PeachNet

Operations Division

PeachNet Acceptable Use Policy

Important (please read)

Violation of this policy can result in sanctions, disciplinary action or referral to law enforcement.

Complaints regarding E-mail Abuse, Spam or Security Issues?

Contact Abuse@usg.edu

Policy

The 正版bbin平台下载 of Regents governs the University System of Georgia, which includes all state supported institutions of higher education. The University System offers programs and services through three components: instruction, public services, and research. The 正版bbin平台下载 of Regents’ Information Technology Services (ITS) provides networking support through its communications network - PeachNet - for these components. Basic PeachNet? services are provided at no charge to University System units. Requirements over and above these basic services will be charged to the requesting unit. Non-University System entities whose mission and purpose are compatible with that of the University System may contract for PeachNet services based on a fee structure established by Information Technology Services.

PeachNet exists for the dual purpose of transmitting and sharing information among the individual units of the University System and transmitting and sharing information between the units of the University System and external organizations that provide benefit to or derive benefit from any of the University System’s units.

PeachNet users may engage in communications related to University System and contracting entity programs and services. Commercial traffic related to the operation of the University System-or any other educational entity-with a commercial entity is acceptable. Commercial traffic is acceptable on a commodity network when in direct support of research and instruction. Other networks may have special usage policies, which may be obtained from those network providers.

PeachNet must adhere to its contractual obligations and to the acceptable use policies of their Internet service providers in order to maintain Internet connectivity. Therefore, individual PeachNet sites may be subject to loss of service if violations of acceptable use are not addressed promptly.

The ITS does not own or control all of the various facilities and communications lines through which network access is provided. Every effort is made to ensure continuous service among PeachNet locations. Connections to outside networks, however, are subject to interruption beyond control of the ITS, and provisions should be made for a backup connection when relying on the Internet for services. PeachNet reserves the right to shut down the system in the event of network attack.

Illegal use

PeachNet users must obey federal and state law and the policies of the University System (正版bbin平台下载 of Regents) and the regulations of the nationwide and worldwide networks to which its computers are connected. PeachNet may be used only for lawful purposes. Transmission, distribution, or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

System and network security

Violations of system or network security are prohibited, and may result in criminal and civil liability. PeachNet can investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Such investigations may require the examination of electronic information stored on or passing over PeachNet. Examples of system or network security violations include, without limitation, the following:

  • Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach or circumvent the security or authentication measures without express authorization of the owner of the system or network.
  • Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
  • Interference with service to any user, host, or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
  • Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.

Email

Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site’s mail server to relay mail without the express permission of the site.