home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.admin.policy:993 alt.comp.acad-freedom.talk:2725
- Newsgroups: comp.admin.policy,alt.comp.acad-freedom.talk
- Path: sparky!uunet!spool.mu.edu!yale.edu!jvnc.net!princeton!phoenix.Princeton.EDU!mgflax
- From: mgflax@phoenix.Princeton.EDU (Marshall G. Flax)
- Subject: Re: New Princeton Policy
- Message-ID: <1992Sep8.215238.13612@Princeton.EDU>
- Sender: news@Princeton.EDU (USENET News System)
- Nntp-Posting-Host: phoenix.princeton.edu
- Organization: Princeton University
- References: <1992Sep8.193517.12597@eff.org>
- Date: Tue, 8 Sep 1992 21:52:38 GMT
- Lines: 120
-
- In article <1992Sep8.193517.12597@eff.org> kadie@eff.org (Carl M. Kadie) writes:
-
- > 2. ... (Note: if an individual has explicitly
- > and intentionally established a public server, or
- > clearly designated a set of files as being for
- > shared public use, others may assume
- > authorization.)
-
- This parenthetical comment was added, in part, to allow people to browse
- through others' ~/pub and ~/Pub directories without fear of disciplinary
- action.
-
- > 3. You must not attempt to decrypt or translate
- > encrypted material, or obtain system privileges to
- > which you are not entitled. Attempts to do any of
- > these will be considered serious transgressions.
-
- According to a CIT representative, the phrase "to which you are not
- entitled" modifies *both* "system privileges" and "encrypted material",
- so one is allowed to decrypt material to which one is entitled. (You'd
- think the lawyers would have picked up on the ambiguity!)
-
- > 6. You must be sensitive to the public nature of
- > shared facilities, and take care not to display on
- > screens in such locations images, sounds or
- > messages which could create an atmosphere of
- > discomfort or harassment for others. You must also
- > refrain from transmitting to others in any location
- > inappropriate images, sounds or messages which
- > might reasonably be considered harassing.
-
- This seems reasonable: public clusters are shared, and people should
- show some consideration and politeness. Notice that the tone of this
- paragraph is less "imperative" than many of the others, and seems to be
- an exact parallel to PU's regulations regarding printed matter. The
- issue of USENET porn has been raised in campus newspapers last year.
-
- > 7. You must avoid tying up computing resources for
- > excessive game playing or other trivial
- > applications; sending frivolous or excessive mail
- > or messages locally or over an affiliated network;
- > printing excessive copies of documents, files,
- > images or data. You must refrain from using
- > unwarranted or excessive amounts of storage;
- > printing documents or files numerous times because
- > you have not checked thoroughly for all errors and
- > corrections; or running grossly inefficient
- > programs when efficient ones are available. You
- > must be sensitive to special need for software and
- > services available in only one location, and cede
- > place to those whose work requires the special
- > items.
-
- It should be noted that P'ton is liberal with disk space, makes games
- available for Macs through public file servers, offers nearly unlimited
- laser printing, and (regarding "grossly inefficient programs") offers
- emacs in addition to vi.
-
- > 8. You must not prevent others from using shared
- > resources by running unattended processes or
- > placing signs on devices to "reserve" them without
- > authorization. Your absence from a public computer
- > or workstation should be no longer than warranted
- > by a visit to the nearest restroom. A device
- > unattended for more than ten minutes may be assumed
- > to be available for use, and any process running on
- > that device terminated. You must not lock a
- > workstation or computer which is in a public
- > facility. You must also be sensitive to performance
- > effects of remote login to shared workstations:
- > when there is a conflict, priority for use of the
- > device must go to the person seated at the keyboard
- > rather than to someone logged on remotely.
-
- This does raise the unattended terminal problem, but it's hard to arrive
- at a platform-independent solution.
-
- > 10. If you create or maintain electronically-stored
- > information which is important to your work or to
- > the University in general, you are responsible for
- > making frequent backups of the information.
-
- The University still backs up mainframes, but they have a point here.
-
- > 11. Messages, sentiments, and declarations sent as
- > electronic mail or sent as electronic postings must
- > meet the same standards for distribution or display
- > as if they were tangible documents or instruments.
- > You are free to publish your opinions, but they
- > must be clearly and accurately identified as coming
- > from you, or, if you are acting as the authorized
- > agent of a group recognized by the University, as
- > coming from the group you are authorized to
- > represent. Attempts to alter the "From" line or
- > other attribution of origin in electronic mail,
- > messages, or postings, will be considered
- > transgressions of University rules.
-
- These also seem to mirror the U's policy for written material.
-
- > 12. If you create, alter, or delete any electronic
- > information contained in, or posted to, any campus
- > computer or affiliated network it will be
- > considered forgery if it would be considered so on
- > a tangible document or instrument.
-
- This looks pretty good.
-
- > 13. You must not create and send, or forward,
- > electronic chain letters.
-
- There is a school of thought which considers all of USENET to be a
- single chain letter.
-
- marshall
- --
- ============ 40 Linden Lane, Princeton, NJ 08540, 609-921-0962 ============
- =========== 5 Joyce Lane, Woodbury, NY 11797, 516-364-9331,9379 ==========
- ===== c/o Jack Gelfand,Psych Dept,Princeton U.,NJ 08544,609-258-2930 =====
- = Original material(c) 1992, Marshall Flax <mgflax@phoenix.Princeton.EDU> =
-