home *** CD-ROM | disk | FTP | other *** search
- In response to the request for site-specific policies and procedures,
- here is the first draft of a policy that we are putting in place here.
- This policy has not yet been approved by the dean, the head of academic
- computing, the provost, or the university lawyers, so I expect there will
- be a number of changes before it is actually enacted and distributed. It
- should be a useful starting point for others embarking on the same process.
- ---------------------------------------------------------------------------
-
- College of Engineering Computer Use Policy
-
-
- John Lees, Manager
- Systems and Network Software Services
-
- A. H. Case Center for CAE/M
- College of Engineering, Michigan State University
- 112 Engineering Building, East Lansing, MI 48824-1226
- lees@egr.msu.edu, lees@msuegr.bitnet, CompuServe 74106,1324
-
-
- ABSTRACT
-
- This DRAFT Computer Use Policy applies specifi-
- cally to the facilities in the College of Engineering
- operated by the Case Center for use by all College of
- Engineering students, faculty, and staff. Facilities
- within the College operated by individual departments
- or research groups may have more stringent use poli-
- cies. This policy was drafted by the Ethics Subcommit-
- tee of the Case Center Advisory Committee during the
- 1989/90 academic year. The members of the Committee
- were: Dr. Erik Goodman, Dr. Robert Barr, John Lees,
- Fred Hall, Steve Southward, and William Su.
-
-
-
- A person in violation of this policy may be subject to adminis-
- trative action, with a penalty of a fine, restitution for ser-
- vices used, or loss of computer privileges. Some actions covered
- by this policy are also covered by University regulations or
- all-University policies, the violation of which could lead to
- academic judicial proceedings. Some actions covered by this pol-
- icy are also covered by City, State, or Federal law, the viola-
- tion of which could lead to civil or criminal prosecution.
-
- For the purposes of this policy, a user is any person consuming
- computer resources; a staff member is a person acting in an offi-
- cial capacity as a staff member. The same person may be a staff
- member during part of the day and a user during other parts of
- the day.
-
- The terminology used in this policy tends to reflect the UNIX
- operating system, which is used on the majority of computers in
- the College of Engineering, but is intended to apply to all
- operating systems in use in the College.
-
- 1. User Responsibilities
-
- A user of College of Engineering computer facilities should obey
- the following general guidelines.
-
- 1.1 Files owned by individual users or staff members are to be
- considered as private, whether or not they are accessible by
- other users.
-
- 1.1.1 That you can read a file does not mean that you may
- read a file. Files belonging to individuals are to be
- considered private property.
-
- 1.1.2 Under no circumstances should you alter a file that
- does not belong to you. The ability to alter a file
- does not give you the right to alter a file.
-
- 1.1.3 The United States Government [citation needed]
- includes electronic mail (email) in the same category
- as messages delivered by the United States Postal Ser-
- vice. This means that tampering with email, interfer-
- ing with the delivery of email, and the use of email
- for criminal purposes may be felony offenses.
-
- 1.2 Many resources, such as file space, CPU cycles, printer
- queues, batch queues, login sessions, and software licenses,
- are shared by all users. No user should monopolize these
- shared resources.
-
- 1.2.1 Use as little file space as practical, making use of
- available means for compressing and archiving files.
-
- 1.2.2 Terminate all "background" jobs before logging out.
- Long running, non-interactive jobs should be run in
- batch queues (if available).
-
- 1.2.3 Read and follow the posted policies on printer use.
-
- 1.2.4 Make appropriate use of batch queues and job priori-
- ties. Do not load the system in such a way that oth-
- ers cannot perform useful work.
-
- 1.2.5 Do not tie up resources with multiple, unused login
- sessions.
-
- 1.2.6 Relinquish licensed software, such as FrameMaker, when
- you no longer are using the license.
-
- 1.2.7 Respect the resources of workstations located in pub-
- lic labs. Do not login to such a workstation and run
- jobs that would interfere with use of that workstation
- by a person sitting in the lab.
-
- 1.3 Not all the computer facilities in the College of Engineer-
- ing are public resources (public to the College of Engineer-
- ing community). Users found using non-public facilities may
- be summarily logged-off those resources.
-
- 1.3.1 Some machines are designated as "file servers", and
- carry login messages asking users to not use these
- machines for login purposes.
-
- 1.3.2 Workstations on faculty and staff desks should not be
- used as login resources without the specific permis-
- sion of the faculty or staff who use those machines.
-
- 1.3.3 Printers and other peripheral devices not located in
- public labs and advertised as available should not be
- used without specific permission.
-
- 1.4 Because this is an educational environment, computer systems
- are generally open to perusal and investigation by users.
- This access must not be abused either by attempting to harm
- the systems, or by stealing copyrighted or licensed
- software.
-
- 1.4.1 System-level files (not owned by individuals) may be
- used and viewed for educational purposes if their
- access permissions so allow.
-
- 1.4.2 Most system-level files are part of copyrighted or
- licensed software, and therefore you should not make
- your own copies of these files, in whole or in part,
- except as needed as part of an educational exercise.
- Removing copies of copyrighted software from the sys-
- tem on which it is licensed may be a violation of the
- copyright or license.
-
- 1.4.3 The same standards of intellectual honesty and pla-
- giarism apply to software as to other forms of pub-
- lished work. Treat system software is if it were a
- library you were browsing. Acknowledge borrowing
- code, algorithms, or data structures from the work of
- other people.
-
- 1.4.4 Making your own copies of software having a restricted
- use license is theft. So is figuring out how to
- "beat" the license.
-
- 1.4.5 Deliberate alteration of system files is vandalism or
- malicious destruction of University property.
-
- 1.5 College of Engineering computing facilities are provided for
- academic uses (instruction and research) and some adminis-
- trative uses.
-
- 1.5.1 The license agreements for some pieces of software may
- specifically restrict the software to instructional
- use. Please check with the Case Center before you use
- licensed software for research or administrative
- tasks.
-
- 1.5.2 Do not make use of any University computing facilities
- for any activity that is commercial in nature without
- first obtaining written approval to do so. Commercial
- activities include: consulting, developing software
- for sale, and in general any activity for which you
- are paid from non-University funds.
-
- 1.6 Facilities are often available on an unmonitored basis. It
- is the responsibility of every user to act in such a manner
- as to not cause damage to the physical equipment.
-
- Accidental damage, or damage caused by other parties, should
- be reported as soon as possible so that corrective action
- can be taken.
-
- College facilities are paid for and operated in part with
- student money. Please help take care of them! Please bring
- problems to staff attention!
-
-
- 2. User Rights
-
- A user of College of Engineering computer facilities has the fol-
- lowing rights and privileges.
-
- 2.1 You should not be denied access to facilities by someone who
- is not using the facilities for research or instructional
- purposes, or who is not a student, faculty, or staff member
- of the College of Engineering. You have the right to ask an
- appropriate staff member to remove such a person so you can
- use the facilities.
-
- 2.2 You have the right to not be harassed while using College of
- Engineering facilities, whether it be physical, verbal,
- electronic, or any other form of abuse. You have the right
- to ask an appropriate staff member to take steps to end any
- abuse to which you are subjected.
-
-
- 3. Staff Responsibilities
-
- In general, the staff of the College of Engineering computer
- facilities has the responsibility of enforcing the rights and
- responsibilities of the users of those facilities to the best of
- their ability. Several specific staff responsibilities are
- listed below.
-
- 3.1 Staff should not make use of facilities intended for
- instructional purposes unless this is necessary to correct
- an urgent problem. Instructional facilities should never be
- used for day-to-day staff work unless these facilities are
- currently being under-utilized by students.
-
- 3.2 Staff should at all times respect the privacy of user files,
- mail, and printer listings (but see Staff Rights below).
-
-
- 4. Staff Rights
-
- The staff in general have the right to do whatever is necessary
- to carry out their responsibility to keep the College computing
- resources operating and available.
-
- 4.1 The networked computer environment in the College of
- Engineering is a facility provided to faculty, staff, and
- students to enable them to accomplish certain tasks required
- by their roles within the College and the University. There
- is an acknowledged trade-off between the absolute right of
- privacy of a user, and the need of the staff to gather
- necessary information to insure the continued functioning of
- this College-wide resource.
-
- In the normal course of system administration, the staff may
- have to examine files, mail, and printer listings to gather
- sufficient information to diagnose and correct problems with
- system software, or to determine if a user is acting in vio-
- lation of the policies set forth in this document. The
- staff has the right to do this.
-
- As mentioned in Staff Responsibilities, above, the staff has
- an obligation to maintain the privacy of a user's files,
- mail, and printer listings.
-
- 4.2 Because this is an educational institution, some behavior is
- tolerated, even encouraged, that would not be allowed at a
- "normal" commercial site. This, combined with the fact that
- there is relatively free and uncontrolled access to our sys-
- tems via network connections around the world, causes spe-
- cial problems for the staff.
-
- In general, the staff allows the users great freedom in use
- of the facilities. However, there are certain kinds of
- threatening or damaging behavior against which the staff
- will take action. For example: owning or using burglar's
- tools, worms, viruses, or trojan horses.
-
- Any such action will be taken carefully, because there may
- be legitimate reasons for people to have such objects in
- their possession. Staff will normally take action only if
- there is clear and convincing reason to believe that a user
- is violating the policies outlined in this document.
-
- A user who feels that s/he has legitimate reason to experi-
- ment with security-related aspects of the computer facili-
- ties should discuss the project with staff before embarking
- on the experiment. This will help prevent a perhaps embar-
- rassing intervention by the staff.
-
-
- 5. Bibliography
-
- We will attach a bibliography of pertinent University publica-
- tions in which to find official rules and regulations.
-
-