and cultural information , experimentation with new services having an innovation character , for administrative services, and for management that comes with such activities.

Moreover,the Department will be able to establish restrictions for access specific to its own organization (identification or access documents, filters for access from the outside, etc).

Security

Every user must contribute to the total security of the system. In particular, every user:

Proper use

Every user is responsible for the correct use of the computing and network resources avalaible to him.The use of the resources must be rational and legal, and must avoid saturation or improper use  of the resources. In particular the individual user:

Moreover, every user is responsible for the correct use of the avalaible resources and for contributing to the proper working of the system. In particular, he commits himself:

The use of the computing resources outside of the previous rules, when necessary, should be agreed upon with the system administrators.

Data confidentiality and security

The computing and network resources, managed by the system administrators , are dedicated to research and to scientific computation and therefore are not configured so as to offer standards of security appropriate to the treatment of particularly confidential data.

With the exception of explicitly public or shared documents, access to the information and documents on the computing systems must be limited to those belonging to the individual user. This rule obviously applies also to private communications such as electronic mail, in the case in which the user is not the adressee either directly or via copy.

The violation of privacy constitutes a penal crime.

Intellectual property

Moreover the law does not allow the installation and use of commercial programs without a licence for use.

The programs installed on the departmental computers must be used respecting the terms of the use licences.

For the use of programs in the public domain and for the reproduction of all the source material (books, articles, images, sounds), it is necessary to follow the author's copyrights.

The violation of the copyrights constitutes a penal crime.

Integrity and mantainance of the system

The user commits himself not to voluntarily interfere with the proper working of the computing and network systems . In particular:

Use of the network services

The user can use the network services exclusively for activities for which authorization has been granted and in respect of the general principles, of the rules that the sites propose, and of the legislation in vigor.

In particular:

Analysis and control of the use of the resources

The system administrators have all powers needed in order to monitor the correct use of the departmental computer science system; to such end, they can analyze without warning the data on the public computing resources and the data exchanges via network. The system administrators can, moreover, consult system logs and register extracts.

In case of hacker attacks or in those cases in which the proper working and security of the system demand it, the system administrators will be able to investigate the user's documents and, in case of an infraction, to transmit the results to the Director of the Department and  to the director of the computing center.

The system administrators, apart from the case cited, cannot divulge the information acquired in the exercise of their functions.

Application and endorsements

The present norms must be accepted and respected in every part by all persons who, even temporarily, use  the computing resources of the Department and those to which it is possible to  connect  remotely, directly or in directly, via the network resources of the Department.

The act  of signing  the module of acceptance of responsibility.  implies the acceptance of  the rules stated above

The lack  of conformity to the  rules presented may lead to the withdrawal of the authorization  for the use of the computing and network resources of  the Department and the suspension of the account.


Modality for the exclusive use of a computing system connected to the departmental network

The exclusive use of computers or notebooks in one's own office, laboratory or group, connected to the departmental network, is subject to authorization of the Director of the Departmentcan and can be authorized with two different modalities:

Pure Client.
The user can access the machine only to use its computational capacity and in order to have access to the departmental network resources .
Full access.
The user is also the administrator of the machine and therefore has full access and full responsibility. A machine can have a single individual responsible.

In both cases the user must sign the module of assumption of responsibility; for each computer connected to the departmental network he is responsible of.

In the modality "full access" the user must also observe the following additional conditions.

The individual responsible for a computer will be notified of any participation by the system administrators.


Italian laws on the  topic


(Thanks to prof. Robert Turner for his kind help in the translation into English)