137 lines
7.7 KiB
Plaintext
137 lines
7.7 KiB
Plaintext
|
MTU Policies
|
|||
|
Michigan Technological University (MTU) promotes the use of its computing
|
|||
|
facilities and seeks to improve the computer literacy of its students. All
|
|||
|
students are encouraged to make use of these facilities in pursuit of their
|
|||
|
academic goals, but are asked to remember that computing facilities are to
|
|||
|
be used for academic purposes only. MTU views the use of computer
|
|||
|
facilities as a privilege, not a right, and seeks to protect legitimate
|
|||
|
computer users by imposing sanctions on those who abuse the privilege.
|
|||
|
Eliminating computer abuse provides more computing resources for users with
|
|||
|
legitimate academic computing needs.
|
|||
|
MTU's computing policy is based on the laws of the State of Michigan and
|
|||
|
United States Copyright Law. In addition, MTU imposes certain restrictions
|
|||
|
which are not specifically covered by wither law. Besides setting
|
|||
|
guidelines for appropriate use of computers, MTU's policy outlines the
|
|||
|
disciplinary procedures that will be imposed on students who violate the
|
|||
|
policy. Such discipline may range from the revocation of computing
|
|||
|
privileges to expulsion from the University.
|
|||
|
|
|||
|
The Law of the State of Michigan
|
|||
|
Act 53 of the Public Acts of 1979 of the State of Michigan is "AN ACT to
|
|||
|
prohibit access to computers, computing systems, and computer networks for
|
|||
|
certain fraudulent purposes; to prohibit intentional and unauthorized
|
|||
|
access, alteration, damage, and destruction of computers, computer systems,
|
|||
|
computer networks, computer software programs, and data; and to prescribe
|
|||
|
penalties."
|
|||
|
|
|||
|
Examples of violations of Public Act 53 include:
|
|||
|
|
|||
|
o Unauthorized attempts to access or use information.
|
|||
|
o Attempts to access the computer files belonging to another user without
|
|||
|
permission.
|
|||
|
o Attempts to interfere with the performance of computing systems.
|
|||
|
|
|||
|
The penalties for violating this act are stated as follows:
|
|||
|
|
|||
|
"A person who violates this act, if the violation involves $100.00 or
|
|||
|
less, is guilty of a misdemeanor. If the violation involved more than
|
|||
|
$100.00, the person is guilty of a felony, punishable by imprisonment for
|
|||
|
not more than ten (10) years, or a fine of not more than $5,000.00, or
|
|||
|
both."
|
|||
|
|
|||
|
United States Copyright Law
|
|||
|
Copyright is a form of protection provided by the laws of the United States
|
|||
|
(Title 17, U.S. Code) to the authors of "original works of authorship."
|
|||
|
This includes computer programs (software). Therefore, the unauthorized
|
|||
|
copying of copyrighted software is in violation of U.S. copyright laws.
|
|||
|
|
|||
|
Additional restrictions imposed by MTU
|
|||
|
o Permitting another person to use a computer user identification (userid)
|
|||
|
or access card.
|
|||
|
o Using another person's userid or access card.
|
|||
|
o Using computing facilities for personal profit.
|
|||
|
o Transmitting unsolicited or annoying messages.
|
|||
|
o Transmitting, executing, or storing malicious, threatening, or abusive
|
|||
|
programs or material.
|
|||
|
o Playing games.
|
|||
|
|
|||
|
Discipline Procedure
|
|||
|
Misuses of computer resources are reported to the Director of Academic
|
|||
|
Computing Services. The Director of Academic Computing Services can impose
|
|||
|
restrictions on the offender's computer privileged, report the offender to
|
|||
|
the Dean of Students, or initiate criminal prosecution.
|
|||
|
|
|||
|
----------- Cut here-----------
|
|||
|
|
|||
|
Comments:
|
|||
|
______________________
|
|||
|
As I understand it, within the next month every current computer user of ACS
|
|||
|
machines (our IBM, our PCs, our SUNs, in fact nearly everything students CAN
|
|||
|
use) will have to sign and pledge to abide by this policy, or they will lose
|
|||
|
computing privileges. I personally can see many of the points in the
|
|||
|
document, though I have problems with it as well (part of my reason for
|
|||
|
posting it). For example, in sentence two, the policy states, 'computing
|
|||
|
facilities are to be used for academic purposes only.' Nowhere is there a
|
|||
|
definition of 'academic purposes' -- by one simple hypothesis, what I am
|
|||
|
doing now is in violation of the policy, since this does not involve my
|
|||
|
academic furthering at MTU (yes, I am a student, to graduate next year with
|
|||
|
luck and lots of cash). In the next sentence, 'legitimate computer users'
|
|||
|
and 'abuse the privilege' are more examples of empty wording, freely
|
|||
|
interpreted by Administration to whatever they choose. Under 'Additional
|
|||
|
Restrictions' we have 'Transmitting unsolicited or annoying messages' and
|
|||
|
'Transmitting, executing, or storing malicious, threatening, or abusive
|
|||
|
programs or material.' Define solicited. Since saying 'Hi' to someone is
|
|||
|
unsolicited, so is 'You can talk to me'. Therefore, by a restrictive
|
|||
|
viewpoint, messaging is illegal (so is this, again, and any other e-mail not
|
|||
|
specifically asked for, though how it can be asked for is beyond me).
|
|||
|
|
|||
|
We also need definitions of malicious, threatening, or abusive, beyond the
|
|||
|
blatantly obvious. While I am considered fairly conservative by many, I am
|
|||
|
a flaming liberal by many standards. What I consider malicious,
|
|||
|
threatening, or abusive is probably far away from our Administration's view.
|
|||
|
Yet there is no definition, so (in theory) any Consultant here could grab
|
|||
|
some output of mine, read through it (I have been told it is their JOB to
|
|||
|
read our output) and decide since I don't hold his/her opinions, I should
|
|||
|
get nuked. I would then be ordered to see the Director, whereupon I would
|
|||
|
be lectured at great length about how bad and evil I am because I hold
|
|||
|
liberal views.
|
|||
|
|
|||
|
Now, before y'all out there start sending letters to the staff here telling
|
|||
|
them how much of a rebel I am, and how I should be purged for not supporting
|
|||
|
their policies 1000%... I want to make it known that, in PRINCIPLE, I
|
|||
|
support the policy. My computing experience here has, for the most part,
|
|||
|
been a good one, even though I have been yelled at a few times (mistakenly,
|
|||
|
though the error was not one-sided). I make wide and good use of the
|
|||
|
facilities here, and those of BITNET. I like to think that I have made a
|
|||
|
positive impact on computing at MTU, through my public disk (linked to by
|
|||
|
over 230 people), through my programs (many of which are now used at sites
|
|||
|
across the Net), and through my continual efforts to encourage people here
|
|||
|
to use the system responsibly. But I have noticed a trend in computing
|
|||
|
here, one which I think may be taking place at other sites, as well.
|
|||
|
Students are getting more and more cocky, administrators are getting
|
|||
|
restrictive, and the state of computing is falling. It need not be this
|
|||
|
way. If computing centers would educate their users in responsibility --
|
|||
|
realize they make mistakes -- not treat every infraction, however minor, as
|
|||
|
if it were a first-degree homicide -- and try honestly to become
|
|||
|
user-friendly and user-accessible; if users would realize THEY are
|
|||
|
responsible for their acts -- try and make fewer, and smaller, mistakes --
|
|||
|
think before they compute -- realize what they do CAN get their
|
|||
|
administration in trouble -- get to know their computing center staff, then
|
|||
|
I think we might see a big leap forward in the world of computing.
|
|||
|
|
|||
|
It _CAN_ happen.
|
|||
|
It starts with YOU and ME.
|
|||
|
|
|||
|
*dust off* There. I'll put my soapbox away, now. Thanks for putting up
|
|||
|
with me, sorry if I clogged up your readers with 'non-essential' mail.
|
|||
|
|
|||
|
|
|||
|
Virtually,
|
|||
|
David B. O'Donnell <LUTHER@MTUS5>
|
|||
|
________________________________________________________________________
|
|||
|
DISCLAIMER: The views expressed in this file are solely my own and are not
|
|||
|
intended to represent those of anyone else save where their stated views
|
|||
|
match mine. In particular these views are not meant to suggest agreement
|
|||
|
with the views of my employer or university.
|
|||
|
|