THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY!
IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Use of
the Quantavox network and facilities constitutes acceptance
of this policy.
The Quantavox team holds the safety, security, and privacy of its
customers, and employees as our paramount concerns in all aspects of our
business. The Quantavox Information Technology (QIT) department
maintains policies about the use and security of its systems in the
interests of protecting its users and ensuring the reliability of
mission critical systems. All users of our facilities are expected to
be familiar with these policies. Violations of QIT policies can lead to
the suspension of computer account(s) pending investigation of
circumstances. Serious violations QIT policy will be referred directly
to the appropriate security personnel and/or outside authorities.
Unauthorized use of the Quantavox computing facilities can
be a criminal offense. The penalties may be as severe as suspension or
termination of employment/services/partenrships with Quantavox
and its subsidiaries and/or criminal prosecution by
appropriate law enforcement agencies.
Access/User Responsibilities:
IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Any user
who finds a possible security lapse on any QIT system is obligated to
report it to QIT. Do not attempt to use the system under these
conditions until the system administrator has investigated and resolved
the problem. The user agrees to remain entirely liable for any and all
activities conducted via the user's account. Each user is responsible
for all matters pertaining to the proper use of their account. This
includes choosing safe passwords, (e.g., passwords that are at least
eight characters long, are not found in any dictionary, and contain a
combination of numbers and letters) and ensuring that file protections
are set correctly (where applicable). The QIT permits access to systems
on the understanding that the information in those systems is
confidential. Each user must take appropriate measure to preserve the
confidentiality of that information. In addition, system and security
administrators conduct regular reviews of file system security and login
names, including password checks. Users found to have easily guessed
passwords may be required to change them the next time they log on.
Users may not share passwords and login accounts. Every user is
provided with an account in his/her own name, accessible with a private
password to access specific computer systems/resources maintained by
QIT. These accounts are to be used solely for the performance of
assigned user/administrator/customer/partner functions within QIT.
Individual QIT login names and/or passwords cannot be transferred to or
used by another individual. It is the responsibility of Departmental
Supervisors to advise QIT when employees leave unexpectedly and/or with
short notice so that the data in their accounts can be
protected/deactivated/deleted. Unauthorized attempts by the user to
gain access to another user's QIT login name and/or password or to gain
privileged access or access to any account, applications, and/or data
not belonging to the user on any QIT system is not permitted. No QIT
system may be used for unethical, illegal, or criminal purposes, or to
damage any part of the QIT network or accounts on QIT network, as well
as other networks or accounts on other networks.
Use of QIT facilities by outside individuals or organizations requires
special permission from QIT and to the appropriate software vendors
where applicable. Use of any Quantavox administrative
system by outside individuals or organizations outside requires explicit
authorization from the Quantavox team and all appropriate data
custodians. Use of QIT systems for commercial uses, except by approved
outside organizations, is strictly prohibited. Such prohibited uses
include, but are not limited to, development of programs, data
processing or computations for commercial use and preparation and
presentation of advertising material. QIT reserves the right to prevent
other Internet users from accessing its network, either in part or in
whole, for any reason deemed detrimental to the QIT network or computer
facilities.
Conduct:
Frivolous, disruptive, or inconsiderate conduct in the computer labs or
terminal areas is not permitted. Users are prohibited from using the
QIT network or computer facilities for the purpose of harassing or
threatening other people. No QIT system may be used for playing
computer games.
Connectivity:
The user is responsible for providing and maintaining the necessary
cabling, hardware and software used for dial-up service at the user's
site. All telephone company installation and recurring charges are the
user's responsibility. It is understood that QIT does not own or
control the telecommunications facilities used to access its network,
except those specifically identified as belonging to QIT. Dial-up
accounts are not to be used for permanent network connectivity or nailed
connections (connections that remain up even though no interactive usage
occurs).
Content:
QIT exercises no control whatsoever over the content of the information
passing through its network. The user can not use the QIT network to
transmit certain kinds of information which violates export control laws
and regulations of the United States, whether that information is
received abroad or by foreign nationals within the United States. Since
QIT exercises no control whatsoever over the content of information
passing through its network, the entire burden of complying with such
laws and regulations rests with the user. The user agrees to comply with
such laws and regulations and to indemnify and hold QIT harmless from
any damages it may suffer resulting from any violation of the export
control laws of the United States. In short, transmission of any
material in violation of any local, state, federal or international
regulation(s) is prohibited. This includes, but is not limited to,
copyrighted material, material legally judged to be threatening or
obscene, or material protected by trade secret. Copying, storing,
displaying, or distributing copyrighted material using Quantavox
systems or networks without the express permission of the
copyright owner, except as otherwise allowed under the copyright law, is
prohibited. Under the Federal Digital Millennium Copyright Act of 1998,
repeat infringements of copyright by a user can result in termination of
the user's access to the Quantavox systems and networks.
Damages:
QIT will not be responsible for any damage the user suffers from use of
QIT network. This includes, but is not limited to, loss of data
resulting from delays or service interruptions caused by QIT's own
negligence, QIT's vendors, other third parties, or the user's errors or
omissions. Use of any information obtained via QIT's network is at the
user's own risk. QIT specifically denies any responsibility for the
accuracy or quality of information obtained through its network. The
user agrees to indemnify and hold harmless QIT from any claims resulting
from the user's use of the service which damages the user or another
party.
Data Integrity/Ownership:
All data archived by QIT for recovery purposes is the property of QIT.
Email:
Electronic mail on all our systems is as private as we can make it.
Attempts to read another person's electronic mail or other protected
files is prohibited and will be treated with the utmost seriousness.
The system administrators will not read mail or non-world-readable files
unless absolutely necessary in the course of their duties, and will
treat the contents of those files as private information at all times.
Undeliverable mail is directed to the system administrators for purposes
of assuring reliable e-mail service. User's cannot use the QIT network
to distribute unsolicited bulk electronic mail (UBE) or inappropriate
commercial postings (spam) to Usenet newsgroups. UBE or spam directing
recipients to a site served by QIT network is prohibited. No QIT system
may be used for sending nuisance messages such as chain letters and
obscene or harassing messages. Users are not allowed to "impersonate"
other users or user groups, real or fabricated, by modifying email
header information in an effort to deceive the recipient(s); i.e., email
spoofing is specifically prohibited. QIT policy prohibits the use of
Quantavox resources to solicit contributions or support for
any charity, except those authorized by the Quantavox team.
Resources:
All users of QIT login names and administrative systems should be aware
that these systems are QIT resources. Many people use the QIT systems
for daily work. Obstructing this work by consuming gratuitously large
amounts of system resources (disk space, CPU time, print quotas) or by
deliberately crashing the machine(s) will not be tolerated. It is the
user's responsibility to comply with this policy by running large jobs
at off-peak hours. At no time may the user consume excessive network
resources, including but not limited to, disk space, RAM, processor
time, network bandwidth, etc., that could cause denial of service to
other users of QIT resources.
All users of QIT login names and administrative systems should be aware
that these systems are QIT resources. Many people use the QIT systems
for daily work. Obstructing this work by consuming gratuitously large
amounts of system resources (disk space, CPU time, print quotas) or by
deliberately crashing the machine(s) will not be tolerated. It is the
user's responsibility to comply with this policy by running large jobs
at off-peak hours. At no time may the user consume excessive network
resources, including but not limited to, disk space, RAM, processor
time, network bandwidth, etc., that could cause denial of service to
other users of QIT resources.
System Monitoring/Legal Action:
All access, access attempts, and use are recorded in various system
logs. System and security administrators review the logs routinely in
the course of their work. Formal security audits including the review
of system logs will occur at least twice yearly, and are subject to
increase in frequency when abnormal and/or suspicious data is discovered
during the course of regular system maintenance and/or monitoring. QIT
facilities and computer systems are for the use of authorized users
only. Individuals using QIT computer systems without authority, or in
excess of their authority, are subject to having all of their activities
on QIT computer systems monitored and recorded by system personnel. In
the course of such monitoring individuals improperly using the QIT
computer systems, or in the course of system maintenance, the activities
of authorized users may also be monitored. Anyone using this QIT
computer systems expressly consents to such monitoring and is advised
that if such monitoring reveals evidence of criminal activity, system
personnel may provide the evidence of such monitoring to law enforcement
officials. QIT reserves the right to cooperate with law enforcement to
the extent permissible by law. QIT's network may only be used for
lawful purposes and in accordance with this policy. This policy may be
modified by QIT at any time. Continued use of QIT's network following
such modifications constitutes acceptance of this policy, as modified.
If any provision of this policy is held by a court of competent
jurisdiction to be contrary to law, the remaining provisions of this
policy will remain in full force and effect. This policy supersedes all
previous representations, understandings, or agreements and shall
prevail not withstanding any variance with terms and conditions of any
order submitted.
IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Use of
the Quantavox network and facilities constitutes acceptance
of this policy.
THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY!
Copyright © Quantavox Consulting. All rights reserved.
Quantavox, quantavox.com, quantavox.net, quantavox.org,
quantavox.biz, quantavox.info, and quantavox.cc are trademarks of Quantavox Consulting.