💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › newmexst captured on 2022-07-17 at 01:57:26.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
The following is the published policy statement here at New Mexico State University. It has evolved from several iterations of study. Hope it is of some help. ========================================================================= +--------------+ D. Bryan Emery | | New Mexico State University Computer Center | | Mainframe Services Division | | P.O. Box 30001, Dept 3AT | | Las Cruces, New Mexico 88003-0001 | NMSU | (505) 646-1240 | * | | +--------+ Bitnet: MFSDBE@NMSUVM1 | | Internet: bemery@nmsu.edu +-----+ ========================================================================= G110 USER RESPONSIBILITIES _____________________ New Mexico State University Computer Center Department 3AT, Box 30001 Las Cruces, NM 88003-0001 (505) 646-4433 Revised: 07/89 (CNR) While computing resources at NMSU are extensive, so is its user com- munity; therefore respect and conservation is imperative. User Responsibilities _____________________ All NMSU computing and networking resources should be used in an ef- fective, efficient, ethical, and legal manner. Users are assumed to agree to respect the following conditions of use: 1. Respect the intended purposes of computing resources: o Use accounts only for the instructional, research, and administrative purposes specified. Playing games, print- ing calendars and posters, and gambling pools are exam- ples of inappropriate computer use. o Not to use instructional accounts for commercial activ- ity. 2. Respect the privacy of other users: o Not to use any other person's account unless explicitly permitted to do so by that person. o Not to intentionally seek information on, obtain copies of, or modify files, tapes, passwords, or any type of data or programs belonging to other users unless specif- ically authorized to do so. o Keep your password secret and change it regularly. 3. Respect system integrity and resources: o Not to develop or execute programs that could harass other users, infiltrate systems, damage or alter software components, or use any services for unauthorized commer- cial purposes. o Not to attempt to alter or avoid accounting for computer services. o Avoid excessive use of resources; for example, microcom- puters, public terminals, graphics devices, printers, networks, and processor time. o Share resources in an equitable manner. o Respect proctors and consultants. o Follow established procedures. Mutual respect and cooperative attitudes will ensure everyone has equal privileges, privacy, and protection from interference or harassment. Game Playing ____________ NMSU computing and networking resources are valuable and limited. All users have the responsibility to use these resources in an ef- fective, efficient, ethical, and legal manner. Because resources are limited, the following policy applies to game playing: 1. Game playing is restricted to those times when terminals and resources are not needed for other purposes. 2. Game players must surrender their terminals when requested. 3. Game playing is a privilege and one that may be revoked at any time. Violations of these conditions may result in suspension of computer privileges, disciplinary review, suspension or expulsion from the university, termination of employment, and/or legal action. Copyright Policy ________________ Unless you have written a program yourself, you do not have the right to make and distribute copies of programs without specific permission of the copyright holder. Software programs are protected by Section 117 of the 1976 Copyright Act. Most NMSU software is protected by federal copyright laws. Educational institutions are not exempt from these laws. Software is also protected by the license agreement between supplier and pur- chaser. Software provided by NMSU can only be used on the computer equipment specified in the software license. It is against University policy to copy or reproduce any licensed software on University computing equipment, except as expressly permitted by the software license. Public domain software is available. Also, you may not use unauthorized copies of software on University owned computers or on personal computers housed in University facil- ities. Unauthorized use of software is regarded as a serious matter and any such use is without the consent of New Mexico State Univer- sity. Public Domain Software ______________________ Software that can be copied and used by anyone is considered public domain. Programs authors want to share can be published with BBOARD. The communications software needed to connect your PC to the NMSU network is also public domain. KERMIT software is free of charge; bring a PC diskette to Small Systems at Jacobs Hall for your copy. BITNET Usage Guidelines _______________________ 1. All BITNET use must be consistent with its goal to facilitate exchange of non-commercial information supporting NMSU's mission of education and research. Commercial use is _________________ strictly forbidden. ___________________ 2. BITNET is not a secure network and should not be relied on for transmitting confidential or sensitive data. 3. Transmitting large files can cause traffic problems. There- fore, file transmissions are limited to 300,000 bytes (3,750 eighty-character records) regardless of the time of day. To transmit files exceeding this limit, divide them into a num- ber of smaller files of 300,000 bytes or less send them at appropriate intervals. 4. Since interactive messages take precedence over all other transmissions, extensive use of messaging can block BITNET traffic. Therefore, applications using the interactive mes- saging capability, such as BITNET-based PVM software, are re- stricted to research use by the Computer Center staff. 5. Proprietary software may not be sent over BITNET. 6. Random mailings (junk mail), casual contacts ("Who are you?" messages), and job solicitations are discouraged. Ethical Use ___________ Ethically responsible use of academic computing systems includes the efficient and productive use of resources. Microcomputers, public terminals, graphics devices, printers, networks, and computing processor time are resources that much be shared in an equitable manner. For example, if production runs use large amounts of computing re- sources, attempt to optimize your programs. Large inefficient pro- grams deny resources to other users. Also, keeping unnecessarily large permanent files depletes resources. Consequences ____________ Violations of these conditions may result in the suspension of com- puting privileges, disciplinary review, termination of employment, and/or legal action. Getting Help ____________ For questions on policies for correct use of NMSU's computing and networking resources, consult the Computer Center Director.