Acceptable use Policy and Code of Ethics for SUNET

This Acceptable Use Policy and Code of Ethics were approved by the Board of Directors of SUNET on May 25, 2010.

Acceptable use

SUNET wants the network usage to be as open as possible.
The following rules apply:
1. Usage contrary to the Code of Ethics for SUNET is not acceptable.
2. The network of SUNET may be used for business activities.
3. A SUNET affiliated organization must ensure that adequate systems exist for the identification of network users and connected devices.
4. Resale or providing network capacity or information space on the network to other organizations is generally not allowed. (Network capacity can be provided to other organizations with SUNET's explicit approval in the event an approved organization connects via a university with the university's consent).
5. These rules can be supplemented if it is found that some usage creates issues for universities, while not directly contradicting the rules above. In that case the SUNET Board has the option to revise the rules.

An organization connected to SUNET can issue its own rules for its students and employees that go beyond SUNET's rules with regard to certain usage. SUNET rules apply to all users, and may not be waived by a connected organization, though a connected organization can have additional rules for its own users.

Code of Ethics

A generally accepted principle within the academic community is to keep the network as open as possible.

To achieve this, certain ethical demands must be applied to individuals who use the networks and on their activities. These ethical requirements do not differ much from other rules placed on citizens in a modern society.

SUNET considers it as unethical when someone:

1. Tries to access network resources or other IT resources without having the right to do that
2. Attempts to interfere with or disrupt the intended use of the network or connected IT resources
3. Attempts to damage or destroy computer based information
4. Clearly misuses available resources (personnel, hardware, software)
5. Infringes personal privacy
6. Tries to insult or offend others     

NOTE WELL - This is a historical archive. Contents is no longer being maintained.