💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › jmadison captured on 2022-06-12 at 08:49:25.

View Raw

More Information

-=-=-=-=-=-=-

                 Draft Computer Ethics Statement
              Ad Hoc Committee on Computer Literacy
                    James Madison University
 
Computer facilities operated by the University are available for
the use of students, faculty and staff without charge.  Students,
faculty and staff are encouraged to use University computer
facilities for research and instruction.  In order to facilitate
the ethical and responsible use of computers, the following
guidelines are established for students, faculty and staff.
Instructors or departments may impose additional requirements or
restrictions in connection with course or departmental work.
 
1.   General Principles
 
     Respect for intellectual labor and creativity is vital to
     academic discourse and enterprise.  This principle applies
     to works of all authors and publishers in all media.  It
     encompasses respect for the right to acknowledgement, right
     to privacy, and right to determine the form, manner and
     terms of publication and distribution.
 
     Because electronic information is so volatile and easily
     reproduced, respect for the work and personal expression of
     others is especially critical in computer environments.
     Violations of authorial integrity, including plagiarism,
     invasion of privacy, unauthorized access, and trade secrets
     and copyright violations, may be grounds for sanctions
     against members of the academic community.
 
2.   Academic Dishonesty in a Computer Assignment
 
     a.   Academic dishonesty in a computer assignment will be
          suspected if an assignment that calls for independent
          work results in two or more solutions so similar that
          one can be converted to another by a mechanical
          transformation.
 
     b.   Academic dishonesty in a computer assignment will be
          suspected if a student who was to complete an
          assignment independently cannot explain both the
          intricacies of the solution and the techniques used to
          generate that solution.
 
     c.   The Honor Council will be notified of occurrences of
          academic dishonesty.
 
3.   Examples
 
     a.   The following are examples of academically honest
          practices:
 
          Turning in work done alone or with the help of the
          course's staff.
 
          Submission of one assignment for a group of students if
          group work is explicitly permitted or required.
 
          Getting or giving help on how to do something using the
          VAX VMS operating system.
 
          Getting or giving help on how to solve minor syntax
          errors.
 
          High-level discussion of course material for better
          understanding.
 
          Discussion of assignments to understand what is being
          asked for.
 
     b.   The following are examples of academically dishonest
          practices:
 
          Turning in someone else's work as your own (with or
          without his or her knowledge)
 
          Allowing someone else to turn in your work as his or
          her own.
 
          Several people writing one program and turning in
          multiple copies, all represented either implicitly or
          explicitly as individual work.
 
          Using any part of someone else's work without the
          proper acknowledgement.
 
          Stealing a solution from an instructor.
 
4.   Ethical and Responsible Use of the Computer
 
     a.   The University provides computing facilities free of
          charge to students and faculty for instruction and
          research.  It is a violation of University policy to
          use University computers for commercial purposes
          without proper approval.
 
     b.   Computer communications systems and networks promote
          the free exchange of ideas and information, thus
          enhancing teaching and research.  Computer users should
          not use electronic communications systems such as mail
          or BITNET to harass others or interfere with their work
          on the computer.
 
     c.   Students, faculty and staff who use the computer have
          the right to privacy and security of their computer
          programs and data.  Computer users should not tamper
          with files or information that belong to other users or
          to the operating system.
 
     d.   United States copyright and patent laws protect the
          interests of authors, inventors and software developers
          in their products.  Software license agreements serve
          to increase compliance with copyright and patent laws,
          and to help insure publishers, authors and developers
          of return on their investments.  It is against federal
          law and University policy to violate the copyrights or
          patents of computer software.  It is against University
          policy and may be a violation of state or federal law
          to violate software license agreements.  Students,
          faculty or staff may not use programs obtained from
          commercial sources or other computer installations
          unless written authority to use them has been obtained
          or the programs are within the public domain.
 
     e.   Security systems for computers exist to insure that
          only authorized users have access to computer
          resources.  Computer users must not attempt to modify
          system facilities or attempt to crash the system, nor
          should they attempt to subvert the restrictions
          associated with their computer accounts, the networks
          of which the University is a member, or microcomputer
          software protections.
 
     f.   Abuse of computing privileges will be subject to
          disciplinary action.  Violators will be subject to the
          usual judicial procedures of the University; loss of
          computing privileges may result.  The University
          reserves the right to examine all computer files.
          Abuse of the networks or of computers at other sites
          connected to the networks will be treated as abuse of
          computing privileges at James Madison University.
 
5.   Examples
 
     a.   The following are examples of ethical or responsible
          use of the computer:
 
          Using the computer for grant supported research
          sponsored by a commercial firm with the approval of the
          Vice President for Sponsored Programs.
 
          Using the electronic mail system to correspond with
          colleagues at other colleges or universities.
 
          Sharing diskettes of files of programs or data with
          team members working together on a research project.
 
          Copying software placed in the public domain.
 
          Reporting nonfunctional computer equipment to lab
          assistants or Technical Services repair staff.
 
     b.   The following are examples of unethical or
          irresponsible use of the computer:
 
          Using computer facilities for work done on behalf of a
          commercial firm.
 
          Sending electronic mail messages containing material
          offensive to the receiver.
 
          Copying a file from another computer user's account or
          floppy disk without permission.
 
          Copying copyrighted computer software for use on
          another computer.
 
          Unplugging or reconfiguring computer equipment to make
          it unusable or difficult to use.
 
6.   Acknowledgements
 
     This statement is based upon the following sources:
 
     "The EDUCOM Code," Academic Computing 1 (Spring 1987):78.
 
     "The Catholic University of America's Statement of Ethics in
     the Use of Computers," ACM SIGUCCS Newsletter 19 (Spring
     1989):14.
 
     "Cheating Policy in a Computer Science Department," ACM
     SIGSE Bulletin 12 (July 1980).