Computing resources are defined to be the computing facilities of the Department and the remote ones, available directly or indirectly from the departmental network (dm.unipi.it or 131.114.6).
Network resources are defined to be the set of services supplied locally or remotely -via Internet- servers , regarding various information: Web, electronic mail, etc.
The technicians of the Computing Center are defined to be system administrators: they have the responsibility to install and to manage the computing systems of the departmental network to guarantee the best possible operation.
The use of the computing and network resources of the Department and the connection of a new computer to the departmental network are subject to authorization of the Director of the Computing Center , with a delegation from the Director of the Department.
The authorizations are strictly individual and not transferable. Such authorizations have an expiration date and terminate with cessation of the activity that justified them or upon the expiration date in the absence of a renewal.
The use of the computing and network resources is authorized exclusively for aims relating to the professional activity of the users; in particular, for research activity, instruction, study, technological developments, scientific, technical and cultural information , experimentation with new services having an innovation character , for administrative services, and for management that comes with such activities.
Moreover,the Department will be able to establish restrictions for access specific to its own organization (identification or access documents, filters for access from the outside, etc).
Every user must contribute to the total security of the system. In particular, every user:
Every user is responsible for the correct use of the computing and network resources avalaible to him.The use of the resources must be rational and legal, and must avoid saturation or improper use of the resources. In particular the individual user:
Moreover, every user is responsible for the correct use of the avalaible resources and for contributing to the proper working of the system. In particular, he commits himself:
The use of the computing resources outside of the previous rules, when necessary, should be agreed upon with the system administrators.
The computing and network resources, managed by the system administrators , are dedicated to research and to scientific computation and therefore are not configured so as to offer standards of security appropriate to the treatment of particularly confidential data.
With the exception of explicitly public or shared documents, access to the information and documents on the computing systems must be limited to those belonging to the individual user. This rule obviously applies also to private communications such as electronic mail, in the case in which the user is not the adressee either directly or via copy.
The violation of privacy constitutes a penal crime.
Moreover the law does not allow the installation and use of commercial programs without a licence for use.
The programs installed on the departmental computers must be used respecting the terms of the use licences.
For the use of programs in the public domain and for the reproduction of all the source material (books, articles, images, sounds), it is necessary to follow the author's copyrights.
The violation of the copyrights constitutes a penal crime.
The user commits himself not to voluntarily interfere with the proper working of the computing and network systems . In particular:
The user can use the network services exclusively for activities for which authorization has been granted and in respect of the general principles, of the rules that the sites propose, and of the legislation in vigor.
In particular:
The system administrators have all powers needed in order to monitor the correct use of the departmental computer science system; to such end, they can analyze without warning the data on the public computing resources and the data exchanges via network. The system administrators can, moreover, consult system logs and register extracts.
In case of hacker attacks or in those cases in which the proper working and security of the system demand it, the system administrators will be able to investigate the user's documents and, in case of an infraction, to transmit the results to the Director of the Department and to the director of the computing center.
The system administrators, apart from the case cited, cannot divulge the information acquired in the exercise of their functions.
The present norms must be accepted and respected in every part by all persons who, even temporarily, use the computing resources of the Department and those to which it is possible to connect remotely, directly or in directly, via the network resources of the Department.
The act of signing the module of acceptance of responsibility. implies the acceptance of the rules stated above
The lack of conformity to the rules presented may lead to the withdrawal of the authorization for the use of the computing and network resources of the Department and the suspension of the account.
The exclusive use of computers or notebooks in one's own office, laboratory or group, connected to the departmental network, is subject to authorization of the Director of the Departmentcan and can be authorized with two different modalities:
In both cases the user must sign the module of assumption of responsibility; for each computer connected to the departmental network he is responsible of.
In the modality "full access" the user must also observe the following additional conditions.
The individual responsible for a computer will be notified of any participation by the system administrators.
(Thanks to prof. Robert Turner for his kind help in the translation into English)