home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Forum of Incident Response & Security Teams
/
Forum_of_Incident_Response_and_Security_Teams_FIRST_October_1994.iso
/
ethics
/
uoftacs.txt
< prev
next >
Wrap
Text File
|
1994-07-08
|
3KB
|
70 lines
Department of Computer Science
Computer Use Policy
1. Introduction
This policy governs use of computers and related equipment operated by the
Department of Computer Sciences of The University of Texas at Austin. Each
computer user is a member of a community; the purpose of this policy is to
maximize the value of our resources to that community. The intent of the
policy is to permit maximum freedom of use consistent with State Law,
University policy, and a productive working environment. The policy applies
to all those who use CS computers. Depending on the seriousness of an offense,
violation of the policy can result in penalties ranging from reprimand to
loss of account to referral to University authorities for disciplinary action.
2. State Law and University Policy
Use of CS computers must comply with Texas law and University policies.
Therefore, CS computers may not be used for commercial or profit-making
purposes (except for the production of drafts of scholarly tests), for
political purposes, or for personal benefit where such use incurs a cost
to the Department and is not academically related.
State law prohibits unauthorized access to computer systems. Access of
or attempts to access another person's directory, files, or mail, whether
protected or not, without permission of the owner is prohibited. Attempts
to access unauthorized machines via the computer network, to decrypt
encrypted materials, or to obtain privileges to which the user is not
entitled are prohibited. The University has signed software licenses
for much of the software that is available on CS computer systems; removal
or transfer of such software without authorization is prohibited.
User acknowledgment of this policy statement authorizes CS computer
systems staff to examine the user's files if required as part of their
official duties.
Sharing of a computer account with other persons is prohibited; each user
must have an individual account. Passwords should be protected, an the user
should not leave a machine logged on when the user is not present unless the
machine is in a secure area, such as a private office.
3. Working Environment
Users of CS machines should conduct themselves in a manner that promotes a
productive working environment. Conduct that creates a disturbance to other
users is prohibited; this includes making noise, taking beverages into the
computer labs, and printing or displaying materials that are unsuitable for
public display. Conduct that intentionally or negligently interferes with
the proper operation of the system or its use by others is prohibited.
Users of electronic mail and bulletin boards should avoid sending
messages that are libelous, patently offensive, or that intimidate, threaten,
demean, or harass individuals or groups, or that would otherwise bring
discredit to the University or the Department.
4. Use of Resources
Users of CS computers should not consume unreasonable amounts of limited
resources. Resources that are in limited supply include laser printing, disk
space and, in some cases, machine access itself. Laser printing should be
used only when necessary; it should not be used for multiple copies. Picture
files or other large files should not be stored on disk unless they are
academically relevant. Playing of games and other non-academic activities
should be restricted to periods of off-peak usage. The Department may impose
restrictions or limits on use of resources.