home *** CD-ROM | disk | FTP | other *** search
-
- Recommended
-
- Guidelines
-
- for
-
- Responsible Computing
-
- at the
-
- University of Delaware
-
-
- Draft
-
- September 1991
-
- Prepared by staff in
- Computing and Network Services
- University of Delaware
-
-
-
-
- Preface
-
- The computer has become a common denominator that knows no
- intellectual, political, or bureaucratic bounds; the Sherwin Williams
- of necessity that covers the world, spanning all points of view.
-
- . . . I wish that we lived in a golden age, where ethical behavior was
- assumed; where technically competent programmers respected the privacy
- of others; where we didn't need locks on our computers. . . .
-
- Fears for security really do louse up the free flow of information.
- Science and social progress only take place in the open. The paranoia
- that hackers leave in their wake only stifles our work.
-
- -Cliff Stoll, in The Cuckoo's Egg: Tracking a spy through
- the maze of computer espionage
-
- One of the interesting facets of Cliff Stoll's The Cuckoo's Egg is his
- growing awareness of the responsibilities all computer users have to
- each other. It is our hope that this set of Guidelines can foster that
- same understanding in the University of Delaware community.
-
- It is imperative that all users of the University's computing and
- information resources realize how much these resources require
- responsible behavior from all users. Simply put, we are all
- responsible for the well-being of the computing, network, and
- information resources we use.
-
- Universities do try to promote the open exchange of ideas; however, an
- open, cooperative computing network can be vulnerable to abuse or
- misuse. As more and more schools, colleges, universities, businesses,
- government agencies, and other enterprises become attached to the
- world-wide computing and information networks, it is more important
- than ever that this University educate its students, faculty, and staff
- about proper ethical behavior, acceptable computing practices, and how
- "computer vandalism" interferes with the exchange of ideas that is
- integral to a modern education.
-
- The first item in the body of this document is the University's Policy
- for Responsible Computing Use, passed by the Faculty Senate of the
- University of Delaware on (date will go here). The remainder of this
- document consists of recommended guidelines for implementing this
- policy. If you have any questions about the policy or the guidelines,
- please consult with your system administrator, with the staff in
- Computing and Network Services, or with your dean, project director,
- supervisor, chair, or advisor.
-
-
- Table of Contents
-
- Definition of Terms iii
-
- Policy for Responsible Computing Use 1
-
- User Responsibilities 2
-
- System Administrator Responsibilities 3
-
- Misuse of Computing and Information Resource Privileges 4
-
- User Confidentiality and System Integrity 5
-
- Penalties for Misuse of Computing and Information 6
- Resource Privileges
-
- Academic Honesty 7
-
- Works Consulted 8
-
-
- Definition of Terms
-
- Administrative Officer: vice-president, dean, chair, or director to
- whom an individual reports.
-
- Computer Account: the combination of a user number, username, or
- userid and a password that allows an individual access to a mainframe
- computer or some other shared computer.
-
- Data Owner: the individual or department that can authorize access to
- information, data, or software and that is responsible for the
- integrity and accuracy of that information, data, or software.
- Specifically, the data owner can be the author of the information,
- data, or software or can be the individual or department that has
- negotiated a license for the University's use of the information, data,
- or software.
-
- Desktop Computers, Microcomputers, Advanced Workstations: different
- classes of smaller computers, some shared, some single-user systems.
- If owned or leased by the University or if owned by an individual and
- connected to a University-owned, leased, or operated network, use of
- these computers is covered by the Policy for Responsible Computing
- Use.
-
- Information Resources: In the context of these Guidelines, this phrase
- refers to data or information and the software and hardware that makes
- that data or information available to users.
-
- Mainframe Computers: "central" computers capable of use by several
- people at once. Also referred to as "time-sharing systems."
-
- Network: a group of computers and peripherals that share information
- electronically, typically connected to each other by either cable or
- satellite link.
-
- Normal Resource Limits: the amount of disk space, memory, printing,
- etc. allocated to your computer account by that computer's system
- administrator.
-
- Peripherals: special-purpose devices attached to a computer or
- computer network--for example, printers, scanners, plotters, etc.
-
- Project Director: person charged with administering a group of
- computer accounts and the computing resources used by the people using
- those computer accounts.
-
- Server: a computer that contains information shared by other computers
- on a network.
-
- Software: programs, data, or information stored on magnetic media
- (tapes, disks, diskettes, cassettes, etc.). Usually used to refer to
- computer programs.
-
- System Administrator: staff employed by a central computing agency such
- as Computing and Network Services whose responsibilities include
- system, site, or network administration and staff employed by other
- University departments whose duties include system, site, or network
- administration. Note that if you have a computer on your desk, you may
- be considered that system's system administrator.
-
-
-
- Policy for Responsible Computing Use at the University of Delaware
-
- In support of its mission of teaching, research, and public service,
- the University of Delaware provides access to computing and information
- resources for students, faculty, and staff, within institutional
- priorities and financial capabilities.
-
- All members of the University community who use the University's
- computing and information resources must act responsibly. Every user
- is responsible for the integrity of these resources. All users of
- University-owned or University-leased computing systems must respect
- the rights of other computing users, respect the integrity of the
- physical facilities and controls, and respect all pertinent license and
- contractual agreements. It is the policy of the University of Delaware
- that all members of its community act in accordance with these
- responsibilities, relevant laws and contractual obligations, and the
- highest standard of ethics.
-
- Access to the University's computing facilities is a privilege granted
- to University students, faculty, and staff. Access to University
- information resources may be granted by the owners of that information
- based on the owner's judgement of the following factors: relevant laws
- and contractual obligations, the requestor's need to know, the
- information's sensitivity, and the risk of damage to or loss by the
- University.
-
- The University reserves the right to limit, restrict, or extend
- computing privileges and access to its information resources. Data
- owners--whether departments, units, faculty, students, or staff--may
- allow individuals other than University faculty, staff, and students
- access to information for which they are responsible, so long as such
- access does not violate any license or contractual agreement;
- University policy; or any federal, state, county, or local law or
- ordinance.
-
- Computing facilities and accounts are owned by the University and are
- to be used for the University-related activities for which they are
- assigned. University computing resources are not to be used for
- commercial purposes or non-University-related activities without
- written authorization from the University. In these cases, the
- University will require payment of appropriate fees. This policy
- applies equally to all University-owned or University-leased
- computers.
-
- Users and system administrators must all guard against abuses that
- disrupt or threaten the viability of all systems, including those at
- the University and those on networks to which the University's systems
- are connected. Access to information resources without proper
- authorization from the data owner, unauthorized use of University
- computing facilities, and intentional corruption or misuse of
- information resources are direct violations of the University's
- standards for conduct as outlined in the University of Delaware Policy
- Manual, the Personnel Policies and Procedures for Professional and
- Salaried Staff, the Faculty Handbook, and the Official Student Handbook
- and may also be considered civil or criminal offenses.
-
- The University of Delaware treats access and use violations of
- computing facilities, equipment, software, information resources,
- networks, or privileges seriously. Disciplinary action resulting from
- such abuse may include the loss of computing privileges and other
- sanctions including non-reappointment, discharge, dismissal, and legal
- action--including prosecution under Title 11, $931-$939 of the Delaware
- Code, the Computer Fraud and Abuse Act of 1986, or other appropriate
- laws.
- May 31, 1991
-
-
-
- User Responsibilities
-
- If you use the University's computing resources or facilities, you have
- the following responsibilities:
-
- - Use the University's computing facilities and information
- resources, including hardware, software, networks, and computer
- accounts, responsibly and appropriately, respecting the rights of other
- computing users and respecting all contractual and license agreements.1
-
- - Use only those computers and computer accounts for which you
- have authorization.
-
- - Use mainframe accounts only for the purpose(s) for which they
- have been issued. Use University-owned microcomputers and advanced
- workstations for University-related projects only.
-
- - Be responsible for all use of your accounts and for protecting
- each account's password. In other words, do not share computer
- accounts. If someone else learns your password, you must change it.
-
- - Report unauthorized use of your accounts to your project
- director, instructor, supervisor, system administrator, or other
- appropriate University authority.
-
- - Cooperate with system administrator requests for information
- about computing activities. Under certain unusual circumstances, a
- system administrator is authorized to access your computer files.
-
- - Take reasonable and appropriate steps to see that all hardware
- and software license agreements are faithfully executed on any system,
- network, or server that you operate.
-
- Each user is ultimately responsible for his or her own computing and
- his or her own work using a computer. Take this responsibility
- seriously. For example, users should remember to make backup copies of
- their data, files, programs, diskettes, and tapes, particularly those
- created on microcomputers and those used on individually- or
- departmentally-operated systems. Furthermore, users with desktop
- computers or other computers that they operate themselves must remember
- that they may be acting as the system administrators for those
- computers and need to take that responsibility very seriously.
-
- If you are a project director for a group of mainframe computing users,
- a supervisor whose staff use computers, or a faculty member whose
- students use computers, you must help your project members, staff, or
- students learn more about ethical computing practices. You should also
- help your project members, staff, or students learn about good
- computing practices and data management.
-
- ---
- 1 The software made available by the University has been licensed by
- the University for your use. As a result, its use may be subject to
- certain limitations.
-
-
-
- System Administrator Responsibilities
-
- This document uses the phrase system administrator to refer to all of
- the following University personnel:
- - staff employed by a central computing agency such as Computing
- and Network Services whose responsibilities include system, site, or
- network administration
- - staff employed by other University
- departments whose duties include system, site, or network
- administration.
-
- A system administrator's use of the University's computing resources is
- governed by the same guidelines as any other user's computing
- activity. However, a system administrator has additional
- responsibilities to the users of the network, site, system, or systems
- he or she administers:
-
- - A system administrator manages systems, networks, and servers
- to provide available software and hardware to users for their
- University computing.
-
- - A system administrator is responsible for the security of a
- system, network, or server.
-
- - A system administrator must take reasonable and appropriate
- steps to see that all hardware and software license agreements are
- faithfully executed on all systems, networks, and servers for which he
- or she has responsibility.
-
- - A system administrator must take reasonable precautions to
- guard against corruption of data or software or damage to hardware or
- facilities.2
-
- - A system administrator must treat information about and
- information stored by the system's users as confidential.
-
- As an aid to a better understanding of responsible computing practices,
- all departments that own or lease computing equipment are encouraged to
- develop "Conditions Of Use" documentation for all systems that they
- operate and to make these "Conditions Of Use" documents available to
- users. These documents should be consistent with the University of
- Delaware Policy for Responsible Computing Use (reprinted on page 1 of
- these Guidelines) and should be approved by the department's
- administrative officer or other individual designated by that
- administrative officer.
-
- ---
- 2 The University is not responsible for loss of information from
- computing misuse, malfunction of computing hardware, malfunction of
- computing software, or external contamination of data or programs. The
- staff in central computing units such as Computing and Network Services
- and all other system administrators must make every effort to ensure
- the integrity of the University's computer systems and the information
- stored thereon. However, users must be aware that no security or
- back-up system is 100.00% foolproof.
-
-
-
-
- Misuse of Computing and Information Resource Privileges
-
- The University characterizes misuse of computing and information
- resources and privileges as unethical and unacceptable and as just
- cause for taking disciplinary action. Misuse of computing and
- information resources and privileges includes, but is not restricted
- to, the following:
-
- - attempting to modify or remove computer equipment, software, or
- peripherals without proper authorization
-
- - accessing computers, computer software, computer data or
- information, or networks without proper authorization, regardless of
- whether the computer, software, data, information, or network in
- question is owned by the University (That is, if you abuse the networks
- to which the University belongs or the computers at other sites
- connected to those networks, the University will treat this matter as
- an abuse of your University of Delaware computing privileges.)
-
- - circumventing or attempting to circumvent normal resource
- limits, logon procedures, and security regulations
-
- - using computing facilities, computer accounts, or computer data
- for purposes other than those for which they were intended or
- authorized
-
- - sending fraudulent computer mail, breaking into another user's
- electronic mailbox, or reading someone else's electronic mail without
- his or her permission
-
- - sending any fraudulent electronic transmission, including but
- not limited to fraudulent requests for confidential information,
- fraudulent submission of electronic purchase requisitions or journal
- vouchers, and fraudulent electronic authorization of purchase
- requisitions or journal vouchers
-
- - violating any software license agreement or copyright,
- including copying or redistributing copyrighted computer software,
- data, or reports without proper, recorded authorization
-
- - violating the property rights of copyright holders who are in
- possession of computer- generated data, reports, or software
-
- - harassing or threatening other users or interfering with their
- access to the University's computing facilities
-
- - taking advantage of another user's naivete or negligence to
- gain access to any computer account, data, software, or file other than
- your own
-
- - encroaching on others' use of the University's computers (e.g.,
- disrupting others' computer use by excessive game playing; sending
- frivolous or excessive messages, either locally or off-campus; printing
- excess copies of documents, files, data, or programs; modifying system
- facilities, operating systems, or disk partitions; attempting to crash
- or tie up a University computer; damaging or vandalizing University
- computing facilities, equipment, software, or computer files)
-
- - disclosing or removing proprietary information, software,
- printed output or magnetic media without the explicit permission of the
- owner
-
- - reading other users' data, information, files, or programs on a
- display screen, as printed output, or via electronic means, without the
- owner's explicit permission.
-
-
-
- User Confidentiality and System Integrity
-
- If a system administrator is an eyewitness to a computing abuse;
- notices an unusual degradation of service or other aberrant behavior on
- the system, network, or server for which he or she is responsible; or
- receives a complaint of computing abuse or degradation of service, he
- or she should investigate and take steps to maintain the integrity of
- the system(s). If a system administrator has evidence that leads to a
- user's computing activity as the probable source of a problem or abuse
- under investigation, he or she must weigh the potential danger to the
- system and its users against the confidentiality of that user's
- information.
-
- While investigating a suspected abuse of computing; a suspected
- hardware failure; a disruption of service; or a suspected bug in an
- application program, compiler, network, operating system, or system
- utility, a system administrator should ordinarily ask a user's
- permission before inspecting that user's files, diskettes, or tapes.
- The next two paragraphs outline exceptions to this rule.
-
- If, in the best judgement of the system administrator, the action of
- one user threatens other users or if a system or network for which the
- system administrator is responsible is in grave, imminent danger of
- crashing, sustaining damage to its hardware or software, or sustaining
- damage to user jobs, the system administrator should act quickly to
- protect the system and its users. In the event that he or she has had
- to inspect user files in the pursuit of this important responsibility,
- he or she must notify, as soon as possible, his or her own
- administrative officer or other individual designated by that
- administrative officer of his or her action and the reasons for taking
- that action. The administrative officer needs to be certain that one
- of the following are also notified: the user or users whose files were
- inspected; the user's supervisor, project director, administrative
- officer, or academic advisor. It is a departmental responsibility that
- this notification occur, not a personal responsibility of the system
- administrator.
-
- In cases in which the user is not available in a timely fashion, in
- which the user is suspected of malicious intent to damage a computer
- system, or in which notifying the user would impede a sensitive
- investigation of serious computer abuse, the system administrator may
- inspect the information in question so long as he notifies his or her
- own administrative officer or other individual designated by the
- administrative officer of his or her actions and the reasons for taking
- those actions. The administrative officer needs to be certain that the
- user's supervisor, project director, administrative officer, or
- academic advisor is notified of the situation. In the case of
- suspected malicious intent, the administrative officer may also need to
- refer the matter to the appropriate University judicial body or to the
- Department of Public Safety.
-
- A system administrator may find it necessary to suspend or restrict a
- user's computing privileges during the investigation of a problem. The
- system administrator should confer with his or her administrative
- officer or other person designated by that administrative officer
- before taking this step. A user may appeal such a suspension or
- restriction and petition for reinstatement of computing privileges
- through the University's judicial system, through the grievance
- procedures outlined in the faculty collective bargaining agreement, or
- by petition to the Dean of Students.
-
- In general, then, a system administrator should
-
- - protect the integrity of the system entrusted to his or her care
-
- - respect the confidentiality of the information users have
- stored on the system
-
- - notify appropriate individuals when the above two aims have
- come into conflict
-
- - assist his or her administrative officer in referring cases of
- suspected abuse to the appropriate University judicial process.
-
-
-
- Penalties for Misuse of Computing and Information Resource Privileges
-
- Abuse of computing privileges is subject to disciplinary action. If
- system administrators or staff in the Department of Public Safety have
- a preponderance of evidence that intentional or malicious misuse of
- computing resources has occurred, and if that evidence points to the
- computing activities or the computer files of an individual, they have
- the obligation to pursue any or all of the following steps to protect
- the user community:
-
- - Notify the user's project director, instructor, academic
- advisor, or administrative officer of the investigation.
-
- - Refer the matter for processing through the University's
- judicial system. If necessary, staff members from a central computing
- agency such as Computing and Network Services as well as faculty
- members with computing expertise may be called upon to advise the
- University judicial officers on the implications of the evidence
- presented and, in the event of a finding of guilt, of the seriousness
- of the offense.
-
- - Suspend or restrict the user's computing privileges during the
- investigation. A user may appeal such a suspension or restriction and
- petition for reinstatement of computing privileges through the
- University's judicial system, through the grievance procedures outlined
- in the faculty collective bargaining agreement, or by petition to the
- Dean of Students.
-
- - Inspect that user's files, diskettes, and/or tapes. System
- administrators must be certain that the trail of evidence leads to the
- user's computing activities or computing files before inspecting the
- user's files.
-
- Ordinarily, the administrative officer whose department is responsible
- for the computing system on which the alleged misuse occurred should
- initiate proceedings. As the case develops, other administrative
- officers may, by mutual agreement, assume the responsibility for
- prosecuting the case.
-
- Disciplinary action may include the loss of computing privileges and
- other disciplinary sanctions up to and including non-reappointment,
- discharge, dismissal, and legal action. In some cases, an abuser of
- the University's computing resources may also be liable for civil or
- criminal prosecution.
-
- It should be understood that nothing in these guidelines precludes
- enforcement under the laws and regulations of the State of Delaware,
- any municipality or county therein, and/or the United States of
- America. For example, if you are found guilty of committing a
- computer crime as outlined in Title 11 $932-$936 of the Delaware Code,
- you could be subject to the penalties for a class B felony.
-
-
-
- Academic Honesty
-
- Faculty and students are reminded that computer-assisted plagiarism is
- still plagiarism. Unless specifically authorized by a class
- instructor, all of the following uses of a computer are violations of
- the University's guidelines for academic honesty and are punishable as
- acts of plagiarism:
-
- - copying a computer file that contains another student's
- assignment and submitting it as your own work
-
- - copying a computer file that contains another student's
- assignment and using it as a model for your own assignment
-
- - working together on an assignment, sharing the computer files
- or programs involved, and then submitting individual copies of the
- assignment as your own individual work
-
- - knowingly allowing another student to copy or use one of your
- computer files and to submit that file, or a modification thereof, as
- his or her individual work.
-
- For further information on this topic, students are urged to consult
- the University of Delaware Official Student Handbook, to consult with
- their individual instructors, and to refer to the pamphlet "Academic
- Honesty & Dishonesty: Important information for faculty and students."
-
- Faculty members are urged to develop specific policies regarding all
- aspects of academic honesty and to communicate those policies to their
- students in writing.
-
-
-
- Works Consulted
-
- Augustine, Charles. The Pieces of a Policy: Categories for Creation of
- a Computer Ethics Policy. Capitalizing on Communication: Proceedings
- of ACM SIGUCCS User Services Conference XVII. 1989.
-
- Baylor University. Computer Policies. 1989. Copy located in the
- computer file ethics/Baylor.policy on ariel.unm.edu.
-
- Catholic University of America, The. Statement of Ethics in the Use of
- Computers. 1988. [Reprinted in ACM SIGUCCS Newsletter. Volume 19,
- Number 1. 1989.]
-
- Chapman, Gary. CPSR [Computer Professionals for Social Responsibility]
- Statement on the Computer Virus. Communications of the ACM. Volume
- 32, Number 6. 1989.
-
- Colgate University. Agreement for use of Computing Facilities. 1989.
- Copy located in the computer file ethics/ColgateU.policy on
- ariel.unm.edu.
-
- Columbia University. Administrative Policies [of the Center for
- Computing Activities]. No date. Copy located in the computer file
- ethics/ColumbiaU.policy on ariel.unm.edu.
-
- Corporation for Research and Educational Networking. Acceptable Use of
- CSNET and BITNET. 1990. Received via electronic mail from Bernard A.
- Galler, March 23, 1990.
-
- Delaware Code (Annotated). Computer Related Offenses. Title 11,
- $931-$939. 1987.
-
- Delaware Code (Annotated), 1989 Supplement. Computer Related
- Offenses. Title 11, $937. 1989.
-
- EDUCOM and ADAPSO. Using Software: A guide to the ethical and legal
- use of software for members of the academic community. EDUCOM. 1987.
-
- Eichin, Mark W. and Jon A. Rochlis. With Microscope and Tweezers: An
- Analysis of the Internet Virus of November 1988. Paper presented at
- 1989 IEEE Symposium on Research in Security and Privacy. Copy located
- in the file pub/virus/mit.PS on bitsy.mit.edu.
-
- Ermann, M. David; Mary B. Williams; and Claudio Gutierrez. Computers,
- Ethics, and Society. Oxford University Press. 1990.
-
- Faculty Senate of the University of Delaware. Ethetical [sic] Conduct
- in Computing. Unpublished draft statement discussed by Faculty Senate
- in 1989.
-
- Farber, David J. NSF [National Science Foundation] Poses Code of
- Networking Ethics. Communications of the ACM. Volume 32, Number 6.
- 1989.
-
- Fraser Valley College. DRAFT: Fraser Valley College Computing and
- Ethics Policy, April 23, 1991. Copy received via electronic mail,
- April 24, 1991, from Paul Herman, Fraser Valley College.
-
- Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the
- Computer Frontier. Simon and Schuster. 1991.
-
- Hoffman, W. Michael and Jennifer Mills Moore, eds. Ethics and the
- Management of Computer Technology: Proceedings of the Fourth National
- Conference on Business Ethics Sponsored by the Center for Business
- Ethics, Bentley College. Oelgeschlager, Gunn, and Hain. 1982.
-
- Indiana University, Academic Computing Policy Committee, Subcommittee
- on Ethical Use of Computers. Computer Users' Privileges and
- Responsibilities: Indiana University. 1990. Copy received via
- electronic mail April 25, 1990, from Mark Sheehan, Indiana University
- Computing Services.
-
- Internet Activities Board. Ethics Policy Statement. 1988. [Reprinted
- in Purdue University's PUCC Newsletter. March 1989.]
-
- Internet Engineering Task Force. Site Security Handbook: RFC 1244.
- P. Holbrook and J. Reynolds, eds. July 1991. Copy located in the
- file pub/ssphwg/rfc1244.txt on cert.sei.cmu.edu.
-
- Johnson, Deborah G. Computer Ethics. Prentice Hall. 1985.
-
- Lees, John. [Michigan State University] College of Engineering
- Computer Use Policy - DRAFT. 1990. Received via electronic mail April
- 23, 1990, from John Lees.
-
- Mason, Margaret Loy. Students, Ethics & Electronic Communication: An
- Adventure in User Education. New Centerings in Computing Services:
- Proceedings of ACM SIGUCCS User Services Conference XVIII. 1990.
-
- National Science Foundation. NSFNET Interim Conditions of Use Policy.
- LINK LETTER. Volume 3, Number 3. 1990. Also available in the file
- nsfnet/netuse.txt on nis.nsf.net.
-
- Parker, Donn B.; Susan Swope; and Bruce N. Baker. Ethical Conflicts in
- Information and Computer Science, Technology, and Business. QED
- Information Sciences, Inc. 1990.
-
- Ryland, Jane N. Security--A Sleeper Issue Comes Into its Own.
- CAUSE/EFFECT. Volume 12, Number 4. 1989.
-
- Software Publishers Association. Software Use and the Law: A guide for
- individuals, educational institutions, user groups, and corporations.
- No date.
-
- Spafford, Eugene H. Some Musings on Ethics and Computer Break-Ins.
- 1989. Copy located in the file pub/virus/spaf.PS.Z on bitsy.mit.edu.
-
- Stoll, Cliff. The Cuckoo's Egg: Tracking a spy through the maze of
- computer espionage. Doubleday. 1989.
-
- Syracuse University. Computer Use Policy. No date.
-
- Temple University. Rules of Conduct for Using Computing Resources at
- Temple University. 1988.
-
- University of Delaware. Academic Honesty & Dishonesty: Important
- information for faculty and students. 1989.
-
- University of Delaware. Code of Conduct. Official Student Handbook.
- 1991.
-
- University of Delaware. Code of Ethics. Personnel Policies and
- Procedures for Professional and Salaried Staff. 1989.
-
- University of Delaware. Computer Software. University of Delaware
- Policy Manual. Policy 6-9. 1989.
-
- University of Delaware. Misconduct in Research. University of
- Delaware Policy Manual. Policy 6-11. 1989.
-
- University of Delaware. University of Delaware Faculty Handbook.
- 1991.
-
- University of Delaware. 1989-1990 Residence Halls Handbook. 1989.
-
- University of Delaware Libraries. Circulation Procedures and
- Services. No date.
-
- University of Michigan, Ann Arbor. Think About It: The Proper Use of
- Information Resources, Information Technology, and Networks at the
- University of Michigan. No Date.
-
- University of New Mexico. UNM Ethics Code for Computer Use [Draft].
- 1989. Copy located in the computer file ethics/UofNewMexico.policy on
- ariel.unm.edu.
-
- Weissman, Ronald F. E. Ethical and Responsible Computing. The OPEN
- WINDOW (Brown University), Volume 3, Number 1. 1989. [Cited in
- Ryland's article.]
-
-