home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Forum of Incident Response & Security Teams
/
Forum_of_Incident_Response_and_Security_Teams_FIRST_October_1994.iso
/
ethics
/
virgtech.txt
< prev
Wrap
Text File
|
1994-07-08
|
4KB
|
81 lines
Appropriate Use of Information Systems
at Virginia Tech
GENERAL PRINCIPLES
Access to computer systems and networks owned or operated by Virginia
Tech imposes certain responsibilities and obligations and is granted
subject to University policies, and local, state, and federal laws. Ap-
propriate use always is ethical, reflects academic honesty, and shows
restraint in the consumption of shared resources. It demonstrates re-
spect for intellectual property, ownership of data, system security
mechanisms, and individuals' rights to privacy and to freedom from in-
timidation, harassment, and unwarranted annoyance.
GUIDELINES
In making appropriate use of resources you must:
o use resources only for authorized purposes.
o protect your userid from unauthorized use. You are responsible for
all activities on your userid or system.
o access only files and data that are your own, that are publicly
available, or to which you have been given authorized access.
o use only legal versions of copyrighted software in compliance with
vendor license requirements.
o be considerate in your use of shared resources. Refrain from monop-
olizing systems, overloading networks with excessive data, or wast-
ing computer time, connect time, disk space, printer paper, manuals,
or other resources.
In making appropriate use of resources you must NOT:
o use another person's userid, password, files, system or data
without permission.
o use computer programs to decode passwords or access control informa-
tion.
o attempt to circumvent or subvert system security measures.
o engage in any activity that might be harmful to systems or to any
information stored thereon, such as creating or propagating viruses,
disrupting services, or damaging files.
o use University systems for partisan political purposes, such as us-
ing electronic mail to circulate advertising for political candi-
dates.
o make or use illegal copies of copyrighted software, store such
copies on University systems, or transmit them over University net-
works.
o use mail or messaging services to harass, intimidate, or otherwise
annoy another person, for example, by broadcasting unsolicited mes-
sages or sending unwanted mail.
o waste computing resources, for example, by intentionally placing a
program in an endless loop or by printing excessive amounts of pa-
per.
o use the University's systems for personal gain, for example, by
selling access to your userid or by performing work for profit in a
manner not authorized by the University.
o engage in any other activity that does not comply with the General
Principles presented above.
ENFORCEMENT
The University considers any violation of appropriate use principles or
guidelines to be a serious offense and reserves the right to copy and
examine any files or information resident on University systems
allegedly related to inappropriate use. Violators are subject to disci-
plinary action as prescribed in the honor codes and the student and em-
ployee handbooks. Offenders also may be prosecuted under laws including
(but not limited to) the Privacy Protection Act of 1974, The Computer
Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989,
Interstate Transportation of Stolen Property, The Virginia Computer
Crimes Act, and the Electronic Communications Privacy Act. Access to
the text of these laws is available through the Reference Department of
the Newman Library.