home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Forum of Incident Response & Security Teams
/
Forum_of_Incident_Response_and_Security_Teams_FIRST_October_1994.iso
/
ethics
/
mankato.txt
< prev
next >
Wrap
Text File
|
1994-07-08
|
3KB
|
64 lines
The following is Mankato State University's official policy on
academic computer usage. Leonard Schmidt n13@krypton.mankato.msus.edu
asks for comments.
---------------------------------------------------
POLICY ON ACADEMIC COMPUTER USAGE
APPROPRIATE USE OF COMPUTING FACILITIES
The faculty/staff of the University reserves the right to examine files
and accounting system information generated through student use of the
University computing facilities.
Academic computing resources on the Mankato State University Campus
are for use in the instructional, research, and outreach activities of
the University only.
USERID'S are defined as those identification characters which allow
students, staff, faculty and other designated individuals access to the
systems available through the facilities of Mankato State University
and those systems for which it has responsibility. Some examples of
USERID'S are, but are not limited to, the following:
userid on Sperry
username on all VAXes and networked VAXes for which
Mankato State University has authority to issues userids
userids' assigned for specific classes, courses, and/or projects
Student users are authorized to use the resources only under their own
userids, and only for those purposes authorized by their instructor or
projects under which they have authorized access. Instructors have the
right to review the class activity of any user in that class.
Minnesota State Statutes 609.88 and 609.89, state that, unauthorized
access to or unauthorized use of computing resources is a criminal
offense. Unauthorized possession of or tampering with computer data
can be a felony. Computer Services maintains a high degree of
vigilance over the use of computing resources and will aggressively
seek recourse (legal and/or otherwise) in cases of fraudulent or
unauthorized use of resources.
The users should protect themselves against unauthorized use of
resources under their userids for which they are accountable. Do not
allow others to use your userid, file space, or other resources. CHANGE
YOUR PASSWORD whenever you feel it may have become known to someone
else. Report promptly to Computer Services and your instructor if you
suspect that someone has been making unauthorized use of resources.
MINDING YOUR OWN BUSINESS
The following are some examples of actions which may be considered as
violations of this policy:
Browsing and reading the files of another user
Deleting the files of another user.
Changing or otherwise manipulating the files of another user.
Using another's userid to accomplish the above.
Using userids to play games or send messages to another.
Using either the Sperry or the VAXes system to solicit business.
Using either the Sperry or the VAXes to harass other students.
This is not a comprehensive list of all the possible violations nor is
it to be construed as such.