textfiles/hacking/POLICIES/uofnewme

156 lines
8.0 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

June 27, 1989
Draft Draft Draft
Cover page
UNM ETHICS CODE FOR COMPUTER USE
The Computer and Information Resources and Technology (CIRT)
and other UNM units provid computer services to a large number of
faculty, staff, and students, as well as outside clients of the
University. All computer users have two basic rights -- privacy
and a fair share of resources. All computer users have the
responsibility to use the CIRT systems in an effective, efficient,
ethical, and lawful manner. The ethical and legal standards that
are to be maintained are derived directly from standards of common
sense and common decency that apply to the use of any public
resource within the university.
The following conditions apply to all users of UNM systems.
Violations of any of the conditions are considered unethical and
possibly unlawful. UNM views the use of computer facilities as a
privilege, not a right, and seeks to protect legitimate computer
users by imposing sanctions on those who abuse the privilege.
Eliminating computer abuse provides more computing resources for
users with legitimate computing needs. UNM's computing policy is
based on the laws of the State of New Mexico and United States
Copyright Law. In addition, UNM imposes certain restrictions
which are not specifically covered by either law. Besides
setting guidelines for appropriate use of computers, UNM's policy
outlines the disciplinary procedures that will be imposed on
computer users who violate the policy. In accordance with estab-
lished University practices, violations may result in disciplinary
review which could result in expulsion from the University or
dismissal from a position, and/or legal action.
Computer users agree to abide by the following conditions,
which apply to all computers and network interconnections owned or
administrated by UNM including university-wide microcomputer
facilities.
Page 1
COMPUTER USERS AGREE TO RESPECT THE INTENDED USE OF ACCOUNTS
ESTABLISHED FOR THEIR USE
Accounts are considered the property of the University of New
Mexico. Authorization for the use of the accounts is given by the
Schools, Colleges, and other units of the University for specific
academic purposes. Accounts have tangible value, as do computer
hardware, software, and storage media. Consequently, attempts to
circumvent the accounting system, to use an account without
authorization, or to use accounts for other than their intended
purposes are all forms of attempted theft. Attempting to defeat
the security systems of any UNM machine is forbidden. It is
unethical to violate the rights to privacy and resources granted
others. UNM reserves the right to lock an account from a computer
user if impropriety is determined.
If an account does not have sufficient resources to complete
assigned work the proper action to take is to notify the course
instructor who can arrange for additional resources, if necessary.
UNM reserves the right to terminate a computer user's session if
s/he is acting in an irresponsible or unlawful manner. Similarly,
any process that is deemed harmful will be cancelled. UNM also
reserves the right to cancel, restart, or hold a job or program to
improve system performance if necessary. Game playing is not
allowed on the system during any academic semester. At other
times the availability of games are automatically regulated and
may be played when other use is low.
COMPUTER USERS AGREE TO RESPECT THE INTEGRITY OF THE SYSTEM
Computer users shall not intentionally develop or use programs
which harass other computer users of the facility or infiltrate
the system and/or damage the software or hardware components of
the system. This includes all network links. Computer users
shall not use network links for any use other than outlined in
network guidelines (e.g., BITNET, Internet). The accidental or
intentional discharge of any unauthorized or destructive program
is subject to prosecution by all appropriate agencies, without
protection from the University. UNM recognizes the value of
academic game development, research on computer security, and the
investigation of self-replicating code. Individuals researching
these topics must contact the appropriate UNM system administrator
regarding the effects of their work on the systems.
The well-being of all computer users depends on the availability
and integrity of the system. Any defects discovered in system
accounting or system security are to be reported to the appropri-
ate system administrator so that steps can be taken to investigate
and solve the problem. The integrity of the system is maintained
by password protection of accounts. A computer user who has been
authorized to use an account may not disclose its password or
otherwise make the account available to others who have not been
authorized to use the account.
Use of the electronic communication facilities (such as MAIL or
PHONE, or systems with similar functions) to send fraudulent,
harassing, obscene, indecent, profane, or intimidating messages is
prohibited. Also, the electronic communication facilities are not
to be used for the transmission of commercial or personal adver-
tisements, solicitations, promotions, destructive programs, or any
other non-university use.
COMPUTER USERS AGREE TO RESPECT
THE PRIVACY OF OTHER COMPUTER USERS
Computer users shall not intentionally seek or provide information
on, obtain copies of, or modify data files, programs, or passwords
belonging to other computer users without the permission of those
other computer users and the appropriate authorization.
The systems provide mechanisms for the protection of private
information from examination by others. Attempts to circumvent
these mechanisms in order to gain unauthorized access to private
information will be treated as actual violations of privacy and a
breach of ethical standards. Searching through directories to
find unprotected information likewise is a violation. Information
you have not been invited to use is not yours to access.
Accounts are the property of the University of New Mexico and are
to be used for University purposes only (University accounts may
not be used for personal matters). Computer users, when re-
quested, are expected to cooperate with system administrators in
any investigations of system abuse. Failure to cooperate may be
grounds for cancellation of access privileges. UNM recognizes
that files and mail messages are confidential. Appropriate UNM
employees may access computer users' files during normal mainte-
nance and will report unlawful activities to the proper authori-
ties.
COMPUTER USERS AGREE TO RESPECT THE RULES AND REGULATIONS
GOVERNING THE USE OF FACILITIES AND EQUIPMENT
Each UNM site has rules and regulations which govern the use of
equipment and facilities at that site. Violation of these rules
and regulations is grounds for disciplinary action. Each site has
operators, consultants, and/or supervisors who have been given the
responsibility to supervise the use of that site. Computer user
cooperation with these individuals, and adherence to UNM policies
is expected at all times. Students are encouraged to utilize CIRT
and other UNM consulting services; however obtaining program code
from CIRT or other staff when forbidden by an instructor is
prohibited.
COMPUTER USERS AGREE TO THE PROPRIETARY
RIGHTS OF SOFTWARE
All software protected by copyright shall not be copied except as
specifically stipulated by the owner of the copyright. Protected
software is not to be copied into, from, or by any UNM facility or
system, except by license. This means that such computer and
microcomputer software may only be copied in order to create
backup copies, if so licensed. The number of copies and distribu-
tion of the copies may not be done in such a way that the number
of simultaneous users in a department exceeds the number of
original copies purchased by that department.