464 lines
16 KiB
Plaintext
464 lines
16 KiB
Plaintext
|
||
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
THE NET
|
||
USER GUIDELINES AND NETIQUETTE
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
|
||
By: Arlene H. Rinaldi
|
||
Computer User Services
|
||
Florida Atlantic University
|
||
September 3, 1992
|
||
|
||
|
||
|
||
|
||
Page 2
|
||
|
||
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
|
||
PREFACE
|
||
|
||
|
||
|
||
The formulation of this guide was motivated by a need to develop
|
||
guidelines for all Internet protocols to ensure that users at Florida
|
||
Atlantic University realize the Internet capabilities as a resource
|
||
available, with the provision that they are responsible in how they access
|
||
or transmit information through the Internet (The Net).
|
||
|
||
It is assumed that the reader has some familiarization with the terms and
|
||
protocols that are referenced in this document.
|
||
|
||
Permission to duplicate or distribute this document is granted with the
|
||
provision that the document remains intact.
|
||
|
||
For additions, comments, suggestions and requests for revisions, please
|
||
send E-mail to RINALDI@ACC.FAU.EDU.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Page 3
|
||
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
|
||
ACKNOWLEDGEMENTS
|
||
|
||
|
||
|
||
Much of this guide was developed from comments and suggestions from
|
||
NETTRAIN@UBVM (formally NET-TRAIN) LISTSERV subscribers and from several
|
||
sources available on The Net:
|
||
|
||
|
||
|
||
A special acknowledgment to Wes Morgan, University of
|
||
Kentucky Engineering Computing Center, for his advice
|
||
and recommendations.
|
||
|
||
|
||
Paul F. Lambert, Bentley College; Philip M. Howard, Saint
|
||
Mary's University; Gordon Swan, Florida Atlantic University;
|
||
Pauline Kartrude, Florida Atlantic University; Beth Taney,
|
||
Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry
|
||
DeVries, Cornell; Jim Milles, SLU Law Library; Martin Raish,
|
||
State University of New York at Binghamton; Steve Cisler,
|
||
Apple Corporation; Tom Zillner, Wisconsin Interlibrary
|
||
Services; Tom Goodrich, Stanford University; Jim Gerland,
|
||
State University of NY at Buffalo; Ros Leibensperger, Cornell;
|
||
Paul White, Northern Michigan University; Marilyn S. Welb,
|
||
Penn State, Judith Hopkins, State University of NY at Buffalo,
|
||
Ros McCarthy.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Page 4
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
|
||
INTRODUCTION
|
||
|
||
|
||
|
||
|
||
It is essential for each user on the network to recognize his/her
|
||
responsibility in having access to vast services, sites, systems and
|
||
people. The user is ultimately responsible for his/her actions in
|
||
accessing network services.
|
||
|
||
The "Internet" or "The Net", is not a single network; rather, it is a
|
||
group of thousands of individual networks which have chosen to allow
|
||
traffic to pass among them. The traffic sent out to the Internet may
|
||
actually traverse several different networks before it reaches its
|
||
destination. Therefore, users involved in this internetworking must be
|
||
aware of the load placed on other participating networks.
|
||
|
||
As a user of the network, you may be allowed to access other networks
|
||
(and/or the computer systems attached to those networks). Each network or
|
||
system has its own set of policies and procedures. Actions which are
|
||
routinely allowed on one network/system may be controlled, or even
|
||
forbidden, on other networks. It is the users responsibility to abide by
|
||
the policies and procedures of these other networks/systems. Remember,
|
||
the fact that a user *can* perform a particular action does not imply that
|
||
they *should* take that action.
|
||
|
||
The use of the network is a privilege, not a right, which may temporarily
|
||
be revoked at any time for abusive conduct. Such conduct would include,
|
||
the placing of unlawful information on a system, the use of abusive or
|
||
otherwise objectionable language in either public or private messages, the
|
||
sending of messages that are likely to result in the loss of recipients'
|
||
work or systems, the sending of "Chain letters," or "broadcast" messages
|
||
to lists or individuals, and any other types of use which would cause
|
||
congestion of the networks or otherwise interfere with the work of
|
||
others..
|
||
|
||
Permanent revocations can result from disciplinary actions taken by a
|
||
panel judiciary board called upon to investigate network abuses.
|
||
|
||
|
||
|
||
Page 5
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
ELECTRONIC MAIL AND FILES
|
||
USER RESPONSIBILITY
|
||
|
||
|
||
|
||
The content and maintenance of a user's electronic mailbox is the users
|
||
responsibility:
|
||
|
||
- Check E-mail daily and remain within your limited disk quota.
|
||
|
||
- Delete unwanted messages immediately since they take up disk
|
||
storage.
|
||
|
||
- Keep messages remaining in your electronic mailbox to a minimum.
|
||
|
||
- Mail messages can be downloaded or extracted to files then to disks
|
||
for future reference.
|
||
|
||
- Never assume that your E-mail can be read by no one except
|
||
yourself; others may be able to read or access your mail. Never
|
||
send or keep anything that you would not mind seeing on
|
||
the evening news.
|
||
|
||
|
||
The content and maintenance of a user's disk storage area is the users
|
||
responsibility:
|
||
|
||
- Keep files to a minimum. Files should be downloaded to your
|
||
personal computer's hard drive or to disks.
|
||
|
||
- Routinely and frequently virus scan your system, especially when
|
||
receiving or downloading files from other systems to prevent the
|
||
spread of a virus.
|
||
|
||
- Your files may be accessible by persons with system privileges,
|
||
so do not maintain anything private in your disk storage area.
|
||
|
||
|
||
|
||
|
||
|
||
Page 6
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
TELNET PROTOCOL
|
||
|
||
- Many telnetable services have documentation files available online
|
||
(or via ftp). Download and review instructions locally as opposed
|
||
to tying up ports trying to figure out the system.
|
||
|
||
- Be courteous to other users wishing to seek information or the
|
||
institution might revoke Telnet access; remain only on the system
|
||
long enough to get your information, then exit off of the system.
|
||
|
||
- Screen captured data or information should be downloaded to your
|
||
personal computer's hard disk or to disks.
|
||
|
||
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
ANONYMOUS FTP - FILE TRANSFER PROTOCOL
|
||
|
||
|
||
- Users should respond to the PASSWORD prompt with their E-mail
|
||
address, so if that site chooses, it can track the level of FTP
|
||
usage. If your E-mail address causes an error, enter GUEST for the
|
||
next PASSWORD prompt.
|
||
|
||
- When possible limit downloads, especially large downloads (1 Meg+),
|
||
for after normal business hours locally and for the remote ftp host;
|
||
preferably late in the evening.
|
||
|
||
- Adhere to time restrictions as requested by archive sites. Think in
|
||
terms of the current time at the site that's being visited, not of
|
||
local time.
|
||
|
||
- Copy downloaded files to your personal computer hard drive or disks
|
||
to remain within disk quota.
|
||
|
||
- When possible, inquiries to Archie should be in mail form.
|
||
|
||
- It's the user's responsibility when downloading programs, to check
|
||
for copyright or licensing agreements. If the program is beneficial
|
||
to your use, pay any authors registration fee. If there is any
|
||
doubt, don't copy it; there have been many occasions on which
|
||
copyrighted software has found its way into ftp archives. Support
|
||
for any downloaded programs should be requested from the originator
|
||
of the application. Remove unwanted programs from your systems.
|
||
|
||
|
||
Page 7
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
ELECTRONIC COMMUNICATIONS
|
||
(E-mail, LISTSERV groups, Mailing lists, and Usenet)
|
||
|
||
|
||
- Keep paragraphs and messages short and to the point.
|
||
|
||
- Focus on one subject per message.
|
||
|
||
- Be professional and careful what you say about others. E-mail is
|
||
easily forwarded.
|
||
|
||
- Cite all quotes, references and sources.
|
||
|
||
- Limit line length and avoid control characters.
|
||
|
||
- Follow chain of command procedures for corresponding with superiors.
|
||
|
||
For example, don't send a complaint via E-mail directly to the "top"
|
||
just because you can.
|
||
|
||
- Don't use the academic networks for commercial or proprietary work.
|
||
|
||
- Include your signature at the bottom of E-mail messages. Your
|
||
signature footer should include your name, position, affiliation and
|
||
Internet and/or BITNET addresses and should not exceed more than 4
|
||
lines. Optional information could include your address and phone
|
||
number.
|
||
|
||
- Capitalize words only to highlight an important point or to
|
||
distinguish a title or heading. *Asterisks* surrounding a word
|
||
also can be used to make a stronger point.
|
||
|
||
- Use discretion when forwarding mail to group addresses or
|
||
distribution lists. It's preferable to reference the source of a
|
||
document and provide instructions on how to obtain a copy.
|
||
|
||
- It is considered extremely rude to forward personal email to mailing
|
||
lists or Usenet without the original author's permission.
|
||
|
||
- Be careful when using sarcasm and humor. Without face to face
|
||
communications your joke may be viewed as criticism.
|
||
|
||
- Respect copyright and license agreements.
|
||
|
||
- When quoting another person, edit out whatever isn't directly
|
||
applicable to your reply. Including the entire article will annoy
|
||
those reading it.
|
||
|
||
- Abbreviate when possible:
|
||
|
||
Examples:
|
||
- IMHO = in my humble/honest opinion
|
||
- FYI = for your information
|
||
- BTW = by the way
|
||
- Flame = antagonistic criticism
|
||
- :-) = happy face for humor
|
||
|
||
|
||
|
||
Page 8
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
LISTSERV AND MAILING LIST DISCUSSION GROUPS
|
||
|
||
Some mailing lists have low rates of traffic, others can flood your
|
||
mailbox with several hundred mail messages per day. Numerous incoming
|
||
messages from various listservers or mailing lists by multiple users,
|
||
requires extensive system processing which can tie up valuable resources.
|
||
Subscription to Interest Groups or Discussion Lists should be kept to a
|
||
minimum and should not exceed what your disk quota can handle, or you for
|
||
that matter.
|
||
|
||
- Keep your questions and comments relevant to the focus of the
|
||
discussion group.
|
||
|
||
- Resist the temptation to "flame" others on the list. Remember that
|
||
these discussions are "public" and meant for constructive exchanges.
|
||
Treat the others on the list as you would want them to treat you.
|
||
|
||
- When posting a question to the discussion group, request that
|
||
responses be directed to you personally. Post a summary or answer
|
||
to your question to the group.
|
||
|
||
- When replying to a message posted to a discussion group, check the
|
||
address to be certain it's going to the intended location (person or
|
||
group).
|
||
|
||
- When signing up for a group, save your subscription confirmation
|
||
letter for reference.
|
||
|
||
- When going away for more than a week, unsubscribe or suspend mail
|
||
from any mailing lists or LISTSERV services.
|
||
|
||
- If you can respond to someone else's question, do so through email.
|
||
Twenty people answering the same question on a large list can fill
|
||
your mailbox (and those of everyone else on the list) quickly.
|
||
|
||
- Use your own personal E-mail account, don't subscribe using a shared
|
||
office account.
|
||
|
||
- Occassionaly subscribers to the list who are not familiar with
|
||
proper netiquette will submit requests to SUBSCRIBE or UNSUBSCRIBE
|
||
directly to the list itself. Be tolerant of this activity, and
|
||
possibly provide some useful advice as opposed to being critical.
|
||
|
||
- Other people on the list are not interested in your desire to be
|
||
added or deleted. Any requests regarding administrative tasks such
|
||
as being added or removed from a list should be made to the
|
||
appropriate area, not the list itself. Mail for these types of
|
||
requests should be sent to the following respectively:
|
||
|
||
LISTSERV GROUPS - LISTSERV@host
|
||
|
||
|
||
MAILING LISTS - listname-REQUEST@host
|
||
or
|
||
listname-OWNER@host
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Page 9
|
||
|
||
For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe,
|
||
in the body of the message include:
|
||
|
||
SUBSCRIBE listname yourfirstname yourlastname
|
||
(To be added to the subscription)
|
||
or
|
||
UNSUBSCRIBE listname
|
||
(To be removed from the subscription)
|
||
|
||
|
||
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
|
||
THE TEN COMMANDMENTS FOR COMPUTER ETHICS
|
||
from the Computer Ethics Institute
|
||
|
||
|
||
|
||
1. Thou shalt not use a computer to harm other people.
|
||
|
||
2. Thou shalt not interfere with other people's computer work.
|
||
|
||
3. Thou shalt not snoop around in other people's files.
|
||
|
||
4. Thou shalt not use a computer to steal.
|
||
|
||
5. Thou shalt not use a computer to bear false witness.
|
||
|
||
6. Thou shalt not use or copy software for which you have not
|
||
paid.
|
||
|
||
7. Thou shalt not use other people's computer resources without
|
||
authorization.
|
||
|
||
8. Thou shalt not appropriate other people's intellectual output.
|
||
|
||
9. Thou shalt think about the social consequences of the program
|
||
you write.
|
||
|
||
10. Thou shalt use a computer in ways that show consideration and
|
||
respect.
|
||
|
||
|
||
Page 10
|
||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||
|
||
BIBLIOGRAPHY
|
||
|
||
Kehoe, Brendan P. "A Beginner's Guide to the Internet: Zen and the
|
||
Art of the Internet", First Edition, January 1992.
|
||
|
||
Shapiro, Norman, et al. "Towards an Ethics and Etiquette for
|
||
Electronic Mail"., Santa Monica, CA: Rand Corporation (publication
|
||
R-3283-NSF/RC), 1985.
|
||
|
||
Von Rospach, Chuq. "A Primer on How to Work With the USENET
|
||
Community"
|
||
|
||
Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet"
|
||
|
||
"A Guide to Electronic Communication & Network Etiquette", revised
|
||
and submitted by Joan Gargano, edited by Ivars Balkits, Computing services
|
||
University of California Davis.
|
||
|
||
"Heartland Free-Net Registered User Guidelines", Bradley University,
|
||
Peoria, Il.
|
||
|
||
"Terms and Conditions of Membership and Affiliation", CREN
|
||
Information Center, October 25, 1990
|
||
|
||
"Electronic Mail and Networks: New Tools for Institutional Research
|
||
and Planning." by Dan Updegrove, John Muffo and Jack Dunn, University of
|
||
Pennsylvania.
|
||
|
||
"Exploring Internet Training Series, Module 1- Exploring Internet:
|
||
Using your Computer to Communicate", by Deborah Shaffer, ES-USDA, CIT and
|
||
Pennsylvania State University, Henry DeVries; Extension Electronic
|
||
Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT.
|
||
|
||
"Exploring Internet Training Series, Module 2- Mail-based
|
||
Information Delivery: Alamanac and Listservs". by Deborah Shaffer, ES-
|
||
USDA, CIT and Pennsylavia State University; Henry DeVries, Extension
|
||
Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA,
|
||
CIT.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
.
|