Agreement
By logging on to the network you are
agreeing to the terms and conditions of the acceptable use policy below.
Your Responsibilities
Accenture provides wireless access
to the internet as a courtesy to visitors and guests. Such open access is a
privilege, and requires that individuals act responsibly. Use of the internet
by guests working at Accenture’s premises is permitted where such use supports
the goals and objectives of your business relationship with Accenture.
However, all the users of this service need to comply with the following terms
of use.
1. You agree to comply with all laws and regulations applicable to your use,
such as laws regarding data privacy and telecommunication provider services.
2. You agree that for security and network maintenance purposes, authorized
individuals within our organization may monitor equipment, systems and network
traffic at any time, per Accenture's Audit Policy. By using the services the
user agrees with the collection, use and storage of logs showing activity of
the users in the internet.
3. Accenture recommends that any information that users consider sensitive or
vulnerable be encrypted.
4. You agree that Accenture may audit your use of our networks and systems on a
periodic basis to ensure compliance with this policy.
Unacceptable Use
You agree not to do any of the
following:
·
Introduction of any form of
malicious software into the network or server (e.g., viruses, worms, Trojan
horses, e-mail bombs, etc.).
·
Revealing confidential information
including your account password to others or allowing use of your account by
others; Circumventing user authentication or security of any host, network or
account.
·
Sending unsolicited email messages,
including the sending of "junk mail" or other advertising material to
individuals who did not specifically request such material (email spam);
sending any form of harassment via email, telephone or paging, whether through
language, frequency, or size of messages.
·
Visiting internet sites that contain
obscene, hateful, pornographic or otherwise illegal material.
·
Port scanning or security scanning,
executing any form of network monitoring that will intercept data not intended
for the guest's host. Using the computer to perpetrate any form of fraud, or
software, film or music piracy.
·
Downloading commercial software or
any copyrighted materials belonging to third parties, unless such download is
expressly permitted under a commercial agreement or other such license that you
can document.
·
Attempts to gain unauthorized access
to any information facility, whether successful or not. This includes running
programs that attempt to calculate or guess passwords, or that are designed and
crafted to trick other users into disclosing their passwords. It also includes
electronic eavesdropping on communications facilities.
·
Downloading unauthorized software.
·
Any violation of state law as
described in the Penal Code.
·
Any action that invades the privacy
of individuals or entities that are the creators, authors, users or subjects of
information resources.
·
Misrepresenting in any manner, your
identity, your account or a computer in an email or other electronic
communication.
·
Sending chain letters,
advertisements or solicitations of any type.
·
Sending mass mailings to individuals
who have not expressly agreed to be contacted in this manner.
·
Posting on electronic bulletin
boards materials that violate existing laws or the Accenture's codes of
conduct.
·
Using network resources to gain
unauthorized access to any computer systems.
·
Knowingly performing an act that
will interfere with the normal operation of computers, terminals, peripherals
or networks.
·
Attempting to circumvent data
protection schemes or uncover security loop holes.
·
Attempting to monitor or tamper with
another user's electronic communications, or reading, copying, changing or
deleting another user's files or software without the explicit agreement of the
owner.
By logging onto the service the user
confirms compliance with the rules above and expresses the consent to gathering
logs of his activity in use of the internet service, including gathering
personal data.
Consequences of Misuse
Misuse of computing, networking or information resources may
result in the loss of computing privileges. Depending on the severity of misuse
of the network may require financial restitution to Accenture for funds
expended and could result in disciplinary action or civil or criminal action.
Users may be held accountable for their conduct under any
applicable Accenture policies or procedures. Any actions which deter other
users from doing their work or which would otherwise be deemed malicious by IT
Services will result in the loss of access to the system and possible
disciplinary action or civil or criminal action.
Both unauthorized use of the computer and use for personal gain
may constitute theft under certain laws and may be prosecuted by Accenture.
Furthermore, entering Accenture’s facilities with the intent, by whatever
means, of discovering another's account number for purposes of identity theft or
stealing Accenture’s physical or intellectual property may constitute burglary
under certain laws and will be prosecuted.
Complaints alleging misuse of IT Services resources will
be directed to those responsible for taking appropriate disciplinary action.
Activities
will not be considered misuse when authorized by appropriate Accenture
officials for security or performance testing.