home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Forum of Incident Response & Security Teams
/
Forum_of_Incident_Response_and_Security_Teams_FIRST_October_1994.iso
/
ethics
/
dalhousi.txt
< prev
next >
Wrap
Text File
|
1994-07-08
|
5KB
|
102 lines
24 November 1986
GUIDE TO RESPONSIBLE COMPUTING AT DALHOUSIE
-------------------------------------------
In recognition of the contribution that computers can make to
furthering the educational and other objectives of the University,
this Guide is intended to promote the responsible and ethical use of
University computing resources. It is in the best interests of the
community as a whole that these resources be used in accordance with
certain practices which ensure that the rights of all users are
protected and the goals of the University are achieved.
This Guide applies to all computer and computer communication
facilities owned leased, operated, or contracted by the University.
This includes word processing equipment, micros, mainframes,
minicomputers, and associated peripherals and software, regardless of
whether used for administration, research, teaching, or other
purposes.
It should be noted that system administrators of various campus
computing facilities and those responsible for the computer access
privileges of others may promulgate regulations to control use of the
facilities they regulate. System administrators are responsible for
publicizing both the regulations they establish and their policies
concerning the authorized and appropriate use of the publicly
available equipment for which they are responsible.
Basic Principles
----------------
Individuals should use only those University computing facilities
they have been authorized to use.
They should use these facilities:
a. with respect to the terms under which they were granted access
to them;
b. in a way that respects the rights of other authorized users;
c. so as not to interfere with or violate the normal, appropriate
use of these facilities;
d. so as not to impose unauthorized costs on the University without
compensation to it.
Elaboration
-----------
1). Individuals should use only those University computing
facilities they have been authorized through normal University
channels to use. They should use these resources in a
responsible and efficient manner consistent with the objectives
underlying their authorization to use them.
2). Individuals should respect the rights of other authorized users
of University computing facilities. Thus, they should respect
the rights of other users to security of files, confidentiality
of data, and the benefits of their own work. Users should
respect the rights of others to access campus computing
resources and should refrain from:
(1) using the computer access privileges of others without
their explicit approval;
(2) accessing, copying, or modifying the files of others
without their permission; and
(3) harassing others in any way or interfering with their
legitimate use of computing facilities.
3). Individuals should respect the property rights of others by
refraining from the illegal copying of programs or data acquired
by the University or other users or putting software, data
files, etc. on University computers without the legal right to
do so.
4). Individuals should not attempt to interfere with the normal
operation of computing systems or attempt to subvert the
restrictions associated with such facilities. They should obey
the regulations affecting the use of any computing facility they
use.
Disciplinary Actions
--------------------
Reasonable suspicion of a violation of the principles or practices
laid out in this Guide may result in disciplinary action. Such
action will be taken through normal University channels.
Nothing in this Guide diminishes the responsibility of system
administrators of computing services to take remedial action in the
case of possible abuse of computing privileges. To this end, the
system administrators with the approval of the President and with due
regard for the right of privacy of users and the confidentiality of
their data, have the right, to suspend or modify computer access
privileges, examine files, passwords, accounting information,
printouts, tapes, and any other material which may aid in an
investigation of possible abuse. Whenever possible, the cooperation
and agreement of the user will be sought in advance. Users are
expected to cooperate in such investigations when requested. Failure
to do so may be grounds for cancellation of computer access privileges.
- Passed by Dalhousie Senate, 24 November 1986.