home *** CD-ROM | disk | FTP | other *** search
- Boston University Information Technology ethics
-
- Conditions of Use and Policy on Computing Ethics September 1, 1988
- ------------------------------------------------------------------------
-
-
- CONDITIONS OF USE
-
- To protect the integrity of the computer system against unauthorized or
- improper use, and to protect authorized users from the effects of unau-
- thorized or improper usage of the system, Boston University reserves the
- rights to: limit or restrict any account holder's usage, inspect, copy,
- remove or otherwise alter any data, file, or system resources which may
- undermine the authorized use of that system with or without notice to
- the user. The University also reserves the right to periodically check
- the system and any other rights necessary to protect the University com-
- puter facilities.
-
- The University disclaims responsibility for loss of data or interference
- with files resulting from its efforts to maintain the privacy and secur-
- ity of the University's computer facilities.
-
- Users of the University's facilities are required to comply with the
- University Policy on Computing Ethics, and by using the system, the user
- agrees to comply with and be subject to the Policy on Computing Ethics
- and these Conditions of Use.
-
- The University reserves the right to amend this statement at any time
- with or without notice.
-
-
-
- POLICY ON COMPUTING ETHICS
-
- Thousands of users share the computing facilities at Boston University.
- Most people use these resources responsibly. However, a few users who
- misuse the computing facilities have the potential for seriously dis-
- rupting the work of other users.
-
- You are expected to exercise responsible, ethical behavior when using
- the University's computing facilities. This includes the following:
-
- 1. You must use only those computer accounts which have been author-
- ized for your use by the University. The unauthorized use of
- another's account, as well as the providing of false or misleading
- information for the purpose of obtaining access to computing
- facilities is prohibited and may be regarded as a criminal act and
- will be treated accordingly by the University.
- 2. You may not authorize anyone to use your account(s) for any rea-
- son. You are responsible for all usage on your accounts. You
- must take all reasonable precautions, including password mainte-
- nance and file protection measures, to prevent use of your
- accounts by unauthorized persons.
- 3. You must use your accounts only for the purposes for which they
- were authorized. For example, non-funded research or student
- accounts may not be used for funded research or private consulting
- without prior approval from the University. You must not use your
- accounts for unlawful purposes, such as the installation of fraud-
- ulently or illegally obtained software.
- 4. You must not access or copy files (including programs, members of
- subroutine libraries, and data) that belong to another account
- without prior authorization from the account holder. Files may
- not be taken to other computer sites without permission from the
- holder of the account under which the files reside.
- 5. You must not use the system irresponsibly, or needlessly affect
- the work of others. This includes transmitting or making accessi-
- ble offensive, annoying or harassing material; intentionally dam-
- aging the system; intentionally damaging information not belonging
- to you; or intentionally misusing system resources or allowing
- misuse of system resources by others.
- 6. You are responsible for reporting to Information Technology any
- violation of these guidelines by another individual. You are also
- encouraged to report any information relating to a flaw in, or
- bypass of, computer facilities security.
-
- Failure to comply with the above guidelines, or the unauthorized or
- illegitimate use of Boston University's computing facilities or resourc-
- es, shall constitute a violation of University policy and will subject
- the violator to disciplinary or legal action by the University. In
- addition, the University may require restitution for any use of service
- which is in violation of these guidelines.
-
- Any questions about this policy or of the applicability of this policy
- to a particular situation should be referred to Information Technology.
-