The Northeastern University ReCon data sharing agreement is inspired by a similar one from CAIDA (www.caida.org). This is a basic policy to which you must agree before we give you access to any part of our dataset.
1) The traces we provide are anonymized to the best of our ability, and no subjects other than our research team were involved in the data-collection process.
2) The traces are provided to you, and you only. You may not reshare without permission.
3) You will make no attempts to reverse engineer, decrypt, or otherwise identify any personal information in these traces.
4) If you publish a document (including web pages and papers) that uses data from this dataset, you must provide us with a copy of the publication and must cite:
Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David Choffnes. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. In Proceedings of MobiSys (MobiSys '16), Singapore, June 2016.