156 lines
8.0 KiB
Plaintext
156 lines
8.0 KiB
Plaintext
June 27, 1989
|
||
Draft Draft Draft
|
||
Cover page
|
||
|
||
UNM ETHICS CODE FOR COMPUTER USE
|
||
|
||
The Computer and Information Resources and Technology (CIRT)
|
||
and other UNM units provid computer services to a large number of
|
||
faculty, staff, and students, as well as outside clients of the
|
||
University. All computer users have two basic rights -- privacy
|
||
and a fair share of resources. All computer users have the
|
||
responsibility to use the CIRT systems in an effective, efficient,
|
||
ethical, and lawful manner. The ethical and legal standards that
|
||
are to be maintained are derived directly from standards of common
|
||
sense and common decency that apply to the use of any public
|
||
resource within the university.
|
||
The following conditions apply to all users of UNM systems.
|
||
Violations of any of the conditions are considered unethical and
|
||
possibly unlawful. UNM views the use of computer facilities as a
|
||
privilege, not a right, and seeks to protect legitimate computer
|
||
users by imposing sanctions on those who abuse the privilege.
|
||
Eliminating computer abuse provides more computing resources for
|
||
users with legitimate computing needs. UNM's computing policy is
|
||
based on the laws of the State of New Mexico and United States
|
||
Copyright Law. In addition, UNM imposes certain restrictions
|
||
which are not specifically covered by either law. Besides
|
||
setting guidelines for appropriate use of computers, UNM's policy
|
||
outlines the disciplinary procedures that will be imposed on
|
||
computer users who violate the policy. In accordance with estab-
|
||
lished University practices, violations may result in disciplinary
|
||
review which could result in expulsion from the University or
|
||
dismissal from a position, and/or legal action.
|
||
Computer users agree to abide by the following conditions,
|
||
which apply to all computers and network interconnections owned or
|
||
administrated by UNM including university-wide microcomputer
|
||
facilities.
|
||
|
||
Page 1
|
||
COMPUTER USERS AGREE TO RESPECT THE INTENDED USE OF ACCOUNTS
|
||
ESTABLISHED FOR THEIR USE
|
||
|
||
Accounts are considered the property of the University of New
|
||
Mexico. Authorization for the use of the accounts is given by the
|
||
Schools, Colleges, and other units of the University for specific
|
||
academic purposes. Accounts have tangible value, as do computer
|
||
hardware, software, and storage media. Consequently, attempts to
|
||
circumvent the accounting system, to use an account without
|
||
authorization, or to use accounts for other than their intended
|
||
purposes are all forms of attempted theft. Attempting to defeat
|
||
the security systems of any UNM machine is forbidden. It is
|
||
unethical to violate the rights to privacy and resources granted
|
||
others. UNM reserves the right to lock an account from a computer
|
||
user if impropriety is determined.
|
||
|
||
If an account does not have sufficient resources to complete
|
||
assigned work the proper action to take is to notify the course
|
||
instructor who can arrange for additional resources, if necessary.
|
||
UNM reserves the right to terminate a computer user's session if
|
||
s/he is acting in an irresponsible or unlawful manner. Similarly,
|
||
any process that is deemed harmful will be cancelled. UNM also
|
||
reserves the right to cancel, restart, or hold a job or program to
|
||
improve system performance if necessary. Game playing is not
|
||
allowed on the system during any academic semester. At other
|
||
times the availability of games are automatically regulated and
|
||
may be played when other use is low.
|
||
|
||
COMPUTER USERS AGREE TO RESPECT THE INTEGRITY OF THE SYSTEM
|
||
|
||
Computer users shall not intentionally develop or use programs
|
||
which harass other computer users of the facility or infiltrate
|
||
the system and/or damage the software or hardware components of
|
||
the system. This includes all network links. Computer users
|
||
shall not use network links for any use other than outlined in
|
||
network guidelines (e.g., BITNET, Internet). The accidental or
|
||
intentional discharge of any unauthorized or destructive program
|
||
is subject to prosecution by all appropriate agencies, without
|
||
protection from the University. UNM recognizes the value of
|
||
academic game development, research on computer security, and the
|
||
investigation of self-replicating code. Individuals researching
|
||
these topics must contact the appropriate UNM system administrator
|
||
regarding the effects of their work on the systems.
|
||
|
||
The well-being of all computer users depends on the availability
|
||
and integrity of the system. Any defects discovered in system
|
||
accounting or system security are to be reported to the appropri-
|
||
ate system administrator so that steps can be taken to investigate
|
||
and solve the problem. The integrity of the system is maintained
|
||
by password protection of accounts. A computer user who has been
|
||
authorized to use an account may not disclose its password or
|
||
otherwise make the account available to others who have not been
|
||
authorized to use the account.
|
||
|
||
Use of the electronic communication facilities (such as MAIL or
|
||
PHONE, or systems with similar functions) to send fraudulent,
|
||
harassing, obscene, indecent, profane, or intimidating messages is
|
||
prohibited. Also, the electronic communication facilities are not
|
||
to be used for the transmission of commercial or personal adver-
|
||
tisements, solicitations, promotions, destructive programs, or any
|
||
other non-university use.
|
||
|
||
COMPUTER USERS AGREE TO RESPECT
|
||
THE PRIVACY OF OTHER COMPUTER USERS
|
||
|
||
Computer users shall not intentionally seek or provide information
|
||
on, obtain copies of, or modify data files, programs, or passwords
|
||
belonging to other computer users without the permission of those
|
||
other computer users and the appropriate authorization.
|
||
|
||
The systems provide mechanisms for the protection of private
|
||
information from examination by others. Attempts to circumvent
|
||
these mechanisms in order to gain unauthorized access to private
|
||
information will be treated as actual violations of privacy and a
|
||
breach of ethical standards. Searching through directories to
|
||
find unprotected information likewise is a violation. Information
|
||
you have not been invited to use is not yours to access.
|
||
|
||
Accounts are the property of the University of New Mexico and are
|
||
to be used for University purposes only (University accounts may
|
||
not be used for personal matters). Computer users, when re-
|
||
quested, are expected to cooperate with system administrators in
|
||
any investigations of system abuse. Failure to cooperate may be
|
||
grounds for cancellation of access privileges. UNM recognizes
|
||
that files and mail messages are confidential. Appropriate UNM
|
||
employees may access computer users' files during normal mainte-
|
||
nance and will report unlawful activities to the proper authori-
|
||
ties.
|
||
|
||
COMPUTER USERS AGREE TO RESPECT THE RULES AND REGULATIONS
|
||
GOVERNING THE USE OF FACILITIES AND EQUIPMENT
|
||
|
||
Each UNM site has rules and regulations which govern the use of
|
||
equipment and facilities at that site. Violation of these rules
|
||
and regulations is grounds for disciplinary action. Each site has
|
||
operators, consultants, and/or supervisors who have been given the
|
||
responsibility to supervise the use of that site. Computer user
|
||
cooperation with these individuals, and adherence to UNM policies
|
||
is expected at all times. Students are encouraged to utilize CIRT
|
||
and other UNM consulting services; however obtaining program code
|
||
from CIRT or other staff when forbidden by an instructor is
|
||
prohibited.
|
||
|
||
|
||
COMPUTER USERS AGREE TO THE PROPRIETARY
|
||
RIGHTS OF SOFTWARE
|
||
|
||
All software protected by copyright shall not be copied except as
|
||
specifically stipulated by the owner of the copyright. Protected
|
||
software is not to be copied into, from, or by any UNM facility or
|
||
system, except by license. This means that such computer and
|
||
microcomputer software may only be copied in order to create
|
||
backup copies, if so licensed. The number of copies and distribu-
|
||
tion of the copies may not be done in such a way that the number
|
||
of simultaneous users in a department exceeds the number of
|
||
original copies purchased by that department.
|
||
|