1. Who can use ETAIS infrastructure?
The main purpose of the ETAIS’s infrastructure is to serve Estonian students and researchers. We also provide services for public institutions and private organizations. Services can be ordered by persons with the right to represent the institution or organization.
2. How to use ETAIS infrastructure?
To gain access to ETAIS infrastructure you have to register yourself by creating an account in the ETAIS portal. For that you must identify yourself with the TAAT (Estonian academic authentication and authorization infrastructure), eduGAIN (education global authentication infrastructure) or TARA (Estonian national authentication service) authentication system. In the case of a public institution or private organization when the right of representation does not come from the Estonian business register, please contact us at firstname.lastname@example.org
3. When can I start using ETAIS infrastructure?
Access to the resources is granted through the queue system to balance the load and access between different users. In order to get your job in the queue, it has to be created and queued by the rules specified in the user guides (https://etais.ee/self_service/). User groups might also be assigned a priority mark which can also change the order of the queue.
4. Service providers’ rights and responsibilities
- Service providers provide users with user guides (published on the website) and additional guidance (by email, phone, in-person) when needed.
- Service providers give their best to help users with user’s specific software, but cannot give any guarantees.
- Service providers are not held responsible for any data loss, leakage or damage caused by force majeure, the user activity or inactivity or a third party whose access has become possible due to (in)activity of the user.
- Service providers reserve the right to remove any data at any time and/or transfer data to other individuals (working on the same or similar project) after a user account is deleted or closed. In some cases, service providers may elect to make backup copies of some data files. When backup copies are made, service providers reserve the right to hold such backup copies indefinitely or to delete them.
5. Users’ rights and responsibilities
- By default, users are allowed to use ETAIS infrastructure solely for research and studies. ETAIS resources can be used for other legal activities only on a previous written agreement.
- Users must use ETAIS resources in a way that doesn’t cause unnecessary waste of resources or other users’ work or time.
- Users must keep their login data private. Accessing resources with someone else’s login credentials is strictly forbidden.
- Users may not attempt to gain unauthorized access to any portion or feature of resources, or any other systems or networks other than assigned to them.
- Users may not probe, scan or test the vulnerability of the resources or any network connected to the resources.
- Users may not reverse look-up, trace or seek to trace any information on any other users of the resources.
- In case of any possible security threats (e.g leakage of login credentials), the user must contact ETAIS staff immediately and also give his/her best to avoid potential damage to the infrastructure.
- Users must ensure that all custom installed software is acquired and used according to appropriate licensing. Possession, use, or transmission of illegally obtained software on resources is prohibited.
- Users shall not copy, store or transfer copyrighted software or data using resources, except as expressly permitted by the copyright owner.