textfiles/hacking/POLICIES/purdue

193 lines
9.8 KiB
Plaintext

August 7, 1987
The Schools of Engineering at Purdue University maintain and
develop the Engineering Computer Network (ECN) facilities in order
to enhance the effectiveness of their instructional, research, and
administrative missions. The primary goal of the ECN staff is to
maximize the available computation resources within prevailing
financial constraints. Historically, and certainly at this writ-
ing, available computational resources have not adequately handled
Engineering's needs. Thus, prudent utilization of available
resources is a necessity. The following policies have been adopted
in order to maintain a reasonable level of such prudence. In rela-
tion to the Engineering missions, policies given here seek to pro-
mote usage directly related to Engineering, curtail moderately
related usage, and eliminate unrelated, illegal and abusive usage.
In addition, policies are included to help maintain an ethical and
amicable working environment for ECN users.
Only persons properly authorized may access the ECN facili-
ties. Proper authorization is provided by ECN staff or their
designate in the form of an issued in the name of the
authorized person. Users may not permit other persons to access
ECN via their account. Users who violate ECN policies may lose
their access authorization for a period of time commensurate with
the infraction. Repeat offenders may be denied access indefin-
itely.
To enable ECN staff to accurately maintain information about
the user of each account, each user has the responsibility to pro-
vide current status information to ECN staff, including school or
department of affiliation, degree program (undergraduate or gradu-
ate), expected graduation/termination date, and University position
(faculty, professional, clerical, or graduate assistant). To check
the current information ECN staff has on file, use the command
finger
If you are classified incorrectly, or the account termination date
is incorrect, contact your site specialist/manager or your school's
office which handles computer accounts.
The ECN machines are intended to provide Engineering's stu-
dents, staff, and faculty computational resources needed to meet
their recognized educational, research, and administrative commit-
ments to the Purdue University Schools of Engineering. Other uses
of personal interest (such as checkbook balancing) are proper only
if machine load is low, the terminal is not otherwise needed, and
the use is not prohibited by other applicable policy, i.e. Univer-
sity, School, Department, or ECN. Game playing is only permitted
as discussed below. Low machine load is considered to be times
when the fifteen minute system load average is below 7. The
- 2 -
fifteen minute load is the last number displayed by the uptime com-
mand.
Users may harass or threaten other users, attempt to steal
passwords, files, or other user/system information, attempt to
crash, violate the integrity of, or adversely affect the activities
of a computer system. When a process is consuming excessive system
resources or objectionably degrading system response it may be ter-
minated, or its priority may be altered, without notice. Accessing
restricted facilities and remote resources without proper authori-
zation may be considered unlawful. If activities as
described above occur, the account may be disabled pending an
explanation.
Disk files not related to Engineering's missions and which
consume large amounts of space may be removed without warning by
ECN staff. When users exceed their disk allocation, they are noti-
fied by the system. The message will indicate disk usage at the
time disk accounting was performed, and the user's disk space allo-
cation limit. If the disk allocation is exceeded for an extended
period, the machine account may be disabled.
ECN Systems are operated at Purdue under license agreements
with AT&T, IMSL, PVI, and others. Under these agreements ECN Sys-
tems may be used for instructional and research purposes only. The
UNIX license binds each and every user to respect the proprietary
nature of UNIX software; the specifics of the operating system may
not be taught, nor may the system or any part thereof be moved to,
or copies released to any non-licensed sites. Under the license
agreement and Purdue policy the ECN Systems may under no cir-
cumstances be used for personal gain, or to place a third party in
a position of commercial advantage. To protect our license status,
ECN requires that any person wishing to transport software from an
ECN machine, which he or she did not personally develop, get appro-
val from Bill Simmons (EE 334B/49-43651), or Jeff Schwab (EE
258/49-44326).
Wasteful and Abusive Usage
In general, the Engineering Computer Network does not have
enough computing resources to meet the need of Engineering's stu-
dents, faculty, and staff. Therefore, all users are expected to
use good judgment in sharing limited resources. Except as indi-
cated in 2. above and in the discussion of games below, computer
usage not necessary to meet recognized educational, reseach, and
administrative commitments to the Purdue University Schools of
Engineering will be considered wasteful, abusive, and theft commit-
ted against users attempting to complete recognized work. Waste
can also be in the forms of unnecessary storage of disk files,
careless execution of high resource consuming programs, or genera-
tion of excessive printed output. The general guideline is that
disk space used for unrelated and personal interest work should be
less than 10 per cent of the user's total disk usage. Users should
also be aware that hard copy output devices are expensive to
- 3 -
operate and that wasteful usage of such devices must be avoided.
Game playing is considered wasteful and abusive except as
prescribed here. The first problem, of course, is to define game
playing. Recognizing that such a definition is very difficult in
an absolute sense, ``game playing'' is defined here as development
or execution of a computer program which primarily provides amuse-
ment or pastime diversion. Game playing is permitted only when all
applicable rules given below are met.
a. Game playing is permitted on ECN systems only when the ``games
flag'' is raised and when the terminal is not needed for other
purposes. The games flag will be raised and lowered according
to system load and other machine specific policies.
b. Games which encourage excessive terminal wear or are disrup-
tive to other users of a terminal room will not be permitted.
c. Game playing is not generally permitted over dialup links or
other inter-machine communication links due to the inability
to insure that the games flag (or its equivalent) is raised on
the two or more systems involved.
d. System games are stored in /usr/games. These games will only
execute when the games flag is raised. Files may not be
copied from this directory.
e. Games not stored in the system games directory (/usr/games)
may be developed and executed only while the games flag is
raised. Executable games which are files must be designated
as a game by use of the command setgame filename.
or must monitor the games flag via calls to ganes(2) at five minute
intervals and proceed to play only if the games flag is raised. To
assist the user in determining if the games flag is raised, the
games command may be used.
Games source programs being developed when the games flag is
not raised are subject to removal without notice and the offending
user may lose ECN access authorization. Executable games files not
designated as a game via the setgame command and which do not prop-
erly use games(2) are subject to removal without notice and the
responsible user may lose ECN access authorization.
Losses of ECN access authorization and accounts being disabled
are always reported to the Site Specialist of the involved computer
system and to the ECN Manager of Network Services.
Subsequent report dispositions and actions vary for the
several Engineering Schools. Reports involving students are gen-
erally handled as follows: First report; filed with student's
records within his respective Engineering School. Second report;
same as first report with copies sent to his respective School's
- 4 -
Academic Affairs Office and the Purdue Dean of Students Office.
Third report; same as second report with indefinite loss of ECN
access authorization.