LIBPACS@UHUPVM1.BITNET (PACS Forum) (02/01/90)
From-> kw%network%ucsd.edu@Sdsc.BITnet (Kevin Walsh) 3.0 Definition of Terms Appropriate use refers to whether the use of the network is consistent with the guidelines for each network that the traffic traverses. This applies both to standard applications (e.g., electronic mail, file transfers, and remote login) and nonstandard uses (chat, experimental protocols, etc) Acceptable connection refers to the specific authority and terms by which a user accesses the network. Issues that are addressed here include restrictions on access (for security purposes), resale of connectivity, etc. Acceptable use and acceptable connection, while related, are separate issues. It is possible for acceptable connections to be used for unacceptable use, and for acceptable use to be performed on an unacceptable connection. 4.0 Acceptable Use Policy Given both the volatile nature of the technology employed and the demand that users make of the network, determining acceptable use is a dynamic and iterative process. In evaluating whether a particular use of the network is appropriate, several factors should be considered: Traffic between mid-levels should be restricted to research or academic purposes, or to direct administrative support of such efforts. Organizations whose connection to the internet is sponsored by a FRICC agency can use the network in support of the sponsored activities. Traffic whose content is solely commercial is not acceptable. Malicious use is not acceptable. Use should be consistent with guiding ethical statements and accepted community standards. Use of the internet in a manner that precludes or significantly hampers the use by others should not be allowed Each mid-level network should establish a regional acceptable use policy that permits, at a minimum, the transit of any traffic that is acceptable to an attached national backbone. Mid-level networks may establish additional requirements as are appropriate to the regional mission. FARnet recommends that each regional accept traffic from other regionals if the use was determined to be acceptable under these guidelines by the originating network. Decisions made by mid-level networks or backbone providers regarding specific instances of acceptable and unacceptable use should be widely circulated to encourage consistency. FARnet can and will act as a vehicle for the distribution and maintenance of such information. Each mid-level network should designate an individual to participate in the exchange of this information. 5.0 Acceptable connection Mid-level networks should insure that the connections made to them are consistent with the effective use and protection of a shared resource. The mid-levels should know what networks are connected and what use is being made of the network. Mid-level networks should instruct members on current guidelines for acceptable use. Access to the internet should be protected through the use of prudent security measures. Unauthorized connections to the internet should not be permitted. "Third party" connections (such as internet access being provided by research parks or through resale by a mid-level subscriber) should be done only with the approval of the mid-level networks. Connections which create routing patterns that are inconsistent with the effective and shared use of the network should not be established. 6.0 Adjudication Mid-level networks should distribute this statement to member institutions and request members to inform their communities about these issues. Responsibility for the determination of whether a proposed use of the network is acceptable begins with the initiating user. If the user is uncertain, the associated connecting authority or mid-level should be contacted. Mid-level networks should consult with backbone providers and FARnet as needed to determine if an intended use of a backbone is consistent with the policies of the provider. The results of these deliberations should be distributed among the mid-level networks to encourage consistent policy. FARnet should be active in implementing this process. If disagreements arise among mid-level networks concerning their direct connections, FARnet should attempt to act as a reconciliatory agent. 7.0 Enforcement In instances where particular traffic is determined to be an abuse, the mid-level network that originated the traffic will be held responsible for both admonishing the perpetrator and preventing further abuse. It is assumed that the mid- level network will, in turn, place similar responsibilities upon its members. Mid-level networks should make a good faith effort to enforce the decisions that emerge from the adjudication process undertaken by FARnet. (End of Message)