464 lines
16 KiB
Plaintext
464 lines
16 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
THE NET
|
|||
|
USER GUIDELINES AND NETIQUETTE
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
By: Arlene H. Rinaldi
|
|||
|
Computer User Services
|
|||
|
Florida Atlantic University
|
|||
|
September 3, 1992
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PREFACE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The formulation of this guide was motivated by a need to develop
|
|||
|
guidelines for all Internet protocols to ensure that users at Florida
|
|||
|
Atlantic University realize the Internet capabilities as a resource
|
|||
|
available, with the provision that they are responsible in how they access
|
|||
|
or transmit information through the Internet (The Net).
|
|||
|
|
|||
|
It is assumed that the reader has some familiarization with the terms and
|
|||
|
protocols that are referenced in this document.
|
|||
|
|
|||
|
Permission to duplicate or distribute this document is granted with the
|
|||
|
provision that the document remains intact.
|
|||
|
|
|||
|
For additions, comments, suggestions and requests for revisions, please
|
|||
|
send E-mail to RINALDI@ACC.FAU.EDU.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 3
|
|||
|
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ACKNOWLEDGEMENTS
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Much of this guide was developed from comments and suggestions from
|
|||
|
NETTRAIN@UBVM (formally NET-TRAIN) LISTSERV subscribers and from several
|
|||
|
sources available on The Net:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A special acknowledgment to Wes Morgan, University of
|
|||
|
Kentucky Engineering Computing Center, for his advice
|
|||
|
and recommendations.
|
|||
|
|
|||
|
|
|||
|
Paul F. Lambert, Bentley College; Philip M. Howard, Saint
|
|||
|
Mary's University; Gordon Swan, Florida Atlantic University;
|
|||
|
Pauline Kartrude, Florida Atlantic University; Beth Taney,
|
|||
|
Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry
|
|||
|
DeVries, Cornell; Jim Milles, SLU Law Library; Martin Raish,
|
|||
|
State University of New York at Binghamton; Steve Cisler,
|
|||
|
Apple Corporation; Tom Zillner, Wisconsin Interlibrary
|
|||
|
Services; Tom Goodrich, Stanford University; Jim Gerland,
|
|||
|
State University of NY at Buffalo; Ros Leibensperger, Cornell;
|
|||
|
Paul White, Northern Michigan University; Marilyn S. Welb,
|
|||
|
Penn State, Judith Hopkins, State University of NY at Buffalo,
|
|||
|
Ros McCarthy.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 4
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It is essential for each user on the network to recognize his/her
|
|||
|
responsibility in having access to vast services, sites, systems and
|
|||
|
people. The user is ultimately responsible for his/her actions in
|
|||
|
accessing network services.
|
|||
|
|
|||
|
The "Internet" or "The Net", is not a single network; rather, it is a
|
|||
|
group of thousands of individual networks which have chosen to allow
|
|||
|
traffic to pass among them. The traffic sent out to the Internet may
|
|||
|
actually traverse several different networks before it reaches its
|
|||
|
destination. Therefore, users involved in this internetworking must be
|
|||
|
aware of the load placed on other participating networks.
|
|||
|
|
|||
|
As a user of the network, you may be allowed to access other networks
|
|||
|
(and/or the computer systems attached to those networks). Each network or
|
|||
|
system has its own set of policies and procedures. Actions which are
|
|||
|
routinely allowed on one network/system may be controlled, or even
|
|||
|
forbidden, on other networks. It is the users responsibility to abide by
|
|||
|
the policies and procedures of these other networks/systems. Remember,
|
|||
|
the fact that a user *can* perform a particular action does not imply that
|
|||
|
they *should* take that action.
|
|||
|
|
|||
|
The use of the network is a privilege, not a right, which may temporarily
|
|||
|
be revoked at any time for abusive conduct. Such conduct would include,
|
|||
|
the placing of unlawful information on a system, the use of abusive or
|
|||
|
otherwise objectionable language in either public or private messages, the
|
|||
|
sending of messages that are likely to result in the loss of recipients'
|
|||
|
work or systems, the sending of "Chain letters," or "broadcast" messages
|
|||
|
to lists or individuals, and any other types of use which would cause
|
|||
|
congestion of the networks or otherwise interfere with the work of
|
|||
|
others..
|
|||
|
|
|||
|
Permanent revocations can result from disciplinary actions taken by a
|
|||
|
panel judiciary board called upon to investigate network abuses.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 5
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
ELECTRONIC MAIL AND FILES
|
|||
|
USER RESPONSIBILITY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The content and maintenance of a user's electronic mailbox is the users
|
|||
|
responsibility:
|
|||
|
|
|||
|
- Check E-mail daily and remain within your limited disk quota.
|
|||
|
|
|||
|
- Delete unwanted messages immediately since they take up disk
|
|||
|
storage.
|
|||
|
|
|||
|
- Keep messages remaining in your electronic mailbox to a minimum.
|
|||
|
|
|||
|
- Mail messages can be downloaded or extracted to files then to disks
|
|||
|
for future reference.
|
|||
|
|
|||
|
- Never assume that your E-mail can be read by no one except
|
|||
|
yourself; others may be able to read or access your mail. Never
|
|||
|
send or keep anything that you would not mind seeing on
|
|||
|
the evening news.
|
|||
|
|
|||
|
|
|||
|
The content and maintenance of a user's disk storage area is the users
|
|||
|
responsibility:
|
|||
|
|
|||
|
- Keep files to a minimum. Files should be downloaded to your
|
|||
|
personal computer's hard drive or to disks.
|
|||
|
|
|||
|
- Routinely and frequently virus scan your system, especially when
|
|||
|
receiving or downloading files from other systems to prevent the
|
|||
|
spread of a virus.
|
|||
|
|
|||
|
- Your files may be accessible by persons with system privileges,
|
|||
|
so do not maintain anything private in your disk storage area.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 6
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
TELNET PROTOCOL
|
|||
|
|
|||
|
- Many telnetable services have documentation files available online
|
|||
|
(or via ftp). Download and review instructions locally as opposed
|
|||
|
to tying up ports trying to figure out the system.
|
|||
|
|
|||
|
- Be courteous to other users wishing to seek information or the
|
|||
|
institution might revoke Telnet access; remain only on the system
|
|||
|
long enough to get your information, then exit off of the system.
|
|||
|
|
|||
|
- Screen captured data or information should be downloaded to your
|
|||
|
personal computer's hard disk or to disks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
ANONYMOUS FTP - FILE TRANSFER PROTOCOL
|
|||
|
|
|||
|
|
|||
|
- Users should respond to the PASSWORD prompt with their E-mail
|
|||
|
address, so if that site chooses, it can track the level of FTP
|
|||
|
usage. If your E-mail address causes an error, enter GUEST for the
|
|||
|
next PASSWORD prompt.
|
|||
|
|
|||
|
- When possible limit downloads, especially large downloads (1 Meg+),
|
|||
|
for after normal business hours locally and for the remote ftp host;
|
|||
|
preferably late in the evening.
|
|||
|
|
|||
|
- Adhere to time restrictions as requested by archive sites. Think in
|
|||
|
terms of the current time at the site that's being visited, not of
|
|||
|
local time.
|
|||
|
|
|||
|
- Copy downloaded files to your personal computer hard drive or disks
|
|||
|
to remain within disk quota.
|
|||
|
|
|||
|
- When possible, inquiries to Archie should be in mail form.
|
|||
|
|
|||
|
- It's the user's responsibility when downloading programs, to check
|
|||
|
for copyright or licensing agreements. If the program is beneficial
|
|||
|
to your use, pay any authors registration fee. If there is any
|
|||
|
doubt, don't copy it; there have been many occasions on which
|
|||
|
copyrighted software has found its way into ftp archives. Support
|
|||
|
for any downloaded programs should be requested from the originator
|
|||
|
of the application. Remove unwanted programs from your systems.
|
|||
|
|
|||
|
|
|||
|
Page 7
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
ELECTRONIC COMMUNICATIONS
|
|||
|
(E-mail, LISTSERV groups, Mailing lists, and Usenet)
|
|||
|
|
|||
|
|
|||
|
- Keep paragraphs and messages short and to the point.
|
|||
|
|
|||
|
- Focus on one subject per message.
|
|||
|
|
|||
|
- Be professional and careful what you say about others. E-mail is
|
|||
|
easily forwarded.
|
|||
|
|
|||
|
- Cite all quotes, references and sources.
|
|||
|
|
|||
|
- Limit line length and avoid control characters.
|
|||
|
|
|||
|
- Follow chain of command procedures for corresponding with superiors.
|
|||
|
|
|||
|
For example, don't send a complaint via E-mail directly to the "top"
|
|||
|
just because you can.
|
|||
|
|
|||
|
- Don't use the academic networks for commercial or proprietary work.
|
|||
|
|
|||
|
- Include your signature at the bottom of E-mail messages. Your
|
|||
|
signature footer should include your name, position, affiliation and
|
|||
|
Internet and/or BITNET addresses and should not exceed more than 4
|
|||
|
lines. Optional information could include your address and phone
|
|||
|
number.
|
|||
|
|
|||
|
- Capitalize words only to highlight an important point or to
|
|||
|
distinguish a title or heading. *Asterisks* surrounding a word
|
|||
|
also can be used to make a stronger point.
|
|||
|
|
|||
|
- Use discretion when forwarding mail to group addresses or
|
|||
|
distribution lists. It's preferable to reference the source of a
|
|||
|
document and provide instructions on how to obtain a copy.
|
|||
|
|
|||
|
- It is considered extremely rude to forward personal email to mailing
|
|||
|
lists or Usenet without the original author's permission.
|
|||
|
|
|||
|
- Be careful when using sarcasm and humor. Without face to face
|
|||
|
communications your joke may be viewed as criticism.
|
|||
|
|
|||
|
- Respect copyright and license agreements.
|
|||
|
|
|||
|
- When quoting another person, edit out whatever isn't directly
|
|||
|
applicable to your reply. Including the entire article will annoy
|
|||
|
those reading it.
|
|||
|
|
|||
|
- Abbreviate when possible:
|
|||
|
|
|||
|
Examples:
|
|||
|
- IMHO = in my humble/honest opinion
|
|||
|
- FYI = for your information
|
|||
|
- BTW = by the way
|
|||
|
- Flame = antagonistic criticism
|
|||
|
- :-) = happy face for humor
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 8
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
LISTSERV AND MAILING LIST DISCUSSION GROUPS
|
|||
|
|
|||
|
Some mailing lists have low rates of traffic, others can flood your
|
|||
|
mailbox with several hundred mail messages per day. Numerous incoming
|
|||
|
messages from various listservers or mailing lists by multiple users,
|
|||
|
requires extensive system processing which can tie up valuable resources.
|
|||
|
Subscription to Interest Groups or Discussion Lists should be kept to a
|
|||
|
minimum and should not exceed what your disk quota can handle, or you for
|
|||
|
that matter.
|
|||
|
|
|||
|
- Keep your questions and comments relevant to the focus of the
|
|||
|
discussion group.
|
|||
|
|
|||
|
- Resist the temptation to "flame" others on the list. Remember that
|
|||
|
these discussions are "public" and meant for constructive exchanges.
|
|||
|
Treat the others on the list as you would want them to treat you.
|
|||
|
|
|||
|
- When posting a question to the discussion group, request that
|
|||
|
responses be directed to you personally. Post a summary or answer
|
|||
|
to your question to the group.
|
|||
|
|
|||
|
- When replying to a message posted to a discussion group, check the
|
|||
|
address to be certain it's going to the intended location (person or
|
|||
|
group).
|
|||
|
|
|||
|
- When signing up for a group, save your subscription confirmation
|
|||
|
letter for reference.
|
|||
|
|
|||
|
- When going away for more than a week, unsubscribe or suspend mail
|
|||
|
from any mailing lists or LISTSERV services.
|
|||
|
|
|||
|
- If you can respond to someone else's question, do so through email.
|
|||
|
Twenty people answering the same question on a large list can fill
|
|||
|
your mailbox (and those of everyone else on the list) quickly.
|
|||
|
|
|||
|
- Use your own personal E-mail account, don't subscribe using a shared
|
|||
|
office account.
|
|||
|
|
|||
|
- Occassionaly subscribers to the list who are not familiar with
|
|||
|
proper netiquette will submit requests to SUBSCRIBE or UNSUBSCRIBE
|
|||
|
directly to the list itself. Be tolerant of this activity, and
|
|||
|
possibly provide some useful advice as opposed to being critical.
|
|||
|
|
|||
|
- Other people on the list are not interested in your desire to be
|
|||
|
added or deleted. Any requests regarding administrative tasks such
|
|||
|
as being added or removed from a list should be made to the
|
|||
|
appropriate area, not the list itself. Mail for these types of
|
|||
|
requests should be sent to the following respectively:
|
|||
|
|
|||
|
LISTSERV GROUPS - LISTSERV@host
|
|||
|
|
|||
|
|
|||
|
MAILING LISTS - listname-REQUEST@host
|
|||
|
or
|
|||
|
listname-OWNER@host
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 9
|
|||
|
|
|||
|
For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe,
|
|||
|
in the body of the message include:
|
|||
|
|
|||
|
SUBSCRIBE listname yourfirstname yourlastname
|
|||
|
(To be added to the subscription)
|
|||
|
or
|
|||
|
UNSUBSCRIBE listname
|
|||
|
(To be removed from the subscription)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
|
|||
|
THE TEN COMMANDMENTS FOR COMPUTER ETHICS
|
|||
|
from the Computer Ethics Institute
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1. Thou shalt not use a computer to harm other people.
|
|||
|
|
|||
|
2. Thou shalt not interfere with other people's computer work.
|
|||
|
|
|||
|
3. Thou shalt not snoop around in other people's files.
|
|||
|
|
|||
|
4. Thou shalt not use a computer to steal.
|
|||
|
|
|||
|
5. Thou shalt not use a computer to bear false witness.
|
|||
|
|
|||
|
6. Thou shalt not use or copy software for which you have not
|
|||
|
paid.
|
|||
|
|
|||
|
7. Thou shalt not use other people's computer resources without
|
|||
|
authorization.
|
|||
|
|
|||
|
8. Thou shalt not appropriate other people's intellectual output.
|
|||
|
|
|||
|
9. Thou shalt think about the social consequences of the program
|
|||
|
you write.
|
|||
|
|
|||
|
10. Thou shalt use a computer in ways that show consideration and
|
|||
|
respect.
|
|||
|
|
|||
|
|
|||
|
Page 10
|
|||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
|||
|
|
|||
|
BIBLIOGRAPHY
|
|||
|
|
|||
|
Kehoe, Brendan P. "A Beginner's Guide to the Internet: Zen and the
|
|||
|
Art of the Internet", First Edition, January 1992.
|
|||
|
|
|||
|
Shapiro, Norman, et al. "Towards an Ethics and Etiquette for
|
|||
|
Electronic Mail"., Santa Monica, CA: Rand Corporation (publication
|
|||
|
R-3283-NSF/RC), 1985.
|
|||
|
|
|||
|
Von Rospach, Chuq. "A Primer on How to Work With the USENET
|
|||
|
Community"
|
|||
|
|
|||
|
Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet"
|
|||
|
|
|||
|
"A Guide to Electronic Communication & Network Etiquette", revised
|
|||
|
and submitted by Joan Gargano, edited by Ivars Balkits, Computing services
|
|||
|
University of California Davis.
|
|||
|
|
|||
|
"Heartland Free-Net Registered User Guidelines", Bradley University,
|
|||
|
Peoria, Il.
|
|||
|
|
|||
|
"Terms and Conditions of Membership and Affiliation", CREN
|
|||
|
Information Center, October 25, 1990
|
|||
|
|
|||
|
"Electronic Mail and Networks: New Tools for Institutional Research
|
|||
|
and Planning." by Dan Updegrove, John Muffo and Jack Dunn, University of
|
|||
|
Pennsylvania.
|
|||
|
|
|||
|
"Exploring Internet Training Series, Module 1- Exploring Internet:
|
|||
|
Using your Computer to Communicate", by Deborah Shaffer, ES-USDA, CIT and
|
|||
|
Pennsylvania State University, Henry DeVries; Extension Electronic
|
|||
|
Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT.
|
|||
|
|
|||
|
"Exploring Internet Training Series, Module 2- Mail-based
|
|||
|
Information Delivery: Alamanac and Listservs". by Deborah Shaffer, ES-
|
|||
|
USDA, CIT and Pennsylavia State University; Henry DeVries, Extension
|
|||
|
Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA,
|
|||
|
CIT.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.
|