💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › purdue captured on 2022-07-17 at 01:57:33.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
August 7, 1987 The Schools of Engineering at Purdue University maintain and develop the Engineering Computer Network (ECN) facilities in order to enhance the effectiveness of their instructional, research, and administrative missions. The primary goal of the ECN staff is to maximize the available computation resources within prevailing financial constraints. Historically, and certainly at this writ- ing, available computational resources have not adequately handled Engineering's needs. Thus, prudent utilization of available resources is a necessity. The following policies have been adopted in order to maintain a reasonable level of such prudence. In rela- tion to the Engineering missions, policies given here seek to pro- mote usage directly related to Engineering, curtail moderately related usage, and eliminate unrelated, illegal and abusive usage. In addition, policies are included to help maintain an ethical and amicable working environment for ECN users. Only persons properly authorized may access the ECN facili- ties. Proper authorization is provided by ECN staff or their designate in the form of an issued in the name of the authorized person. Users may not permit other persons to access ECN via their account. Users who violate ECN policies may lose their access authorization for a period of time commensurate with the infraction. Repeat offenders may be denied access indefin- itely. To enable ECN staff to accurately maintain information about the user of each account, each user has the responsibility to pro- vide current status information to ECN staff, including school or department of affiliation, degree program (undergraduate or gradu- ate), expected graduation/termination date, and University position (faculty, professional, clerical, or graduate assistant). To check the current information ECN staff has on file, use the command finger If you are classified incorrectly, or the account termination date is incorrect, contact your site specialist/manager or your school's office which handles computer accounts. The ECN machines are intended to provide Engineering's stu- dents, staff, and faculty computational resources needed to meet their recognized educational, research, and administrative commit- ments to the Purdue University Schools of Engineering. Other uses of personal interest (such as checkbook balancing) are proper only if machine load is low, the terminal is not otherwise needed, and the use is not prohibited by other applicable policy, i.e. Univer- sity, School, Department, or ECN. Game playing is only permitted as discussed below. Low machine load is considered to be times when the fifteen minute system load average is below 7. The - 2 - fifteen minute load is the last number displayed by the uptime com- mand. Users may harass or threaten other users, attempt to steal passwords, files, or other user/system information, attempt to crash, violate the integrity of, or adversely affect the activities of a computer system. When a process is consuming excessive system resources or objectionably degrading system response it may be ter- minated, or its priority may be altered, without notice. Accessing restricted facilities and remote resources without proper authori- zation may be considered unlawful. If activities as described above occur, the account may be disabled pending an explanation. Disk files not related to Engineering's missions and which consume large amounts of space may be removed without warning by ECN staff. When users exceed their disk allocation, they are noti- fied by the system. The message will indicate disk usage at the time disk accounting was performed, and the user's disk space allo- cation limit. If the disk allocation is exceeded for an extended period, the machine account may be disabled. ECN Systems are operated at Purdue under license agreements with AT&T, IMSL, PVI, and others. Under these agreements ECN Sys- tems may be used for instructional and research purposes only. The UNIX license binds each and every user to respect the proprietary nature of UNIX software; the specifics of the operating system may not be taught, nor may the system or any part thereof be moved to, or copies released to any non-licensed sites. Under the license agreement and Purdue policy the ECN Systems may under no cir- cumstances be used for personal gain, or to place a third party in a position of commercial advantage. To protect our license status, ECN requires that any person wishing to transport software from an ECN machine, which he or she did not personally develop, get appro- val from Bill Simmons (EE 334B/49-43651), or Jeff Schwab (EE 258/49-44326). Wasteful and Abusive Usage In general, the Engineering Computer Network does not have enough computing resources to meet the need of Engineering's stu- dents, faculty, and staff. Therefore, all users are expected to use good judgment in sharing limited resources. Except as indi- cated in 2. above and in the discussion of games below, computer usage not necessary to meet recognized educational, reseach, and administrative commitments to the Purdue University Schools of Engineering will be considered wasteful, abusive, and theft commit- ted against users attempting to complete recognized work. Waste can also be in the forms of unnecessary storage of disk files, careless execution of high resource consuming programs, or genera- tion of excessive printed output. The general guideline is that disk space used for unrelated and personal interest work should be less than 10 per cent of the user's total disk usage. Users should also be aware that hard copy output devices are expensive to - 3 - operate and that wasteful usage of such devices must be avoided. Game playing is considered wasteful and abusive except as prescribed here. The first problem, of course, is to define game playing. Recognizing that such a definition is very difficult in an absolute sense, ``game playing'' is defined here as development or execution of a computer program which primarily provides amuse- ment or pastime diversion. Game playing is permitted only when all applicable rules given below are met. a. Game playing is permitted on ECN systems only when the ``games flag'' is raised and when the terminal is not needed for other purposes. The games flag will be raised and lowered according to system load and other machine specific policies. b. Games which encourage excessive terminal wear or are disrup- tive to other users of a terminal room will not be permitted. c. Game playing is not generally permitted over dialup links or other inter-machine communication links due to the inability to insure that the games flag (or its equivalent) is raised on the two or more systems involved. d. System games are stored in /usr/games. These games will only execute when the games flag is raised. Files may not be copied from this directory. e. Games not stored in the system games directory (/usr/games) may be developed and executed only while the games flag is raised. Executable games which are files must be designated as a game by use of the command setgame filename. or must monitor the games flag via calls to ganes(2) at five minute intervals and proceed to play only if the games flag is raised. To assist the user in determining if the games flag is raised, the games command may be used. Games source programs being developed when the games flag is not raised are subject to removal without notice and the offending user may lose ECN access authorization. Executable games files not designated as a game via the setgame command and which do not prop- erly use games(2) are subject to removal without notice and the responsible user may lose ECN access authorization. Losses of ECN access authorization and accounts being disabled are always reported to the Site Specialist of the involved computer system and to the ECN Manager of Network Services. Subsequent report dispositions and actions vary for the several Engineering Schools. Reports involving students are gen- erally handled as follows: First report; filed with student's records within his respective Engineering School. Second report; same as first report with copies sent to his respective School's - 4 - Academic Affairs Office and the Purdue Dean of Students Office. Third report; same as second report with indefinite loss of ECN access authorization.