textfiles/hacking/POLICIES/newmexst

203 lines
7.9 KiB
Plaintext

The following is the published policy statement here at New Mexico State
University. It has evolved from several iterations of study. Hope it is of
some help.
=========================================================================
+--------------+ D. Bryan Emery
| | New Mexico State University Computer Center
| | Mainframe Services Division
| | P.O. Box 30001, Dept 3AT
| | Las Cruces, New Mexico 88003-0001
| NMSU | (505) 646-1240
| * |
| +--------+ Bitnet: MFSDBE@NMSUVM1
| | Internet: bemery@nmsu.edu
+-----+
=========================================================================
G110
USER RESPONSIBILITIES
_____________________
New Mexico State University Computer Center
Department 3AT, Box 30001
Las Cruces, NM 88003-0001
(505) 646-4433
Revised: 07/89 (CNR)
While computing resources at NMSU are extensive, so is its user com-
munity; therefore respect and conservation is imperative.
User Responsibilities
_____________________
All NMSU computing and networking resources should be used in an ef-
fective, efficient, ethical, and legal manner. Users are assumed to
agree to respect the following conditions of use:
1. Respect the intended purposes of computing resources:
o Use accounts only for the instructional, research, and
administrative purposes specified. Playing games, print-
ing calendars and posters, and gambling pools are exam-
ples of inappropriate computer use.
o Not to use instructional accounts for commercial activ-
ity.
2. Respect the privacy of other users:
o Not to use any other person's account unless explicitly
permitted to do so by that person.
o Not to intentionally seek information on, obtain copies
of, or modify files, tapes, passwords, or any type of
data or programs belonging to other users unless specif-
ically authorized to do so.
o Keep your password secret and change it regularly.
3. Respect system integrity and resources:
o Not to develop or execute programs that could harass
other users, infiltrate systems, damage or alter software
components, or use any services for unauthorized commer-
cial purposes.
o Not to attempt to alter or avoid accounting for computer
services.
o Avoid excessive use of resources; for example, microcom-
puters, public terminals, graphics devices, printers,
networks, and processor time.
o Share resources in an equitable manner.
o Respect proctors and consultants.
o Follow established procedures.
Mutual respect and cooperative attitudes will ensure everyone has
equal privileges, privacy, and protection from interference or
harassment.
Game Playing
____________
NMSU computing and networking resources are valuable and limited.
All users have the responsibility to use these resources in an ef-
fective, efficient, ethical, and legal manner.
Because resources are limited, the following policy applies to game
playing:
1. Game playing is restricted to those times when terminals and
resources are not needed for other purposes.
2. Game players must surrender their terminals when requested.
3. Game playing is a privilege and one that may be revoked at
any time.
Violations of these conditions may result in suspension of computer
privileges, disciplinary review, suspension or expulsion from the
university, termination of employment, and/or legal action.
Copyright Policy
________________
Unless you have written a program yourself, you do not have the
right to make and distribute copies of programs without specific
permission of the copyright holder.
Software programs are protected by Section 117 of the 1976 Copyright
Act. Most NMSU software is protected by federal copyright laws.
Educational institutions are not exempt from these laws. Software
is also protected by the license agreement between supplier and pur-
chaser.
Software provided by NMSU can only be used on the computer equipment
specified in the software license. It is against University policy
to copy or reproduce any licensed software on University computing
equipment, except as expressly permitted by the software license.
Public domain software is available.
Also, you may not use unauthorized copies of software on University
owned computers or on personal computers housed in University facil-
ities. Unauthorized use of software is regarded as a serious matter
and any such use is without the consent of New Mexico State Univer-
sity.
Public Domain Software
______________________
Software that can be copied and used by anyone is considered public
domain. Programs authors want to share can be published with
BBOARD.
The communications software needed to connect your PC to the NMSU
network is also public domain. KERMIT software is free of charge;
bring a PC diskette to Small Systems at Jacobs Hall for your copy.
BITNET Usage Guidelines
_______________________
1. All BITNET use must be consistent with its goal to facilitate
exchange of non-commercial information supporting NMSU's
mission of education and research. Commercial use is
_________________
strictly forbidden.
___________________
2. BITNET is not a secure network and should not be relied on
for transmitting confidential or sensitive data.
3. Transmitting large files can cause traffic problems. There-
fore, file transmissions are limited to 300,000 bytes (3,750
eighty-character records) regardless of the time of day. To
transmit files exceeding this limit, divide them into a num-
ber of smaller files of 300,000 bytes or less send them at
appropriate intervals.
4. Since interactive messages take precedence over all other
transmissions, extensive use of messaging can block BITNET
traffic. Therefore, applications using the interactive mes-
saging capability, such as BITNET-based PVM software, are re-
stricted to research use by the Computer Center staff.
5. Proprietary software may not be sent over BITNET.
6. Random mailings (junk mail), casual contacts ("Who are you?"
messages), and job solicitations are discouraged.
Ethical Use
___________
Ethically responsible use of academic computing systems includes the
efficient and productive use of resources. Microcomputers, public
terminals, graphics devices, printers, networks, and computing
processor time are resources that much be shared in an equitable
manner.
For example, if production runs use large amounts of computing re-
sources, attempt to optimize your programs. Large inefficient pro-
grams deny resources to other users. Also, keeping unnecessarily
large permanent files depletes resources.
Consequences
____________
Violations of these conditions may result in the suspension of com-
puting privileges, disciplinary review, termination of employment,
and/or legal action.
Getting Help
____________
For questions on policies for correct use of NMSU's computing and
networking resources, consult the Computer Center Director.