home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.comp.acad-freedom.talk
- Path: sparky!uunet!destroyer!sol.ctr.columbia.edu!eff!eff-gate!usenet
- From: kadie@cs.uiuc.edu (Carl M. Kadie)
- Subject: Cal State Fresno Policy
- Message-ID: <9211122243.AA19730@herodotus.cs.uiuc.edu>
- Originator: daemon@eff.org
- Sender: kadie@cs.uiuc.edu
- Nntp-Posting-Host: eff.org
- Organization: EFF mail-news gateway
- Date: Thu, 12 Nov 1992 10:43:45 GMT
- Approved: usenet@eff.org
- Lines: 66
-
- Department of Computer Science Policy on Computer Use
- California State University, Fresno
- August 1992
-
- The Department of Computer Science and California State University, Fresno
- provide computing resources to students, faculty and staff in support
- of programs of the Department. Computing resources includes local
- area networks and connections to other computer networks.
-
- All students, faculty, and staff are responsible for seeing that
- computing resources are used in an effective, ethical, and
- lawful manner.
-
- The Department disclaims responsibility for the loss of data or
- interference with files resulting from its efforts to maintain the
- privacy and security of the Department's computer facilities.
-
- The following policies relate to the use of Departmental facilities.
- These policies are in addition to existing University policies on
- plagiarism and appropriate use of facilities.
-
- 1. Computer facilities are owned by the University or Department
- and are to be used for Department-related activities only. Facilities
- will not be used for private consulting, other commercial purposes,
- or the installation of fraudulently or illegally obtained software or
- data.
-
- 2. An account assigned to an individual by the Department must not
- be used by others. The individual is responsible for the proper use of
- the account, including password protection. The individual must
- take all reasonable precautions, including password maintenance and
- file and directory protection measures, to prevent use of their
- account by unauthorized persons.
-
- 3. Programs and files are confidential unless they have explicitly
- been made available to other authorized users. Copying, renaming,
- changing, examining, or deleting files belonging to someone else is
- against policy. Department faculty and staff may access others' files
- when necessary for the maintenance of the computing facilities. When
- preforming maintenance, however, every effort will be made to insure
- the privacy of users' files.
-
- 4. Departmental computing resources, including electronic mail and
- other electronic communication, will not be used to annoy others. It
- is against policy to send obscene, abusive, or threatening messages.
-
- 5. Attempts to bypass standard procedures are not allowed. This
- includes, but is not limited to, attempts to discover another user's
- password, taking resources from other users, distribution or execution
- of a program that damages another user's files or Departmental
- computing resources, and gaining access to resources for which proper
- authorization has not been given.
-
- 6. Physical tampering with departmental resources is not allowed.
-
- 7. Users will not deliberately attempt to degrade system performance or
- to deprive authorized users access to Departmental computing resources.
-
- Failure to comply with the above guidelines shall constitute a violation
- of Department policy and will subject the violator to disciplinary or
- legal action by the Department or University. In addition, the
- University may require restitution for any use of computing resources
- that is in violation of the above guidelines.
-
- Users of Departmental computing resources are also subject to local,
- state, and federal laws.
-