home *** CD-ROM | disk | FTP | other *** search
- gen - general overview $Revision: 1.10 $ $Date: 91/02/06 12:48:51 $
- ^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- USE OF MTEK COMPUTING FACILITIES
-
- This host is privately owned and operated in support of a business. Business
- priorities will thus be served first, if there is a conflict for time of the
- administrator. We will be as helpful as conditions allow.
-
- We run alot of usenet software on this host. So if you wonder if a desired
- command is in your PATH, type in 'which <command>'.
-
- To find information about other users, use 'finger'. (Do 'man finger', if
- you want to read the man page describing the use of 'finger').
-
- Please furnish your office telephone number and extension so that we can enter
- it into the password file, available for 'finger' to find you. If you like,
- you may also furnish your home number to be included, as well.
-
- Below are presented the main elements of local policy, which apply to all
- users:
-
- * * * * * * * * * * * * * * *
- * Computer Resources Policy *
- * * * * * * * * * * * * * * *
- 1. General
-
- Computing facilities are provided by MTEK International, Inc. (the "company")
- for use by local and remote users. It is expected that all users will make
- use of local computing resources in a manner which is ethical, legal, and not
- contrary to the interests of others, including the company.
-
- The basic guidelines are that any use must be legal and not such as to
- interfere with use by other authorized users, nor compromise the confiden-
- tiality of the company's internal business practices or records.
-
- 2. Notice
-
- If any policy has provisions with which you do not agree, please notify the
- administrator describing your concerns/suggestions. Absent such notice, it is
- assumed you have reviewed and understood, and fully agree to conform to, all
- prevailing published policies governing the use of this system.
-
- 2. Disclaimer
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * *
- * The company accepts NO RESPONSIBILITY for any damage to or loss of *
- * data arising directly or indirectly from the use of these or other *
- * facilities or for any consequential loss or damage. It makes NO *
- * WARRANTY, express or implied, regarding the computing services *
- * offered, or their fitness for any particular purpose. *
- * *
- * The company's liability in the event of any loss or damage shall *
- * be LIMITED TO THE FEES AND CHARGES, IF ANY, PAID TO THE COMPANY *
- * for use of the computing facilities which resulted in said loss *
- * or damage. *
- * *
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- 3. Failure to abide by the policies described below and in related docu-
- ments may result in denial of access to computing facilities:
-
- A. You may only use those facilities which have been authorized
- for your use. If access is protected by a password, you are not
- to make this password available to others. You may not use any
- account set up for another user, nor may you attempt to find out
- the password of another user.
-
- B. You may only use authorized facilities for authorized purposes.
-
- C. You must be aware of the law of copyright as it affects computer
- software. Software must not be copied except with the express
- permission of the copyright owner (which may be expressed in the
- copyright notice contained within the software). Note that a
- formal copyright need not be in evidence in order for copyright
- protection to be in force.
-
- D. You may not attempt to copy information belonging to other users
- without their express permission.
-
- E. You may not attempt to interfere with the operation of computing
- facilities.
-
- F. You may not attempt to subvert the security of any of the company's
- computing facilities.
-
- G. You may not use the company's computing facilities to send messages
- which are obscene or otherwise harassing in their intent.
-
- H. You may disagree with one or more of these policies, publically or
- privately, in accordance with your First Amendment rights, but you
- may not violate any of these policies for any reason or purpose.
-