Code of Conduct
When using this site:
You are encouraged to:
- use provided live sources (API’s) for the datasets as your primary data source, where possible – much of the data provided is dynamic and fluid (although in many cases over an annual or longer period of time);
- where using our data feeds, please if possible cache the data over a short period of time to reduce load both on your application and our servers;
- where you cannot use our live sources as the primary data source, please still use the keys contained within the data as the primary or foreign keys within your application, as this will enable you to migrate as simply as possible to up-to-date data and information when it is made available;
- where using your own long-term caches of our data, please refresh the data within your application in a timely manner when a new set of the data is made available;
- engage with us when something’s wrong – point out any inconsistencies in the data you find, make suggestions about how to improve the service, request new data sources to be added, and tell us about what you have built so we can help to further promote it!
- refer back to and cite the origin or source of the data when using it;
- clearly state where possible about which data is derived from official sources, which is from other sources, and which data is from any calculation within or without your app.
You must not:
- make an application that pretends to be an official NextGEOSS service;
- present the data in a misleading or incorrect manner or to misrepresent or change the data;
- use this site for party political purposes, as the site is paid for with public money so it is not appropriate to engage in party-political activity here;
- use these materials in or to support a criminal or illicit activity;
- use these materials on an application to inflame or make comments that are racist, sexist or homophobic, or which promote discrimination or incites violence based on religion, disability or age;
- misuse the site by knowingly introducing viruses, trojans, worms, logic bombs or other material which is malicious or technologically harmful. By breaching this provision, you would commit a criminal offence under the Computer Misuse Act 1990.