💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › baylor captured on 2022-07-17 at 01:57:06.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

                        Computer Policies

The computing facilities at Baylor are provided for the use of
Baylor students, faculty and staff in support of the programs of
the University.  All students, faculty and staff are responsible
for seeing that these computing facilities are used in an
effective, efficient, ethical and lawful manner.  The following
policies relate to their use.

1.  Computer facilities and accounts are owned by the University
    and are to be used for university-related activities only.
    All access to central computer systems, including the issuing
    of passwords, must be approved through the Computer Center.
    All access to departmental computer systems must be approved
    by the department chairman or an authorized representative.

2.  Computer equipment and accounts are to be used only for the
    purpose for which they are assigned and are not to be used
    for commercial purposes or non-university related activities.

3.  An account assigned to an individual, by the Computer Center
    or a department, must not be used by others without explicit
    permission from the instructor or administrator requesting
    the account and by the Computer Center or department
    assigning the account.  The individual is responsible for the
    proper use of the account, including proper password
    protection.

4.  Programs and files are confidential unless they have
    explicitly been made available to other authorized
    individuals.  Computer Center personnel may access others'
    files when necessary for the maintenance of central computer
    systems.  When performing maintenance, every effort is made
    to insure the privacy of a user's files.  However, if
    violations are discovered, they will be reported immediately
    to the appropriate Vice President.

5.  Electronic communications facilities (such as MAIL) are for
    university related activities only.  Fraudulent, harassing or
    obscene messages and/or materials are not to be sent or
    stored.

6.  No one should deliberately attempt to degrade the performance
    of a computer system or to deprive authorized personnel of
    resources or access to any university computer system.

7.  Loopholes in computer security systems or knowledge of a
    special password should not be used to damage computer
    systems, obtain extra resources, take resources from another
    user, gain access to systems or use systems for which proper
    authorization has not been given. 8.Computer software
    protected by copyright is not to be copied from, into, or by
    using campus computing facilities, except as permitted by law
    or by the contract with the owner of the copyright.  This
    means that such computer and microcomputer software may only
    be copied in order to make back-up copies, if permitted by
    the copyright owner.  The number of copies and distribution
    of the copies may not be done in such a way that the number
    of simultaneous users in a department exceeds the number of
    original copies purchased by that department.

An individual's computer use privileges may be suspended
immediately upon the discovery of a possible violation of these
policies.  Such suspected violations will be confidentially
reported to the appropriate faculty, supervisors, department
chairmen, Computer Center staff, and Vice Presidents.

The Computer Center administrative staff or supervising
department chairman will judge an offense as either major or
minor.  A first minor offense will normally be dealt with by the
Computer Center administrative staff or supervising department
chairman after consultation with the instructor or administrator
requesting the account.  Additional offenses will be regarded as
major offenses.  Appeals relating to minor offenses may be made
to the supervising Vice Presidents.  Major offenses will be dealt
with by the supervising Vice Presidents.

Violations of these policies will be dealt with in the same
manner as violations of other university policies and may result
in disciplinary review.  In such a review, the full range of
disciplinary sanctions is available including the loss of
computer use privileges, dismissal from the University, and legal
action.  Violations of some of the above policies may constitute
a criminal offense.  Individuals using campus computer facilities
should be familiar with the Computer Crimes Bill passed by the
69th Session of the Texas Legislature.  (Copies are available
from the Computer Center).