Fale conoscoTwitter

User Terms

The access code obtainment for any USP computer implies the acceptation and the respect to the terms herein exposed:

Since all computer are  interconnected by network, a bad usage of any one can cause serious problems for all network users. Because of this, the rules for computer utilization refers not only the individual computers but also to the network utilization.

  • The user code is personal and not transferable. The password should not be delivered to third parties  and should be hard to decode (birth dates, surnames, names and names easy to relation to the research and work areas should be avoided). The password should be changed periodically (every 3 months would suffice)


  • The use of computers with an academic user code is only allowed for academic activities, such as the research development and for teaching purposes, cultural interchange and so on. It is forbidden the use of computers with other purposes.


  • The attempt of access to computers without the proper authorization or the access to computers with illegally obtained credentials (e.g., by stolen or forged credentials) or the modification of third users’ files without the proper authorization are all considered serious contraventions, to be punished with the blocking of the user acesss code  in every USP computer, besides to be liable to legal prosecution.


  • It is not allowed to maintain, to use or spread the usage of devices, that allow or facilitate the violation of computers by the use of the network.  The disrespect to this rule will be punished with the exclusion of the user access code in all computer of USP.


  • All documentation or information that has a registered property (copywright) and is obtained by means of the USPnet network cannot be copied, used, modified or disseminated, without the express authorization of the copywright owner, otherwise it will be considered a bad network utilization.


  • The computational resources that are accessible through the USP’s infrastructure cannot be utilized to show, store or propagate abusive texts, images or sounds, as such considered by the common sense.