💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › purdue captured on 2022-07-17 at 01:57:33.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

                                 August 7, 1987
 
            The Schools of Engineering at Purdue University  maintain  and
       develop  the Engineering Computer Network (ECN) facilities in order
       to enhance the effectiveness of their instructional, research,  and
       administrative  missions.   The primary goal of the ECN staff is to
       maximize the  available  computation  resources  within  prevailing
       financial  constraints.   Historically, and certainly at this writ-
       ing, available computational resources have not adequately  handled
       Engineering's   needs.   Thus,  prudent  utilization  of  available
       resources is a necessity.  The following policies have been adopted
       in order to maintain a reasonable level of such prudence.  In rela-
       tion to the Engineering missions, policies given here seek to  pro-
       mote  usage  directly  related  to  Engineering, curtail moderately
       related usage, and eliminate unrelated, illegal and abusive  usage.
       In  addition, policies are included to help maintain an ethical and
       amicable working environment for ECN users.
 
 
            Only persons properly authorized may access  the  ECN  facili-
       ties.   Proper  authorization  is  provided  by  ECN staff or their
       designate in the form of an issued  in  the  name of  the
       authorized  person.   Users  may not permit other persons to access
       ECN via their account.  Users who violate  ECN  policies  may  lose
       their  access  authorization for a period of time commensurate with
       the infraction.  Repeat offenders may  be  denied  access  indefin-
       itely.
 
            To enable ECN staff to accurately maintain  information  about
       the  user of each account, each user has the responsibility to pro-
       vide current status information to ECN staff, including  school  or
       department  of affiliation, degree program (undergraduate or gradu-
       ate), expected graduation/termination date, and University position
       (faculty, professional, clerical, or graduate assistant).  To check
       the current information ECN staff has on file, use the command
 
               finger 
 
 
       If you are classified incorrectly, or the account termination  date
       is incorrect, contact your site specialist/manager or your school's
       office which handles computer accounts.
 
            The ECN machines are intended to  provide  Engineering's  stu-
       dents,  staff,  and  faculty computational resources needed to meet
       their recognized educational, research, and administrative  commit-
       ments  to the Purdue University Schools of Engineering.  Other uses
       of personal interest (such as checkbook balancing) are proper  only
       if  machine  load is low, the terminal is not otherwise needed, and
       the use is not prohibited by other applicable policy, i.e.  Univer-
       sity,  School,  Department, or ECN.  Game playing is only permitted
       as discussed below.  Low machine load is  considered  to  be  times
       when  the  fifteen  minute  system  load  average  is below 7.  The
 
 
 
 
 
 
                                      - 2 -
 
       fifteen minute load is the last number displayed by the uptime com-
       mand.
 
 
            Users may harass or threaten other users, attempt to steal
       passwords,  files,  or  other  user/system  information, attempt to
       crash, violate the integrity of, or adversely affect the activities
       of a computer system.  When a process is consuming excessive system
       resources or objectionably degrading system response it may be ter-
       minated, or its priority may be altered, without notice.  Accessing
       restricted facilities and remote resources without proper  authori-
       zation  may  be  considered unlawful.  If activities as
       described above occur, the  account  may  be  disabled  pending  an
       explanation.
 
            Disk files not related to  Engineering's  missions  and  which
       consume  large  amounts  of space may be removed without warning by
       ECN staff.  When users exceed their disk allocation, they are noti-
       fied  by  the  system.  The message will indicate disk usage at the
       time disk accounting was performed, and the user's disk space allo-
       cation  limit.   If the disk allocation is exceeded for an extended
       period, the machine account may be disabled.
 
 
            ECN Systems are operated at Purdue  under  license  agreements
       with  AT&T, IMSL, PVI, and others.  Under these agreements ECN Sys-
       tems may be used for instructional and research purposes only.  The
       UNIX  license  binds each and every user to respect the proprietary
       nature of UNIX software; the specifics of the operating system  may
       not  be taught, nor may the system or any part thereof be moved to,
       or copies released to any non-licensed sites.   Under  the  license
       agreement  and  Purdue  policy  the  ECN  Systems may under no cir-
       cumstances be used for personal gain, or to place a third party  in
       a position of commercial advantage.  To protect our license status,
       ECN requires that any person wishing to transport software from  an
       ECN machine, which he or she did not personally develop, get appro-
       val from Bill  Simmons  (EE  334B/49-43651),  or  Jeff  Schwab  (EE
       258/49-44326).
 
         Wasteful and Abusive Usage
 
            In general, the Engineering Computer  Network  does  not  have
       enough  computing  resources to meet the need of Engineering's stu-
       dents, faculty, and staff.  Therefore, all users  are  expected  to
       use  good  judgment  in sharing limited resources.  Except as indi-
       cated in 2. above and in the discussion of  games  below,  computer
       usage  not  necessary  to meet recognized educational, reseach, and
       administrative commitments to the  Purdue  University   Schools  of
       Engineering will be considered wasteful, abusive, and theft commit-
       ted against users attempting to complete  recognized  work.   Waste
       can  also  be  in  the  forms of unnecessary storage of disk files,
       careless execution of high resource consuming programs, or  genera-
       tion  of  excessive  printed output.  The general guideline is that
       disk space used for unrelated and personal interest work should  be
       less than 10 per cent of the user's total disk usage.  Users should
       also be aware that  hard  copy  output  devices  are  expensive  to
 
 
 
 
 
 
                                      - 3 -
 
       operate and that wasteful usage of such devices must be avoided.
 
            Game playing is considered  wasteful  and abusive  except  as
       prescribed  here.   The first problem, of course, is to define game
       playing.  Recognizing that such a definition is very  difficult  in
       an  absolute sense, ``game playing'' is defined here as development
       or execution of a computer program which primarily provides  amuse-
       ment or pastime diversion.  Game playing is permitted only when all
       applicable rules given below are met.
 
       a.   Game playing is permitted on ECN systems only when the ``games
            flag'' is raised and when the terminal is not needed for other
            purposes.  The games flag will be raised and lowered according
            to system load and other machine specific policies.
 
       b.   Games which encourage excessive terminal wear or  are  disrup-
            tive to other users of a terminal room will not be permitted.
 
       c.   Game playing is not generally permitted over dialup  links  or
            other  inter-machine  communication links due to the inability
            to insure that the games flag (or its equivalent) is raised on
            the two or more systems involved.
 
       d.   System games are stored in /usr/games.  These games will  only
            execute  when  the  games  flag  is  raised.  Files may not be
            copied from this directory.
 
       e.   Games not stored in the system  games  directory (/usr/games)
            may  be  developed  and  executed only while the games flag is
            raised.  Executable games which are files must be designated 
            as a game by use of the command setgame filename.
 
 
       or must monitor the games flag via calls to ganes(2) at five minute
       intervals and proceed to play only if the games flag is raised.  To
       assist the user in determining if the games  flag  is  raised,  the
       games command may be used.
 
            Games source programs being developed when the games  flag  is
       not  raised are subject to removal without notice and the offending
       user may lose ECN access authorization.  Executable games files not
       designated as a game via the setgame command and which do not prop-
       erly use games(2) are subject to removal without notice  and the
       responsible user may lose ECN access authorization.
 
 
            Losses of ECN access authorization and accounts being disabled
       are always reported to the Site Specialist of the involved computer
       system and to the ECN Manager of Network Services.
 
            Subsequent  report  dispositions  and  actions  vary  for  the
       several  Engineering  Schools.  Reports involving students are gen-
       erally handled as follows:   First  report;  filed  with  student's
       records  within  his respective Engineering School.  Second report;
       same as first report with copies sent to  his  respective  School's
 
 
 
 
 
 
                                      - 4 -
 
       Academic  Affairs  Office  and  the Purdue Dean of Students Office.
       Third report; same as second report with  indefinite  loss  of  ECN
       access authorization.