[bit.listserv.pacs-l] FARNet, Part III of III

LIBPACS@UHUPVM1.BITNET (PACS Forum) (02/01/90)

From->    kw%network%ucsd.edu@Sdsc.BITnet (Kevin Walsh)

3.0 Definition of Terms

Appropriate use refers to whether the use of the network is
consistent with the guidelines for each network that the
traffic traverses. This applies both to standard applications
(e.g., electronic mail, file transfers, and remote login) and
nonstandard uses (chat, experimental protocols, etc)
Acceptable connection refers to the specific authority and
terms by which a user accesses the network. Issues that are
addressed here include restrictions on access (for security
purposes), resale of connectivity, etc. Acceptable use and
acceptable connection, while related, are separate issues. It
is possible for acceptable connections to be used for
unacceptable use, and for acceptable use to be performed
on an unacceptable connection.


4.0 Acceptable Use Policy

Given both the volatile nature of the technology employed
and the demand that users make of the network,
determining acceptable use is a dynamic and iterative
process. In evaluating whether a particular use of the
network is appropriate, several factors should be
considered:

    Traffic between mid-levels should be restricted to
research or academic purposes, or to direct
administrative support of such efforts. Organizations
whose connection to the internet is sponsored by a
FRICC agency can use the network in support of the
sponsored activities. Traffic whose content is solely
commercial is not acceptable. Malicious use is not
acceptable. Use should be consistent with guiding
ethical statements and accepted community standards.
Use of the internet in a manner that precludes or
significantly hampers the use by others should not be
allowed

Each mid-level network should establish a regional
acceptable use policy that permits, at a minimum, the
transit of any traffic that is acceptable to an attached
national backbone. Mid-level networks may establish
additional  requirements as are appropriate to the regional
mission.

FARnet recommends that each regional accept  traffic
from other regionals if the use was determined to be
acceptable under these guidelines by the originating
network.

Decisions made by mid-level networks or backbone
providers regarding specific instances of acceptable and
unacceptable use should be widely circulated to encourage
consistency. FARnet can and will act as a vehicle for the
distribution and maintenance of such information. Each
mid-level network should designate an individual to
participate in the exchange of this information.

5.0 Acceptable connection

Mid-level networks should insure that the connections
made to them are consistent with the effective use and
protection of a shared resource. The mid-levels should
know what networks are connected and what use is being
made of the network. Mid-level networks should instruct
members on current guidelines for acceptable use. Access
to the internet should be protected through the use of
prudent security measures.  Unauthorized connections to
the internet should not be permitted. "Third party"
connections (such as internet access being provided by
research parks or through resale by a mid-level subscriber)
should be done only with the approval of the mid-level
networks.  Connections which create routing patterns that
are inconsistent with the effective and shared use of the
network should not be established.


6.0 Adjudication

Mid-level networks should distribute this statement to
member institutions and request members to inform their
communities about these issues.

Responsibility for the determination of whether a proposed
use of the network is acceptable begins with the initiating
user. If the user is uncertain, the associated connecting
authority or mid-level should be contacted.

Mid-level networks should consult with backbone
providers and FARnet as needed to determine if an
intended use of a backbone is consistent with the policies
of the provider. The results of these deliberations should
be distributed among the mid-level networks to encourage
consistent policy. FARnet should be active in
implementing this process.

If disagreements arise among mid-level networks
concerning their direct connections, FARnet should
attempt to act as a reconciliatory agent.


7.0 Enforcement

In instances where particular traffic is determined to be an
abuse, the mid-level network that originated the traffic will
be held responsible for both admonishing the perpetrator
and preventing further abuse. It is assumed that the mid-
level network will, in turn, place similar responsibilities
upon its members.

Mid-level networks should make a good faith effort to
enforce the decisions that emerge from the adjudication
process undertaken by FARnet.
(End of Message)