textfiles/hacking/POLICIES/michstu

283 lines
12 KiB
Plaintext

In response to the request for site-specific policies and procedures,
here is the first draft of a policy that we are putting in place here.
This policy has not yet been approved by the dean, the head of academic
computing, the provost, or the university lawyers, so I expect there will
be a number of changes before it is actually enacted and distributed. It
should be a useful starting point for others embarking on the same process.
---------------------------------------------------------------------------
College of Engineering Computer Use Policy
John Lees, Manager
Systems and Network Software Services
A. H. Case Center for CAE/M
College of Engineering, Michigan State University
112 Engineering Building, East Lansing, MI 48824-1226
lees@egr.msu.edu, lees@msuegr.bitnet, CompuServe 74106,1324
ABSTRACT
This DRAFT Computer Use Policy applies specifi-
cally to the facilities in the College of Engineering
operated by the Case Center for use by all College of
Engineering students, faculty, and staff. Facilities
within the College operated by individual departments
or research groups may have more stringent use poli-
cies. This policy was drafted by the Ethics Subcommit-
tee of the Case Center Advisory Committee during the
1989/90 academic year. The members of the Committee
were: Dr. Erik Goodman, Dr. Robert Barr, John Lees,
Fred Hall, Steve Southward, and William Su.
A person in violation of this policy may be subject to adminis-
trative action, with a penalty of a fine, restitution for ser-
vices used, or loss of computer privileges. Some actions covered
by this policy are also covered by University regulations or
all-University policies, the violation of which could lead to
academic judicial proceedings. Some actions covered by this pol-
icy are also covered by City, State, or Federal law, the viola-
tion of which could lead to civil or criminal prosecution.
For the purposes of this policy, a user is any person consuming
computer resources; a staff member is a person acting in an offi-
cial capacity as a staff member. The same person may be a staff
member during part of the day and a user during other parts of
the day.
The terminology used in this policy tends to reflect the UNIX
operating system, which is used on the majority of computers in
the College of Engineering, but is intended to apply to all
operating systems in use in the College.
1. User Responsibilities
A user of College of Engineering computer facilities should obey
the following general guidelines.
1.1 Files owned by individual users or staff members are to be
considered as private, whether or not they are accessible by
other users.
1.1.1 That you can read a file does not mean that you may
read a file. Files belonging to individuals are to be
considered private property.
1.1.2 Under no circumstances should you alter a file that
does not belong to you. The ability to alter a file
does not give you the right to alter a file.
1.1.3 The United States Government [citation needed]
includes electronic mail (email) in the same category
as messages delivered by the United States Postal Ser-
vice. This means that tampering with email, interfer-
ing with the delivery of email, and the use of email
for criminal purposes may be felony offenses.
1.2 Many resources, such as file space, CPU cycles, printer
queues, batch queues, login sessions, and software licenses,
are shared by all users. No user should monopolize these
shared resources.
1.2.1 Use as little file space as practical, making use of
available means for compressing and archiving files.
1.2.2 Terminate all "background" jobs before logging out.
Long running, non-interactive jobs should be run in
batch queues (if available).
1.2.3 Read and follow the posted policies on printer use.
1.2.4 Make appropriate use of batch queues and job priori-
ties. Do not load the system in such a way that oth-
ers cannot perform useful work.
1.2.5 Do not tie up resources with multiple, unused login
sessions.
1.2.6 Relinquish licensed software, such as FrameMaker, when
you no longer are using the license.
1.2.7 Respect the resources of workstations located in pub-
lic labs. Do not login to such a workstation and run
jobs that would interfere with use of that workstation
by a person sitting in the lab.
1.3 Not all the computer facilities in the College of Engineer-
ing are public resources (public to the College of Engineer-
ing community). Users found using non-public facilities may
be summarily logged-off those resources.
1.3.1 Some machines are designated as "file servers", and
carry login messages asking users to not use these
machines for login purposes.
1.3.2 Workstations on faculty and staff desks should not be
used as login resources without the specific permis-
sion of the faculty or staff who use those machines.
1.3.3 Printers and other peripheral devices not located in
public labs and advertised as available should not be
used without specific permission.
1.4 Because this is an educational environment, computer systems
are generally open to perusal and investigation by users.
This access must not be abused either by attempting to harm
the systems, or by stealing copyrighted or licensed
software.
1.4.1 System-level files (not owned by individuals) may be
used and viewed for educational purposes if their
access permissions so allow.
1.4.2 Most system-level files are part of copyrighted or
licensed software, and therefore you should not make
your own copies of these files, in whole or in part,
except as needed as part of an educational exercise.
Removing copies of copyrighted software from the sys-
tem on which it is licensed may be a violation of the
copyright or license.
1.4.3 The same standards of intellectual honesty and pla-
giarism apply to software as to other forms of pub-
lished work. Treat system software is if it were a
library you were browsing. Acknowledge borrowing
code, algorithms, or data structures from the work of
other people.
1.4.4 Making your own copies of software having a restricted
use license is theft. So is figuring out how to
"beat" the license.
1.4.5 Deliberate alteration of system files is vandalism or
malicious destruction of University property.
1.5 College of Engineering computing facilities are provided for
academic uses (instruction and research) and some adminis-
trative uses.
1.5.1 The license agreements for some pieces of software may
specifically restrict the software to instructional
use. Please check with the Case Center before you use
licensed software for research or administrative
tasks.
1.5.2 Do not make use of any University computing facilities
for any activity that is commercial in nature without
first obtaining written approval to do so. Commercial
activities include: consulting, developing software
for sale, and in general any activity for which you
are paid from non-University funds.
1.6 Facilities are often available on an unmonitored basis. It
is the responsibility of every user to act in such a manner
as to not cause damage to the physical equipment.
Accidental damage, or damage caused by other parties, should
be reported as soon as possible so that corrective action
can be taken.
College facilities are paid for and operated in part with
student money. Please help take care of them! Please bring
problems to staff attention!
2. User Rights
A user of College of Engineering computer facilities has the fol-
lowing rights and privileges.
2.1 You should not be denied access to facilities by someone who
is not using the facilities for research or instructional
purposes, or who is not a student, faculty, or staff member
of the College of Engineering. You have the right to ask an
appropriate staff member to remove such a person so you can
use the facilities.
2.2 You have the right to not be harassed while using College of
Engineering facilities, whether it be physical, verbal,
electronic, or any other form of abuse. You have the right
to ask an appropriate staff member to take steps to end any
abuse to which you are subjected.
3. Staff Responsibilities
In general, the staff of the College of Engineering computer
facilities has the responsibility of enforcing the rights and
responsibilities of the users of those facilities to the best of
their ability. Several specific staff responsibilities are
listed below.
3.1 Staff should not make use of facilities intended for
instructional purposes unless this is necessary to correct
an urgent problem. Instructional facilities should never be
used for day-to-day staff work unless these facilities are
currently being under-utilized by students.
3.2 Staff should at all times respect the privacy of user files,
mail, and printer listings (but see Staff Rights below).
4. Staff Rights
The staff in general have the right to do whatever is necessary
to carry out their responsibility to keep the College computing
resources operating and available.
4.1 The networked computer environment in the College of
Engineering is a facility provided to faculty, staff, and
students to enable them to accomplish certain tasks required
by their roles within the College and the University. There
is an acknowledged trade-off between the absolute right of
privacy of a user, and the need of the staff to gather
necessary information to insure the continued functioning of
this College-wide resource.
In the normal course of system administration, the staff may
have to examine files, mail, and printer listings to gather
sufficient information to diagnose and correct problems with
system software, or to determine if a user is acting in vio-
lation of the policies set forth in this document. The
staff has the right to do this.
As mentioned in Staff Responsibilities, above, the staff has
an obligation to maintain the privacy of a user's files,
mail, and printer listings.
4.2 Because this is an educational institution, some behavior is
tolerated, even encouraged, that would not be allowed at a
"normal" commercial site. This, combined with the fact that
there is relatively free and uncontrolled access to our sys-
tems via network connections around the world, causes spe-
cial problems for the staff.
In general, the staff allows the users great freedom in use
of the facilities. However, there are certain kinds of
threatening or damaging behavior against which the staff
will take action. For example: owning or using burglar's
tools, worms, viruses, or trojan horses.
Any such action will be taken carefully, because there may
be legitimate reasons for people to have such objects in
their possession. Staff will normally take action only if
there is clear and convincing reason to believe that a user
is violating the policies outlined in this document.
A user who feels that s/he has legitimate reason to experi-
ment with security-related aspects of the computer facili-
ties should discuss the project with staff before embarking
on the experiment. This will help prevent a perhaps embar-
rassing intervention by the staff.
5. Bibliography
We will attach a bibliography of pertinent University publica-
tions in which to find official rules and regulations.