💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › newcastl captured on 2022-07-17 at 01:57:24.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

		The
(insert uni	University	University Computing Services
logo)		of
		Newcastle

		USE OF UNIVERSITY COMPUTING FACILITIES

Set out below are the rules governing use of University
computing facilities. These rules apply to all users
(students, staff and others) and both to central and
departmental computers.

1. General

Computing facilities are provided by the University for the
use of staff and students. Access may be given to
stand-alone microcomputers, stand-alone minicomputers, or to
computers on the University's local area network.

Student access is primarily for use in association with a
course of study and activities related to that course.

Staff are given access for use as part of their duties.
Arrangements for computer use for external work such as
consulting must be negotiated and will usually be on a
'payment for use' basis.

It is expected that all users will make use of University
computers in a manner which is ethical, legal and not to the
detriment of others.

The basic guidelines are that any use must be legal and not
such as to interfere with the use by others.

Failure to abide by the following rules will be treated as
misconduct and may result in disciplinary action including
denial of access to computing facilities. In particular, if,
in the opinion of the Director, University Computing
Services, you have failed to abide by these rules, you may
be denied access to the University's local area network.

(my note: this university treats misconduct VERY seriously,
expulsion is one of the options)

2 Disclaimer

The University makes available to users, both internal and
external, computing facilities consisting of hardware and
software. The University accepts no responsibility for any
damage to or loss of data arising directly or indirectly
from the use of these facilities or for any consequential
loss or damage. The University makes no warranty, express or
implied regarding the computing services offered, or their
fitness for any particular purpose.

The University's liability in the event of any loss or
damage shall be limited to the fees and charges paid to the
University for the use of the computing facilities which
resulted in the loss or damage.

3. Regulations

   1	You may only use those facilities which have been
	authorised for your use. If access is protected by
	a password, you are not to make this password
	available to others. You may not use any account
	set up for another user, nor may you attempt to
	find out the password of another user.

   2	You may only use authorised facilities for
	authorised purposes. For example, facilities made
	available for teaching may not be used for private
	gain.

   3	You must be aware of the law of copyright as it
	affects computer software. Software must not be
	copied except with the express permission of the
	copyright owner.

   4	You may not attempt to copy information belonging
	to other users (whether the be staff, students or
	other users) without their express permission.

   5	You may not attempt to interfere with the
	operation of computing facilities.

   6	You may not attempt to subvert the security of any
	of the University's computing facilities.

   7	You may not use the University's computing
	facilities to send obscene, offensive or
	harassing messages.

----------

Attached to this is another page outlining copyright law as
it applies in Australia, which is beyond the scope of this
discussion.

It should be noted, that on UCS machines, the default for
standard users, is that all their files are protected. In
this case, I read "express permission" as the user changes
the protection such that another has some form of access.

The other thing that I find nice about these regulations is
that they are easy to read and interpret. They are also
deliberately vague. This gives a little scope for individual
cases.

There is also, currently being drawn up, a set of
regulations for departments and other users wishing to
connect to the campus ethernet.

DISCLAIMER

I did not write these regulations, I just live by, and
enforce them. It just happens that I see them as a pretty
good guideline for computer usage on this campus.

munnari!numm.nu.oz.au!alan@uunet.UU.NET (Alan Hargreaves)