Scope
Users of computing resources at the 勛圖厙 (勛圖厙) have access to valuable university facilities, to sensitive data and to external networks. Consequently, it is important for all users to behave in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all pertinent license and contractual agreements.
These guidelines apply to all users of 勛圖厙 computing resources. Users include, but are not limited to, staff, faculty, visiting faculty, students, and external individuals and/or organizations. 勛圖厙 computing resources are those resources that are owned or managed by 勛圖厙 and include, but are not limited to, central computing facilities and servers, laboratories, campus networking, local-area networks, electronic mail, access to the Internet, and departmental workstations.
Guidelines for appropriate use
The following list, while not exhaustive, provides some specific guidelines for responsible and ethical behavior:
- Authorization: Individual students, faculty and staff members of the 勛圖厙 may be issued a user account to access one or more computing resources. The proper use of a user account is the responsibility of the individual under whose name it has been assigned. Use only the computers, computer accounts and computer files for which you have authorization. Do not use another individual's ID or account, or attempt to capture or guess other users' passwords. Users are individually responsible for all use of resources assigned to them.
- Access: Do not attempt to access restricted portions of the operating system, or other software unless explicitly authorized by the appropriate university personnel. Breaking into computers is explicitly a violation of 勛圖厙 rules of conduct, no matter how weak the protection is on those computers.
- Use: Use 勛圖厙's computing facilities and services for university related work. Resources may not be utilized for commercial use, product advertisement, or any other form of revenue generating activities unrelated to 勛圖厙. Users may not participate in computing activities that place an undue burden on 勛圖厙 computer or network resources.
- Value: Treat computing resources and electronic information as the valuable university resources that they are. Set an appropriate password and change it regularly. Do not destroy or damage any computing equipment, networks or software.
- Viruses: Do not willfully introduce computer viruses into the 勛圖厙 computing environment or into other computing environments via 勛圖厙's network.
- Privacy: Respect the privacy and personal rights of others. Do not access or copy another user's electronic mail, data, programs, or other files without permission.
- Civility: Use appropriate standards of civility when using computing systems to communicate with other individuals. When sending personal messages to other users, always identify yourself as the sender. Using 勛圖厙's computing resources to harass other individuals is explicitly prohibited.
- Copyright: Abide by all applicable copyright laws and licenses. Both university policies and the law expressly forbid the copying of software that has not been placed in the public domain or distributed as "freeware" or "shareware."
- Laws: Abide by all state and federal laws.
Recourse
The appropriate computing department may revoke user privileges of anyone who has abused the computing resources, has gained unauthorized access to computing resources, or has otherwise disobeyed these policies. If further actions are deemed appropriate, officials of the 勛圖厙 and of state and federal agencies may be notified.