Terms and Conditions
TERMS AND CONDITIONS FOR USING THE WEB SITE
Revised March 7, 2017
By using this Web Site of the Center for Educational Resources and Laboratory for Advanced Studies, abbreviated as CERLAS Institute (herein below "CERLAS or the Institute), you have agreed to all the terms and conditioned laid out herein below. You further have agreed to abide by all the requirement provided below when accessing any information at CERLAS Institute, or being engaged at the Institute, whether in research or administrative capacity.
Any user of the Institute's information, information technology resources, or other resources (hereinafter the Resources) is expected to and by virtue of using any such Resources had agreed to comply with all the terms and conditions of the Institute and by continuing to access any such Resources on the web site of the Institute, doing work or other activity related to the Institute, or on its behalf, further agrees to the following terms and conditions.
The policies and guidelines provided herein apply to all electronic resources at the Center for Educational Resources and Laboratory for Advanced Studies, whether, in hard copy, electronic resources at the CERLAS Institute, or by oral communication, (hereinafter the Resources) with any member of the CERLAS Institute. These Resources consist of computer systems and other computer peripherals that are attached to and use CERLAS Resources, its computer networks and the various software applications that they support, such as electronic mail, access to the Internet, word processing and data storage, as well as any hardcopy material, or oral communication. These Resources are the property of CERLAS, access to these Resources is provided as both a courtesy and privilege and is subject to CERLAS policies as well as local, state, Federal and international laws and regulations. In order for these Resources to operate at a reasonable and dependable service, as well as safeguarding the intellectual property of the Institute, it is essential that every user exercises responsible and ethical behavior when using any of these Resources. Misuse, whether, intentional or otherwise, by even a single user, has the potential of disrupting the academic and /or research work of the members of the Institute, CERLAS' business, as well as any visiting scholars, researcher or person conducting administrative or audit work at CERLAS.
The policies and guidelines regarding the Institute's Resources are not limited to, a few general rules and the principles behind them and therefore cover a wider scope, encompassing other potential occurrences having the spirit of the foregoing.
Regardless of where any user is located or how he, she or they may be connecting to CERLAS' Resources, all users are expected to utilize said Resources in an ethical, respectful and responsible fashion. All users making use of any of CERLAS' Resources are governed by CERLAS policies and guidelines, as well as all local, State, Federal and international laws. Said policies and guidelines outlined herein are applicable to the following:
• All users affiliated with, or communicating with or through the Institute including, but not limited to, all the Institute's trustees, board of directors, advisory board, faculty where appropriate, research members, administrative personnel, external auditing individuals, visitors, guests, vendors and other staff not mentioned in the instant particular list, fall under said policies and guidelines. Partners or spouses and other family members, or associated family members are entitled to use the Institute's information and / or Resources, as long as the official Institute's user they are affiliated with agrees to be responsible for their compliance with the policies and guidelines outlined in this document and as such has accepted the responsibility thereof.
• All centrally administered computer networking systems and departmental computer systems, including all methods and mediums used for accessing them.
• All electronic data transmitted across CERLAS' computer network regardless of the location or electronic computing system in which it resides or the format in which it is used.
• All electronic data transmitted to and from CERLAS' computer network regardless of the location or electronic computing system in which it resides or the format in which it is used.
• All aspects of the Resource security including, but not limited to, accidental or unauthorized destruction, unauthorized disclosure, misuse, or modification of or access to CERLAS' Resources. In addition to or in lieu of the above:
o Use of Resources that are entrusted to CERLAS by other institutions, organizations or individuals (e.g, foundations, government agencies, libraries, or commercial entities, or individuals) is governed by the terms and conditions agreed upon with those institutions, organizations, entities, or individuals.
o Use of all copyrighted data, software, and materials is governed by the terms and conditions of the copyright.
o Use of all external resources accessed via CERLAS' Resources is subject to the usage guidelines established by those external resources.
o Use of CERLAS' Resources is subject to all other applicable CERLAS Resources and policies (i.e., changes of any kind, supplemental policies specific to any computing device usage in specific programs and/or departments and any written Employee or associate directive, as well as all local, state, Federal and international laws and regulations. CERLAS does not accepts now and will not accept in the future any responsibility or liability for the specific acts of any individual, institutional or entity user, whether singular, plural, or group that violate any policy or guideline outlined in this document.
CERLAS makes Resources available to its users for scholarly, and administrative purposes. Appropriate use of such Resources should always be professional, ethical, reflect academic honesty and adhere to copyright laws. Further, appropriate use of CERLAS' Resources applies to, but is not limited also to Independent study and research; Official work of the offices, programs and departments of CERLAS; any other activity that is not prohibited by the policies outlined in this document or any supplemental program or departmental Resource policies.
The unauthorized use of CERLAS' Resources is prohibited and, in some cases, may be a violation of a local, state, federal or international laws and regulations. Inappropriate use of CERLAS' Resources includes, but is not limited to all Internet connectivity for computers on campus of CERLAS, in housing that is provided by or paid by CERLAS, or other independent and not related residences, wherein contracting for private Internet connectivity (including any hardware equipment known in the art for such use), connecting to the Institute's Resources, without prior authorization is strictly prohibited. Further, activities that are unauthorized, include but are not limited to activities where use is made of the Institute's Resources for any commercial purposes, as well as Making any fraudulent offer to sell or buy products, items, or services or to advance any type of financial project, whether real or scam for the purpose of financial gain; as well as lending or providing the Institute's name to support any commercial product, service or project, without prior written authorization by the Institute.
Further, user should be careful that the system is not utilized by them or any third party for transmitting any defamatory, threatening, obscene, or harassing materials or messages of any sort about any person or entity. Users should be careful that they are not directly or inadvertently implicate the Institution in any electronic posting not authorized by the Institution, and do not Interfere or impair any activities of others, such as (1) Interfering with or disrupting network users, services and/or equipment. Such disruptions include, but are not limited to, distribution of unsolicited e-mail advertising, initiating or facilitating in any way mass unsolicited email messages , propagation of computer worms and / or viruses, deliberately causing any denial of service, attacks and using CERLAS computer networks , or implicate CERLAS in making any unauthorized entry to any other computer system from a non CERLAS computer networks or system; and (2) Using computer systems in any way that compromises the performance, security or integrity of CERLAS' Resources or other computers on the Internet.
The Institute prohibits unauthorized access and use of the resources of others. Namely, (1) Using CERLAS' Resources to gain unauthorized access to Resources of CERLAS or other institutions, organizations, commercial entity, governmental facility, or individuals; (2) Using any means to decode or otherwise obtain passwords, whether restricted or otherwise or access control information; (3) Attempting to spoof an IP or MAC address; (4) Attempting to circumvent or subvert system or network security measures. This includes, but is not limited to, decrypting data, whether intentionally secure data, or otherwise and deliberately searching or looking for security loopholes or vulnerabilities without first being granted proper authorization beforehand; (5) Transporting information and / or technology resources without prior authorization; (6) Attempting to impersonate any person by using forged headers or other identifying information in an effort to deceive or mislead; (7) Using network ``sniffer'' applications on CERLAS' computer network; Providing network services to any other users computer outside your household or at the location you exercise access to CERLAS Resources; (8) Authorizing another person or organization to use an CERLAS supplied user account or computer, unless so authorized by a proper court order of relevant jurisdiction. All CERLAS users are responsible for all use of their accounts. Users must take all reasonable precautions, including password maintenance and file protection measures, to prevent unauthorized use of their user account; (9) Installing any system or software on CERLAS owned equipment without prior approval; (10) Transmitting personal statements in a manner that may be mistaken as the position of CERLAS unless such statements were previously authorized.
The Institute specifically forbids making any unauthorized modifications making unauthorized modifications to (1) CERLAS data; (2) Installing any software systems or hardware that will install a virus, Trojan horse, worm or any other destructive mechanism; (3) Defacing any web page or website that is hosted on any CERLAS computer system; (4) violating any of CERLAS policies, and / or any local, state, Federal or international laws; (5) transmitting any electronic data that, intentionally or unintentionally, violates any applicable local, state, federal or international law; (6) violating any laws or participating in the commission or furtherance of any crime or other unlawful or improper activity or purpose (7) making unauthorized copies of copyrighted materials. Copyrighted materials include, but are not limited to, computer software, audio and video recordings, photographs, and written or printed material. Copying or downloading copyrighted materials without the prior authorization of the copyright owner is against the law, and may result in civil and criminal penalties, including fines and imprisonment; (8) transmitting any material that infringes any copyright, trademark, patent, trade secret, or other proprietary rights, whether consisting of intellectual property or otherwise of any third party.
CERLAS reserves the right to protect its information technology resources and all other Resources from threats of immediate or future harm. Potential actions that may be taken include activities such as disconnecting an offending computer system from the computer network, disabling a user account, terminating a remote computing session, terminating a job running on a computer system, or taking other appropriate actions. These actions will remain in effect until the situation is corrected.
CERLAS reserves the right to investigate unauthorized or improper use of CERLAS resources. All illegal activities will be reported to local, state or federal authorities, as appropriate, for further investigation and possible prosecution.
CERLAS may take the following sanctions for inappropriate use of any person suspected of violating any portion of CERLAS policy, which may result for such violation in disciplinary actions. CERLAS will take one or more of the following actions, which may include but are not limited to (1) verbal or written warnings; (2) suspending or terminating the user's account; (3) disciplinary probation; (4) bill the user for any charges related to correcting and/or repairing any damaged information technology resources or other Resources; (5) initiate legal procedure or action against the violator.
CERLAS provides members of the Institute's community with access to numerous electronic resources under contract or license. Use of the CERLAS' computer and network resources to copy and/or transmit any software programs, documents or other information protected by copyright laws may be prohibited by local, state, Federal or international law. Special rules apply to the export of computer software outside the United Sates. If permission to copy and/or export an electronic resource is unclear, contact a CERLAS computer manager for advice.
All electronic data stored on CERLAS' computer network including, but not limited to, e-mail messages and electronic files, are considered the property of CERLAS. As such, CERLAS reserves the right to access, inspect, and monitor the usage of any and all of its information technology resources, in compliance with the intellectual rights policies.
Each computing support department provides its users with network storage space for storing their electronic files, while they are at the CERLAS facility. These network storage spaces are backed up regularly by each of the computing support departments, according to the policy of the specific department. CERLAS will not be held responsible for any lost data.
The use of networked computers, either owned by the CERLAS or the user, encourages free exchange of information but also requires the respect for privacy rights and intellectual property law.
Any and all users who connect their personal computers to the CERLAS' computer network and gaining access to the Internet, do so acknowledge and/or agreeing to the following: (1) the user agrees to register their name and the hardware address of their personal computer system with the CERLAS' computer support departments; the user is strongly advised to install a current virus protection program and keep the virus definition files up to date; (2) the user agrees to install the latest critical and security updates on their computer systems; (3) the user may receive or be exposed to material that they consider to be improper, inaccurate, misleading, defamatory, obscene or otherwise offensive, or illegal. These users agree that the CERLAS will not have any obligation to take action with respect to such material that they may receive or be exposed to through their connection to the CERLAS' computer network, and agree to report any illegal activity; (4) CERLAS will not be held responsible for harm caused to the user's personal computer equipment by connecting it to the CERLAS' computer network and the Internet. These users will be responsible for taking all the appropriate measures to safeguard their personal computer equipment from events including, but not limited to, incidences of lightning, voltage spikes, computer viruses, harmful software code and other such events over which the CERLAS has no control; (5) equipment connected to the CERLAS network is subject to periodic scan for security purposes. Compromised machines will be disconnected; (6) CERLAS reserves the right to suspend or terminate network access at any time without prior warning.
All authorized users are permitted to connect their personal computer systems to the CERLAS' computer networks as long as doing so will not adversely affect other CERLAS users and/or computer systems. All users are responsible for any hardware, software configurations or installations that are necessary to connect their equipment to the CERLAS network.
Revised March 7, 2017
By using this Web Site of the Center for Educational Resources and Laboratory for Advanced Studies, abbreviated as CERLAS Institute (herein below "CERLAS or the Institute), you have agreed to all the terms and conditioned laid out herein below. You further have agreed to abide by all the requirement provided below when accessing any information at CERLAS Institute, or being engaged at the Institute, whether in research or administrative capacity.
Any user of the Institute's information, information technology resources, or other resources (hereinafter the Resources) is expected to and by virtue of using any such Resources had agreed to comply with all the terms and conditions of the Institute and by continuing to access any such Resources on the web site of the Institute, doing work or other activity related to the Institute, or on its behalf, further agrees to the following terms and conditions.
The policies and guidelines provided herein apply to all electronic resources at the Center for Educational Resources and Laboratory for Advanced Studies, whether, in hard copy, electronic resources at the CERLAS Institute, or by oral communication, (hereinafter the Resources) with any member of the CERLAS Institute. These Resources consist of computer systems and other computer peripherals that are attached to and use CERLAS Resources, its computer networks and the various software applications that they support, such as electronic mail, access to the Internet, word processing and data storage, as well as any hardcopy material, or oral communication. These Resources are the property of CERLAS, access to these Resources is provided as both a courtesy and privilege and is subject to CERLAS policies as well as local, state, Federal and international laws and regulations. In order for these Resources to operate at a reasonable and dependable service, as well as safeguarding the intellectual property of the Institute, it is essential that every user exercises responsible and ethical behavior when using any of these Resources. Misuse, whether, intentional or otherwise, by even a single user, has the potential of disrupting the academic and /or research work of the members of the Institute, CERLAS' business, as well as any visiting scholars, researcher or person conducting administrative or audit work at CERLAS.
The policies and guidelines regarding the Institute's Resources are not limited to, a few general rules and the principles behind them and therefore cover a wider scope, encompassing other potential occurrences having the spirit of the foregoing.
Regardless of where any user is located or how he, she or they may be connecting to CERLAS' Resources, all users are expected to utilize said Resources in an ethical, respectful and responsible fashion. All users making use of any of CERLAS' Resources are governed by CERLAS policies and guidelines, as well as all local, State, Federal and international laws. Said policies and guidelines outlined herein are applicable to the following:
• All users affiliated with, or communicating with or through the Institute including, but not limited to, all the Institute's trustees, board of directors, advisory board, faculty where appropriate, research members, administrative personnel, external auditing individuals, visitors, guests, vendors and other staff not mentioned in the instant particular list, fall under said policies and guidelines. Partners or spouses and other family members, or associated family members are entitled to use the Institute's information and / or Resources, as long as the official Institute's user they are affiliated with agrees to be responsible for their compliance with the policies and guidelines outlined in this document and as such has accepted the responsibility thereof.
• All centrally administered computer networking systems and departmental computer systems, including all methods and mediums used for accessing them.
• All electronic data transmitted across CERLAS' computer network regardless of the location or electronic computing system in which it resides or the format in which it is used.
• All electronic data transmitted to and from CERLAS' computer network regardless of the location or electronic computing system in which it resides or the format in which it is used.
• All aspects of the Resource security including, but not limited to, accidental or unauthorized destruction, unauthorized disclosure, misuse, or modification of or access to CERLAS' Resources. In addition to or in lieu of the above:
o Use of Resources that are entrusted to CERLAS by other institutions, organizations or individuals (e.g, foundations, government agencies, libraries, or commercial entities, or individuals) is governed by the terms and conditions agreed upon with those institutions, organizations, entities, or individuals.
o Use of all copyrighted data, software, and materials is governed by the terms and conditions of the copyright.
o Use of all external resources accessed via CERLAS' Resources is subject to the usage guidelines established by those external resources.
o Use of CERLAS' Resources is subject to all other applicable CERLAS Resources and policies (i.e., changes of any kind, supplemental policies specific to any computing device usage in specific programs and/or departments and any written Employee or associate directive, as well as all local, state, Federal and international laws and regulations. CERLAS does not accepts now and will not accept in the future any responsibility or liability for the specific acts of any individual, institutional or entity user, whether singular, plural, or group that violate any policy or guideline outlined in this document.
CERLAS makes Resources available to its users for scholarly, and administrative purposes. Appropriate use of such Resources should always be professional, ethical, reflect academic honesty and adhere to copyright laws. Further, appropriate use of CERLAS' Resources applies to, but is not limited also to Independent study and research; Official work of the offices, programs and departments of CERLAS; any other activity that is not prohibited by the policies outlined in this document or any supplemental program or departmental Resource policies.
The unauthorized use of CERLAS' Resources is prohibited and, in some cases, may be a violation of a local, state, federal or international laws and regulations. Inappropriate use of CERLAS' Resources includes, but is not limited to all Internet connectivity for computers on campus of CERLAS, in housing that is provided by or paid by CERLAS, or other independent and not related residences, wherein contracting for private Internet connectivity (including any hardware equipment known in the art for such use), connecting to the Institute's Resources, without prior authorization is strictly prohibited. Further, activities that are unauthorized, include but are not limited to activities where use is made of the Institute's Resources for any commercial purposes, as well as Making any fraudulent offer to sell or buy products, items, or services or to advance any type of financial project, whether real or scam for the purpose of financial gain; as well as lending or providing the Institute's name to support any commercial product, service or project, without prior written authorization by the Institute.
Further, user should be careful that the system is not utilized by them or any third party for transmitting any defamatory, threatening, obscene, or harassing materials or messages of any sort about any person or entity. Users should be careful that they are not directly or inadvertently implicate the Institution in any electronic posting not authorized by the Institution, and do not Interfere or impair any activities of others, such as (1) Interfering with or disrupting network users, services and/or equipment. Such disruptions include, but are not limited to, distribution of unsolicited e-mail advertising, initiating or facilitating in any way mass unsolicited email messages , propagation of computer worms and / or viruses, deliberately causing any denial of service, attacks and using CERLAS computer networks , or implicate CERLAS in making any unauthorized entry to any other computer system from a non CERLAS computer networks or system; and (2) Using computer systems in any way that compromises the performance, security or integrity of CERLAS' Resources or other computers on the Internet.
The Institute prohibits unauthorized access and use of the resources of others. Namely, (1) Using CERLAS' Resources to gain unauthorized access to Resources of CERLAS or other institutions, organizations, commercial entity, governmental facility, or individuals; (2) Using any means to decode or otherwise obtain passwords, whether restricted or otherwise or access control information; (3) Attempting to spoof an IP or MAC address; (4) Attempting to circumvent or subvert system or network security measures. This includes, but is not limited to, decrypting data, whether intentionally secure data, or otherwise and deliberately searching or looking for security loopholes or vulnerabilities without first being granted proper authorization beforehand; (5) Transporting information and / or technology resources without prior authorization; (6) Attempting to impersonate any person by using forged headers or other identifying information in an effort to deceive or mislead; (7) Using network ``sniffer'' applications on CERLAS' computer network; Providing network services to any other users computer outside your household or at the location you exercise access to CERLAS Resources; (8) Authorizing another person or organization to use an CERLAS supplied user account or computer, unless so authorized by a proper court order of relevant jurisdiction. All CERLAS users are responsible for all use of their accounts. Users must take all reasonable precautions, including password maintenance and file protection measures, to prevent unauthorized use of their user account; (9) Installing any system or software on CERLAS owned equipment without prior approval; (10) Transmitting personal statements in a manner that may be mistaken as the position of CERLAS unless such statements were previously authorized.
The Institute specifically forbids making any unauthorized modifications making unauthorized modifications to (1) CERLAS data; (2) Installing any software systems or hardware that will install a virus, Trojan horse, worm or any other destructive mechanism; (3) Defacing any web page or website that is hosted on any CERLAS computer system; (4) violating any of CERLAS policies, and / or any local, state, Federal or international laws; (5) transmitting any electronic data that, intentionally or unintentionally, violates any applicable local, state, federal or international law; (6) violating any laws or participating in the commission or furtherance of any crime or other unlawful or improper activity or purpose (7) making unauthorized copies of copyrighted materials. Copyrighted materials include, but are not limited to, computer software, audio and video recordings, photographs, and written or printed material. Copying or downloading copyrighted materials without the prior authorization of the copyright owner is against the law, and may result in civil and criminal penalties, including fines and imprisonment; (8) transmitting any material that infringes any copyright, trademark, patent, trade secret, or other proprietary rights, whether consisting of intellectual property or otherwise of any third party.
CERLAS reserves the right to protect its information technology resources and all other Resources from threats of immediate or future harm. Potential actions that may be taken include activities such as disconnecting an offending computer system from the computer network, disabling a user account, terminating a remote computing session, terminating a job running on a computer system, or taking other appropriate actions. These actions will remain in effect until the situation is corrected.
CERLAS reserves the right to investigate unauthorized or improper use of CERLAS resources. All illegal activities will be reported to local, state or federal authorities, as appropriate, for further investigation and possible prosecution.
CERLAS may take the following sanctions for inappropriate use of any person suspected of violating any portion of CERLAS policy, which may result for such violation in disciplinary actions. CERLAS will take one or more of the following actions, which may include but are not limited to (1) verbal or written warnings; (2) suspending or terminating the user's account; (3) disciplinary probation; (4) bill the user for any charges related to correcting and/or repairing any damaged information technology resources or other Resources; (5) initiate legal procedure or action against the violator.
CERLAS provides members of the Institute's community with access to numerous electronic resources under contract or license. Use of the CERLAS' computer and network resources to copy and/or transmit any software programs, documents or other information protected by copyright laws may be prohibited by local, state, Federal or international law. Special rules apply to the export of computer software outside the United Sates. If permission to copy and/or export an electronic resource is unclear, contact a CERLAS computer manager for advice.
All electronic data stored on CERLAS' computer network including, but not limited to, e-mail messages and electronic files, are considered the property of CERLAS. As such, CERLAS reserves the right to access, inspect, and monitor the usage of any and all of its information technology resources, in compliance with the intellectual rights policies.
Each computing support department provides its users with network storage space for storing their electronic files, while they are at the CERLAS facility. These network storage spaces are backed up regularly by each of the computing support departments, according to the policy of the specific department. CERLAS will not be held responsible for any lost data.
The use of networked computers, either owned by the CERLAS or the user, encourages free exchange of information but also requires the respect for privacy rights and intellectual property law.
Any and all users who connect their personal computers to the CERLAS' computer network and gaining access to the Internet, do so acknowledge and/or agreeing to the following: (1) the user agrees to register their name and the hardware address of their personal computer system with the CERLAS' computer support departments; the user is strongly advised to install a current virus protection program and keep the virus definition files up to date; (2) the user agrees to install the latest critical and security updates on their computer systems; (3) the user may receive or be exposed to material that they consider to be improper, inaccurate, misleading, defamatory, obscene or otherwise offensive, or illegal. These users agree that the CERLAS will not have any obligation to take action with respect to such material that they may receive or be exposed to through their connection to the CERLAS' computer network, and agree to report any illegal activity; (4) CERLAS will not be held responsible for harm caused to the user's personal computer equipment by connecting it to the CERLAS' computer network and the Internet. These users will be responsible for taking all the appropriate measures to safeguard their personal computer equipment from events including, but not limited to, incidences of lightning, voltage spikes, computer viruses, harmful software code and other such events over which the CERLAS has no control; (5) equipment connected to the CERLAS network is subject to periodic scan for security purposes. Compromised machines will be disconnected; (6) CERLAS reserves the right to suspend or terminate network access at any time without prior warning.
All authorized users are permitted to connect their personal computer systems to the CERLAS' computer networks as long as doing so will not adversely affect other CERLAS users and/or computer systems. All users are responsible for any hardware, software configurations or installations that are necessary to connect their equipment to the CERLAS network.