Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. You shall only use the resources/services to perform work, or transmit or store data consistent with the stated goals, policies and conditions of use as defined by the body or bodies granting you access.
  2. You shall not use the resources/services for any purpose that is unlawful and not (attempt to) breach or circumvent any administrative or security controls.
  3. You shall respect intellectual property and confidentiality agreements.
  4. You shall protect your access credentials (e.g. private keys or passwords).
  5. You shall keep all your registered information correct and up to date.
  6. You shall immediately report any known or suspected security breach or misuse of the resources/services or access credentials to the specified incident reporting locations and to the relevant credential issuing authorities.
  7. You must shall ensure that any reliance you place on the confidentiality, integrity and availability of resources/services is covered by appropriate agreements. Use without such agreements is at your own risk.
  8. You agree that use of your personal data shall be governed by the published privacy policies of the body or bodies granting you access, of the infrastructure and of the resource/service providers.
  9. You agree that the body or bodies granting you access and resource/service providers are entitled to regulate, suspend or terminate your access without prior notice and without compensation, within their domain of authority, and you shall immediately comply with their instructions.
  10. You are liable for the consequences of your violation of any of these conditions of use, which may include but are not limited to the reporting of your violation to your home institute and, if the activities are thought to be illegal, to appropriate law enforcement agencies.

...

 7. You use the resources/services at your own risk. There is no guarantee that the resources/services will be available at any time or that their integrity or confidentiality will be preserved or that they will suit any purpose.

 7. You must shall ensure that any reliance you place on the confidentiality, integrity and availability of resources/services is covered by appropriate agreements. Use without such agreements is at your own risk.

...