Agreement

By logging on to the network you are agreeing to the terms and conditions of the acceptable use policy below.

Your Responsibilities

Accenture provides wireless access to the internet as a courtesy to visitors and guests. Such open access is a privilege, and requires that individuals act responsibly. Use of the internet by guests working at Accenture’s premises is permitted where such use supports the goals and objectives of your business relationship with Accenture.
However, all the users of this service need to comply with the following terms of use.
1. You agree to comply with all laws and regulations applicable to your use, such as laws regarding data privacy and telecommunication provider services.
2. You agree that for security and network maintenance purposes, authorized individuals within our organization may monitor equipment, systems and network traffic at any time, per Accenture's Audit Policy. By using the services the user agrees with the collection, use and storage of logs showing activity of the users in the internet.
3. Accenture recommends that any information that users consider sensitive or vulnerable be encrypted.
4. You agree that Accenture may audit your use of our networks and systems on a periodic basis to ensure compliance with this policy.

Unacceptable Use

You agree not to do any of the following:

·         Introduction of any form of malicious software into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.).

·         Revealing confidential information including your account password to others or allowing use of your account by others; Circumventing user authentication or security of any host, network or account.

·         Sending unsolicited email messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material (email spam); sending any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages.

·         Visiting internet sites that contain obscene, hateful, pornographic or otherwise illegal material.

·         Port scanning or security scanning, executing any form of network monitoring that will intercept data not intended for the guest's host. Using the computer to perpetrate any form of fraud, or software, film or music piracy.

·         Downloading commercial software or any copyrighted materials belonging to third parties, unless such download is expressly permitted under a commercial agreement or other such license that you can document.

·         Attempts to gain unauthorized access to any information facility, whether successful or not. This includes running programs that attempt to calculate or guess passwords, or that are designed and crafted to trick other users into disclosing their passwords. It also includes electronic eavesdropping on communications facilities.

·         Downloading unauthorized software.

·         Any violation of state law as described in the Penal Code.

·         Any action that invades the privacy of individuals or entities that are the creators, authors, users or subjects of information resources.

·         Misrepresenting in any manner, your identity, your account or a computer in an email or other electronic communication.

·         Sending chain letters, advertisements or solicitations of any type.

·         Sending mass mailings to individuals who have not expressly agreed to be contacted in this manner.

·         Posting on electronic bulletin boards materials that violate existing laws or the Accenture's codes of conduct.

·         Using network resources to gain unauthorized access to any computer systems.

·         Knowingly performing an act that will interfere with the normal operation of computers, terminals, peripherals or networks.

·         Attempting to circumvent data protection schemes or uncover security loop holes.

·         Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing or deleting another user's files or software without the explicit agreement of the owner.

By logging onto the service the user confirms compliance with the rules above and expresses the consent to gathering logs of his activity in use of the internet service, including gathering personal data.

Consequences of Misuse

Misuse of computing, networking or information resources may result in the loss of computing privileges. Depending on the severity of misuse of the network may require financial restitution to Accenture for funds expended and could result in disciplinary action or civil or criminal action.

Users may be held accountable for their conduct under any applicable Accenture policies or procedures. Any actions which deter other users from doing their work or which would otherwise be deemed malicious by IT Services will result in the loss of access to the system and possible disciplinary action or civil or criminal action.

Both unauthorized use of the computer and use for personal gain may constitute theft under certain laws and may be prosecuted by Accenture. Furthermore, entering Accenture’s facilities with the intent, by whatever means, of discovering another's account number for purposes of identity theft or stealing Accenture’s physical or intellectual property may constitute burglary under certain laws and will be prosecuted.

Complaints alleging misuse of IT Services resources will be directed to those responsible for taking appropriate disciplinary action.

Activities will not be considered misuse when authorized by appropriate Accenture officials for security or performance testing.