My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
R2022-224 Resolution Authorizing a Memorandum of Understanding Agreement and Associated Sales Order with ICAT Training Foundation to obtain Internet Access through the City of Decatur Fiber Network
COD
>
City Clerk
>
RESOLUTIONS
>
2022
>
R2022-224 Resolution Authorizing a Memorandum of Understanding Agreement and Associated Sales Order with ICAT Training Foundation to obtain Internet Access through the City of Decatur Fiber Network
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/22/2022 10:18:16 AM
Creation date
12/22/2022 10:18:15 AM
Metadata
Fields
Template:
Resolution/Ordinance
Res Ord Num
R2022-224
Res Ord Title
R2022-224 Resolution Authorizing a Memorandum of Understanding Agreement and Associated Sales Order with ICAT Training Foundation to obtain Internet Access through the City of Decatur Fiber Network
Department
Information Tech
Approved Date
12/19/2022
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
15
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
EXHIBIT A <br /> Acceptable Use Policy <br /> Definitions <br /> 1. Email "bombing" is characterized by abusers repeatedly sending an identical email message to a <br /> particular address. <br /> 2. Email "spamming" is a variant of bombing; it refers to sending email to hundreds or thousands of <br /> users(or to lists that expand to that many users). It may also occur innocently, as a result of sending a <br /> message to mailing lists and not realizing that the list explodes to thousands of users,or as a result of an <br /> incorrectly setup responder message. <br /> 3. "Flooding" occurs when a target machine is flooded with TCP connection requests.The target system <br /> host becomes extremely slow, crashes or hangs. Broadcast or"smurf" attacks causes network links to <br /> become overloaded.The "smurf" attack sends a constant stream of echo requests"pings"to the <br /> broadcast address of a subnet. <br /> Acceptable Use Policy <br /> This Acceptable Use Policy(hereafter referred to as'AUP') specifies certain actions prohibited by the <br /> CITY for users of the City Fiber Network. The CITY reserves the right to modify this Policy at any time to <br /> stay in compliance with all known laws, regulations, policies, and security requirements that may be <br /> established by appropriate legislative or regulatory authorities or enacted by CITY management or Legal <br /> Counsel. Customer unconditionally accepts the terms of this policy. <br /> Authorized Use <br /> CITY Fiber services are for the use of authorized users only and are subject to routine network <br /> monitoring by CITY staff to audit network security and performance. The city reserves the right to deny <br /> IP addresses or revoke IP addresses and/or deny service to any Customer violating the AUP. <br /> Illegal Use <br /> The CITY Fiber may be used only for lawful purposes.Transmission, distribution or storage of any <br /> material in violation of any applicable law or regulation coming through the City Fiber Network is <br /> prohibited. Illegal use includes, but is not limited to, material protected by copyright,trademark,trade <br /> secret or other intellectual property rights which is being used without proper authorization; <br /> government and military data protected by law and applicable national security policies and concerns; <br /> Customer data protected by public policy;and material that, in the CITY's sole discretion, is obscene, <br /> defamatory, constitutes an illegal threat,or violates export control laws or any other laws or applicable <br /> regulations,or any use which compromises the integrity of the City Fiber Network or any other network <br /> connected to the City Fiber Network. <br /> System and Network Security <br /> Violations of system or network security are prohibited, and may result in criminal and/or civil liability. <br /> Customer use of CITY Fiber Network constitutes consent to the CITY's routine network monitoring. <br /> Should any violations of the law or this AUP be discovered during monitoring,the CITY will involve and <br /> cooperate with local, Illinois, and Federal law enforcement authorities for resolution. Examples of <br /> unlawful acts and system or network security violations include, but are not limited to,the following: <br /> 1. Unauthorized access to or use of data, systems or networks, including any attempt to probe,damage, <br /> scan or test the vulnerability of a system or network or to breach security or authentication measures <br />
The URL can be used to link to this page
Your browser does not support the video tag.