💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › umich-2 captured on 2022-07-17 at 01:57:43.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

 MTU Policies
Michigan Technological  University (MTU) promotes  the use of  its computing
facilities and seeks to improve the  computer literacy of its students.  All
students are encouraged to make use  of these facilities in pursuit of their
academic goals, but  are asked to remember that computing  facilities are to
be  used  for  academic  purposes  only.  MTU  views  the  use  of  computer
facilities as  a privilege,  not a  right, and  seeks to  protect legitimate
computer  users by  imposing sanctions  on  those who  abuse the  privilege.
Eliminating computer abuse provides more  computing resources for users with
legitimate academic computing needs.
MTU's computing  policy is based  on the laws of  the State of  Michigan and
United States Copyright Law.  In  addition, MTU imposes certain restrictions
which  are  not  specifically  covered   by  wither  law.   Besides  setting
guidelines  for appropriate  use  of computers,  MTU's  policy outlines  the
disciplinary procedures  that will  be imposed on  students who  violate the
policy.   Such  discipline  may  range  from  the  revocation  of  computing
privileges to expulsion from the University.
 
The Law of the State of Michigan
Act 53  of the Public Acts  of 1979 of the  State of Michigan is  "AN ACT to
prohibit access to  computers, computing systems, and  computer networks for
certain  fraudulent  purposes;  to  prohibit  intentional  and  unauthorized
access, alteration, damage, and  destruction of computers, computer systems,
computer networks,  computer software programs,  and data; and  to prescribe
penalties."
 
Examples of violations of Public Act 53 include:
 
   o   Unauthorized attempts to access or use information.
   o   Attempts to access the computer files belonging to another user without
       permission.
   o   Attempts to interfere with the performance of computing systems.
 
The penalties for violating this act are stated as follows:
 
   "A person  who violates this  act, if  the violation involves  $100.00 or
   less, is  guilty of a misdemeanor.   If the violation involved  more than
   $100.00, the person is guilty of a felony, punishable by imprisonment for
   not more than  ten (10) years, or  a fine of not more  than $5,000.00, or
   both."
 
United States Copyright Law
Copyright is a form of protection provided  by the laws of the United States
(Title 17,  U.S.  Code) to  the authors  of "original works  of authorship."
This  includes computer  programs (software).   Therefore, the  unauthorized
copying of copyrighted software is in violation of U.S.  copyright laws.
 
Additional restrictions imposed by MTU
   o   Permitting another person to use a computer user identification (userid)
       or access card.
   o   Using another person's userid or access card.
   o   Using computing facilities for personal profit.
   o   Transmitting unsolicited or annoying messages.
   o   Transmitting, executing, or storing malicious, threatening, or abusive
       programs or material.
   o   Playing games.
 
Discipline Procedure
Misuses  of computer  resources are  reported  to the  Director of  Academic
Computing Services.  The Director of  Academic Computing Services can impose
restrictions on the  offender's computer privileged, report  the offender to
the Dean of Students, or initiate criminal prosecution.

----------- Cut here-----------

Comments:
______________________
As I understand it, within the next month every current computer user of ACS
machines (our IBM, our PCs, our SUNs, in fact nearly everything students CAN
use) will have to sign and pledge to abide by this policy, or they will lose
computing  privileges.  I  personally  can see  many of  the  points in  the
document, though  I have  problems with it  as well (part  of my  reason for
posting it).   For example, in  sentence two, the policy  states, 'computing
facilities are  to be used for  academic purposes only.' Nowhere  is there a
definition of  'academic purposes' --  by one  simple hypothesis, what  I am
doing now  is in  violation of the  policy, since this  does not  involve my
academic furthering at MTU (yes, I am  a student, to graduate next year with
luck and lots  of cash).  In the next sentence,  'legitimate computer users'
and  'abuse  the privilege'  are  more  examples  of empty  wording,  freely
interpreted by  Administration to  whatever they choose.   Under 'Additional
Restrictions' we  have 'Transmitting  unsolicited or annoying  messages' and
'Transmitting,  executing, or  storing  malicious,  threatening, or  abusive
programs or  material.' Define solicited.   Since saying 'Hi' to  someone is
unsolicited,  so is  'You  can talk  to me'.   Therefore,  by a  restrictive
viewpoint, messaging is illegal (so is this, again, and any other e-mail not
specifically asked for, though how it can be asked for is beyond me).
 
We also need  definitions of malicious, threatening, or  abusive, beyond the
blatantly obvious.  While I am considered  fairly conservative by many, I am
a  flaming   liberal  by  many   standards.   What  I   consider  malicious,
threatening, or abusive is probably far away from our Administration's view.
Yet there  is no definition, so  (in theory) any Consultant  here could grab
some output of  mine, read through it (I  have been told it is  their JOB to
read our  output) and decide since  I don't hold his/her  opinions, I should
get nuked.  I would  then be ordered to see the  Director, whereupon I would
be lectured  at great  length about  how bad and  evil I  am because  I hold
liberal views.
 
Now, before y'all out there start  sending letters to the staff here telling
them how much of a rebel I am, and how I should be purged for not supporting
their  policies 1000%...   I want  to make  it known  that, in  PRINCIPLE, I
support the  policy.  My computing experience  here has, for the  most part,
been a good one, even though I  have been yelled at a few times (mistakenly,
though  the error  was not  one-sided).  I  make wide  and good  use of  the
facilities here, and  those of BITNET.  I  like to think that I  have made a
positive impact  on computing at MTU,  through my public disk  (linked to by
over 230 people), through  my programs (many of which are  now used at sites
across the Net),  and through my continual efforts to  encourage people here
to use  the system  responsibly.  But  I have noticed  a trend  in computing
here,  one which  I think  may  be taking  place  at other  sites, as  well.
Students  are  getting  more  and more  cocky,  administrators  are  getting
restrictive, and  the state of  computing is falling.   It need not  be this
way.  If  computing centers would  educate their users in  responsibility --
realize they make mistakes -- not  treat every infraction, however minor, as
if  it  were  a  first-degree  homicide   --  and  try  honestly  to  become
user-friendly  and   user-accessible;  if  users  would   realize  THEY  are
responsible for their  acts -- try and make fewer,  and smaller, mistakes --
think  before  they   compute  --  realize  what  they  do   CAN  get  their
administration in trouble -- get to  know their computing center staff, then
I think we might see a big leap forward in the world of computing.
 
It _CAN_ happen.
It starts with YOU and ME.
 

with me, sorry if I clogged up your readers with 'non-essential' mail.
 
 
                    Virtually,
                    David B. O'Donnell <LUTHER@MTUS5>
  ________________________________________________________________________
DISCLAIMER: The views expressed  in this file are solely my  own and are not
intended to  represent those of  anyone else  save where their  stated views
match mine.   In particular these views  are not meant to  suggest agreement
with the views of my employer or university.