Georgia Cyber Range - Acceptable Use Policy
It is the expectation of the Georgia Cyber Range (GCR), that all users of computing resources use them responsibly and for their intended, prescribed purpose(s).
The designated user(s) of GCR are responsible for maintaining the confidentiality of their GCR account and password and for restricting access to their computer. Additionally, the designated user agrees to accept responsibility for all activities that occur using their provided account and password. GCR reserves the right to refuse service, terminate accounts, remove, or edit content at its discretion, as directed, and/or per USG Policy.
Users may not use, facilitate, or allow others to use, the Services of the GCR:
In any way that breaches any applicable local, national, international law, regulation, or USG policy.
In any way that is unlawful or fraudulent or has any unlawful or fraudulent purpose or effect.
To violate the rights of others.
To threaten, incite, promote, or actively encourage violence, terrorism, or other serious harm.
For any content or activity that promotes child sexual exploitation or abuse.
To distribute, publish, send, or facilitate the sending of unsolicited mass email or other messages (e.g., spam), promotions, advertising, or solicitations.
That violates the security, integrity, or availability of any user, network, computer or communications system, software application, or network or computing device outside of the GCR.
The GCR team may investigate any suspected violation of this Policy and remove or disable user access to any content or resource as determined appropriate. The user agrees to cooperate with the GCR team to remedy any violation.
When determining whether there has been a violation of this Policy, the GCR may consider your ability and willingness to comply with this Policy which includes the policies and processes the user has in place to prevent, identify, and/or remove any prohibited content or activity.
Security is a shared responsibility between the GCR and the user. The GCR will provide all hardware, software, and configuration assistance to aid in the protection of hardware and data.
Users need to practice safe computing. Users need to be familiar with computing policies of their organization. Users must never share their accounts or passwords or send a password via email. Users should also contact the GCR if they suspect any security violations or compromises (e.g., infections).