Difference between revisions of "Acceptable Use Policy"

From FreekiWiki
Jump to navigation Jump to search
m
Line 1: Line 1:
An '''acceptable use policy''' (AUP) is a policy that allows us to define, by behaviour, what kinds of activities we do and do not allow on our network. For instance, we could say that sending a threatening email is in violation of our acceptable use policy. The if someone sends a threatening email, we could take appropriate action -- for instance banning the sender for some amount of time. Having a properly worded AUP might make it easier to define when to take action (and what action to take) when someone is abusing our email lists, wiki, etc.  
+
While Free Geek works to encourage creativity and free speech within our walls and on our networks, we also understand that, in order to keep a communications system that's safe and comfortable to use, and therefore encourages community, we need guidelines concerning the acceptable use of our networks.
  
In developing an AUP, we don't want to squelch creativity or free speech, but we want to keep our communications structure intact, so there's an art to creating a good AUP.
+
The following behaviors are not acceptable, and will warrant disciplinary measures:
  
A quick [http://www.google.com/search?hl=en&q=acceptable+use+policy&btnG=Google+Search google search] shows that there are a lot of AUPs out there, and some thought on how they should be constructed.
+
* People browsing porn sites (and/or printing them)
 +
* Flaming or threatening emails to staff, volunteers, or our lists
 +
* People using our computers to deface web sites (i.e. wikipedia)
 +
* Sending spam and/or threats to FG email accounts (that happen to be lists)
 +
* Illegal activities
 +
* Breaking into our network or others' networks with malicious intent
  
So start the conversation: What does Free Geek want in an acceptable use policy?
 
  
One approach would be to give a general guideline, such as "Don't do anything which threatens Free Geek's ability to carry out its mission." and then give examples (e.g. writing and distributing viruses) but the general guideline being the rule.  Another would be to spell things out precisely.
+
==Procedure==
 +
If a person has violated the above policy, we will take appropriate actions, including, but not limited to:
 +
 
 +
* Perpetrators of illegal activities will be turned over to the appropriate officials
 +
* Our [[Volunteer Discipline Policy]] will be used as a guide
 +
* Email moderation will be used as needed, as will expulsion from email lists
 +
 
 +
 
 +
If an offense isn't very serious or extreme, we will work to talk to the offender about the Acceptable Use Policy, what is and isn't allowed and why.
 +
 
  
==Links==
 
These are from a simple google search. A little more research might find more appropriate material, but this is a start.
 
* AUP examples and templates:
 
** http://www.itrc.ucf.edu/WORKSHOPS/Telecom2/AUP_template.html
 
** http://www.mccsc.edu/agreemnt.html
 
** http://www.securitysoft.com/aup_example1.html
 
** http://www.securitysoft.com/aup_example2.html
 
**
 
* Suggestions:
 
** http://safety.ngfl.gov.uk/ukonline/document.php3?D=d6
 
** http://www.securitydocs.com/library/2994
 
  
 
[[Category: policy]]
 
[[Category: policy]]
 +
[[Category: Procedure]]

Revision as of 13:39, 11 November 2005

While Free Geek works to encourage creativity and free speech within our walls and on our networks, we also understand that, in order to keep a communications system that's safe and comfortable to use, and therefore encourages community, we need guidelines concerning the acceptable use of our networks.

The following behaviors are not acceptable, and will warrant disciplinary measures:

  • People browsing porn sites (and/or printing them)
  • Flaming or threatening emails to staff, volunteers, or our lists
  • People using our computers to deface web sites (i.e. wikipedia)
  • Sending spam and/or threats to FG email accounts (that happen to be lists)
  • Illegal activities
  • Breaking into our network or others' networks with malicious intent


Procedure

If a person has violated the above policy, we will take appropriate actions, including, but not limited to:

  • Perpetrators of illegal activities will be turned over to the appropriate officials
  • Our Volunteer Discipline Policy will be used as a guide
  • Email moderation will be used as needed, as will expulsion from email lists


If an offense isn't very serious or extreme, we will work to talk to the offender about the Acceptable Use Policy, what is and isn't allowed and why.