💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › newmexst captured on 2022-07-17 at 01:57:26.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

   The following is the published policy statement here at New Mexico State
University.  It has evolved from several iterations of study.  Hope it is of
some help.
 
=========================================================================
+--------------+             D. Bryan Emery
|              |             New Mexico State University Computer Center
|              |             Mainframe Services Division
|              |             P.O. Box 30001, Dept 3AT
|              |             Las Cruces, New Mexico  88003-0001
|   NMSU       |             (505) 646-1240
|    *         |
|     +--------+             Bitnet:    MFSDBE@NMSUVM1
|     |                      Internet:  bemery@nmsu.edu
+-----+
=========================================================================
 
 
                                                                   G110
                          USER RESPONSIBILITIES
                          _____________________
 
               New Mexico State University Computer Center
                        Department 3AT, Box 30001
                        Las Cruces, NM 88003-0001
                              (505) 646-4433
 
                          Revised:  07/89 (CNR)
 
 
   While computing resources at NMSU are extensive, so is its user com-
   munity; therefore respect and conservation is imperative.
 
   User Responsibilities
   _____________________
 
   All NMSU computing and networking resources should be used in an ef-
   fective, efficient, ethical, and legal manner.  Users are assumed to
   agree to respect the following conditions of use:
 
      1.  Respect the intended purposes of computing resources:
 
          o   Use accounts only for the instructional, research, and
              administrative purposes specified.  Playing games, print-
              ing calendars and posters, and gambling pools are exam-
              ples of inappropriate computer use.
 
          o   Not to use instructional accounts for commercial activ-
              ity.
 
      2.  Respect the privacy of other users:
 
          o   Not to use any other person's account unless explicitly
              permitted to do so by that person.
 
          o   Not to intentionally seek information on, obtain copies
              of, or modify files, tapes, passwords, or any type of
              data or programs belonging to other users unless specif-
              ically authorized to do so.
 
          o   Keep your password secret and change it regularly.
 
      3.  Respect system integrity and resources:
 
          o   Not to develop or execute programs that could harass
              other users, infiltrate systems, damage or alter software
              components, or use any services for unauthorized commer-
              cial purposes.
 
          o   Not to attempt to alter or avoid accounting for computer
              services.
 
          o   Avoid excessive use of resources; for example, microcom-
              puters, public terminals, graphics devices, printers,
              networks, and processor time.
 
          o   Share resources in an equitable manner.
 
          o   Respect proctors and consultants.
 
          o   Follow established procedures.
 
   Mutual respect and cooperative attitudes will ensure everyone has
   equal privileges, privacy, and protection from interference or
   harassment.
 
   Game Playing
   ____________
 
   NMSU computing and networking resources are valuable and limited.
   All users have the responsibility to use these resources in an ef-
   fective, efficient, ethical, and legal manner.
 
   Because resources are limited, the following policy applies to game
   playing:
 
      1.  Game playing is restricted to those times when terminals and
          resources are not needed for other purposes.
 
      2.  Game players must surrender their terminals when requested.
 
      3.  Game playing is a privilege and one that may be revoked at
          any time.
 
   Violations of these conditions may result in suspension of computer
   privileges, disciplinary review, suspension or expulsion from the
   university, termination of employment, and/or legal action.
 
   Copyright Policy
   ________________
 
   Unless you have written a program yourself, you do not have the
   right to make and distribute copies of programs without specific
   permission of the copyright holder.
 
   Software programs are protected by Section 117 of the 1976 Copyright
   Act.  Most NMSU software is protected by federal copyright laws.
   Educational institutions are not exempt from these laws.  Software
   is also protected by the license agreement between supplier and pur-
   chaser.
 
   Software provided by NMSU can only be used on the computer equipment
   specified in the software license.  It is against University policy
   to copy or reproduce any licensed software on University computing
   equipment, except as expressly permitted by the software license.
   Public domain software is available.
 
   Also, you may not use unauthorized copies of software on University
   owned computers or on personal computers housed in University facil-
   ities.  Unauthorized use of software is regarded as a serious matter
   and any such use is without the consent of New Mexico State Univer-
   sity.
 
   Public Domain Software
   ______________________
 
   Software that can be copied and used by anyone is considered public
   domain.  Programs authors want to share can be published with
   BBOARD.
 
   The communications software needed to connect your PC to the NMSU
   network is also public domain.  KERMIT software is free of charge;
   bring a PC diskette to Small Systems at Jacobs Hall for your copy.
 
   BITNET Usage Guidelines
   _______________________
 
      1.  All BITNET use must be consistent with its goal to facilitate
          exchange of non-commercial information supporting NMSU's
          mission of education and research.  Commercial use is
                                              _________________
          strictly forbidden.
          ___________________
 
      2.  BITNET is not a secure network and should not be relied on
          for transmitting confidential or sensitive data.
 
      3.  Transmitting large files can cause traffic problems.  There-
          fore, file transmissions are limited to 300,000 bytes (3,750
          eighty-character records) regardless of the time of day.  To
          transmit files exceeding this limit, divide them into a num-
          ber of smaller files of 300,000 bytes or less send them at
          appropriate intervals.
 
      4.  Since interactive messages take precedence over all other
          transmissions, extensive use of messaging can block BITNET
          traffic.  Therefore, applications using the interactive mes-
          saging capability, such as BITNET-based PVM software, are re-
          stricted to research use by the Computer Center staff.
 
      5.  Proprietary software may not be sent over BITNET.
 
      6.  Random mailings (junk mail), casual contacts ("Who are you?"
          messages), and job solicitations are discouraged.
 
   Ethical Use
   ___________
 
   Ethically responsible use of academic computing systems includes the
   efficient and productive use of resources.  Microcomputers, public
   terminals, graphics devices, printers, networks, and computing
   processor time are resources that much be shared in an equitable
   manner.
 
   For example, if production runs use large amounts of computing re-
   sources, attempt to optimize your programs.  Large inefficient pro-
   grams deny resources to other users.  Also, keeping unnecessarily
   large permanent files depletes resources.
 
   Consequences
   ____________
 
   Violations of these conditions may result in the suspension of com-
   puting privileges, disciplinary review, termination of employment,
   and/or legal action.
 
   Getting Help
   ____________
 
   For questions on policies for correct use of NMSU's computing and
   networking resources, consult the Computer Center Director.