If you are a science blogger covering topics at the 2013 AGU Fall Meeting, you may request to add your blog to our interactive blog roll using the form below. Note: this is only for blogs featuring content directly related to the meeting and excluding offensive or illegal content (see below). Blogs are listed on the blog roll at AGU’s discretion.

Questions? Email tsumner@agu.org

  • For AGU records only, emails will not be made public
  • To be listed on the 2013 Fall Meeting Blog Roll, you agree that your blog does not (and will not) post material that:

    1. Contains vulgar, profane, abusive, racist or hateful language or expressions, epithets or slurs, text, photographs or illustrations in poor taste, inflammatory attacks of a personal, racial or religious nature;
    2. Is defamatory, threatening, disparaging, grossly inflammatory, false, misleading, fraudulent, inaccurate, unfair, contains gross exaggeration or unsubstantiated claims, violates the privacy rights of any third party, is unreasonably harmful or offensive to any individual or community;
    3. Violates any right of AGU, its officers, directors, employees, members or any third party;
    4. Discriminates on the grounds of race, religion, national origin, gender, age, marital status, sexual orientation or disability, or refers to such matters in any manner prohibited by law;
    5. Violates or inappropriately encourages the violation of any municipal, state, federal or international law, rule, regulation or ordinance;
    6. Exists primarily to advertise, promote or offer to trade any goods or services;
    7. You do not have a right to make available under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);
    8. Infringes any patent, trademark, trade secret, copyright or other intellectual property or proprietary rights of any party;
    9. Contains software viruses, spyware or any other computer code, files or programs that interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment; and/or
    10. “Stalks,” “flames” or otherwise harasses another person or entity.