home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Ian & Stuart's Australian Mac: Not for Sale
/
Another.not.for.sale (Australia).iso
/
fade into you
/
being there
/
Rants
/
US Computer Ethics Policy
/
CaseWestU.policy
< prev
next >
Wrap
Text File
|
1993-09-21
|
5KB
|
131 lines
Case Western Reserve University
Computing Ethics Policy
The general standards of conduct expected of members of an educational
institution also apply to the use of University computing resources.
These resources include:
Hardware: Physical equipment used for processing or data communications.
Software: Programs, programming languages, instructions, or routines
which are used to perform work in a computer.
Data: Information such as records or textual material stored on or
accessible through a computer.
Property Rights.
University computing and information resources are made available to
individuals to assist in the pursuit of educational goals. In order to
promote the most effective use of these it is expected that users will
cooperate with each other and respect the ownership of work and
information even though it is in electronic form rather than printed
form. Individuals and organizations will be held no less accountable
for their actions in situations involving computers and information
resources than they would be dealing with other media.
Though some of them are intangible, these computing resources are the
property of the University. Rules prohibiting theft or vandalism apply
to software and data as well as to physical equipment. Conduct which
violates the University's property rights with respect to computing
resources is subject to University disciplinary action. This conduct
includes:
1. Copying University-owned or licensed software or data to
another computer system for personal or external use without prior
approval.
2. Attempting to modify University-owned or licensed software or
data without prior approval.
3. Attempting to damage or to disrupt operation of computing
equipment, data communications equipment, or data communications
lines.
4. Using University computing resources for purposes other than
those intended by the University body granting access to those
resources; especially, using them for personal or financial gain or
allowing access to them by unauthorized persons even if they are
members of the University community.
5. Using any portion of University computing and information
resources to access non-University computing and information resources
for the purpose of:
a. Copying privately owned or licensed software or data without
prior written approval.
b. Modifying privately owned or licensed software or data without
prior written approval.
c. Attempting to damage or to disrupt the operation of computing
equipment, data communications equipment or data communications lines.
Confidentiality.
The University seeks to protect the civil, personal, and property
rights of those actually using its computing resources and seeks to
protect the confidentiality of University records stored on its
computer systems. Conduct which involves use of University computer
resources to violate another's rights is subject to University
disciplinary action. This conduct includes:
1. Invading the privacy of an individual by using electronic
means to ascertain confidential information, even if an individual or
department inadvertently allows access to such information.
2. Copying another user's software or data without permission of
its owner, even if it is readily accessible by electronic means.
3. Knowingly accepting or using software or data which has been
obtained by illegal means.
4. Abusing or harassing another user through electronic means.
5. Using the University's computing facilities in the commission
of a crime.
6. Gaining access to non-public information resources.
Accessibility/Use:
Some of the University's computer systems require that each user have
a unique identity, protected by password, to gain access to the
system. The computer identity is used to represent a user in various
system activities, to provide access to certain software and data
based on his credibility and purpose for requiring such access, and to
associate his own software and data with his identity. As such, this
computer identity is another instrument of identification and its
misuse constitutes forgery or misrepresentation. Conduct which
involves misuse of computer identities is subject to University
disciplinary action. This conduct includes:
1. Allowing another individual to use the computer identity
2. Using another individual's computer identity, even if the
individual has neglected to safeguard it.
Case Western Reserve University's computing environment is networked
on campus and to other universities. Data on networks is considered to
be private. Tapping the network for the purpose of examining data
other than that destined for the user's system is considered
unacceptable conduct and is subject to disciplinary action.
Campus Policies.
The management of the University computing resources is distributed
among many University bodies. Rules and regulations governing specific
resources are available through the individual managing bodies.
State and National Laws.
Conduct in violation of the principles set forth above with respect to
the use of University computing resources may be subject to criminal
or civil legal action in addition to University disciplinary action.
Original Issue: September 1986
Revised: August 1990