💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › umissc captured on 2022-07-17 at 01:57:45.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
Ethics of Computer Use ETHICS RULES PASSWORD USERIDS SECURITY Institution: University of Missouri - Columbia Date: 01 Feb 1989 Contact: CSPKB@UMCVMB.MISSOURI.EDU or CCGREG@UMCVMB.MISSOURI.EDU THE ETHICS OF COMPUTER USE __________________________ Computing on the Columbia campus is available in much the same way as the re- sources in the library. Thus, computing and computers should not be used just to solve computing problems and assignments; they should be thought of as tools and resources to be used to facilitate education. In accordance with this "Library Model", computing is available to any faculty, staff, or student on the Columbia campus. These facilities, however, are lim- ited and should not be used frivolously. GENERAL RULES FOR COMPUTER USE o Try to conserve resources. This includes disk and tape storage, CPU time, memory, paper, and plotter supplies, and other computing facilities. o Never unnecessarily prevent others from using a terminal or other resource. o Be careful to protect IDs, accounts, files, printouts, and other computer resources from unauthorized use. o Never use any ID, account, or file without proper authorization. You must never: o use a student user ID other than your own o use or intentionally seek access to an ID other than yours o copy data or software without proper authorization o send messages to unwilling recipients o frivolously use electronic mail or messaging o spend excessive time playing games o distribute a program that damages the user or system environment o use computing facilities for harassment, plagiarism, or other illegal or unethical activities These rules are vigorously enforced. IDs of users who don't comply with these rules are restricted from abused facilities or from all computer access. Severe cases of abuse have resulted in prosecution, termination, or academic pro- bation. YOU DON'T HAVE TO BE THE VICTIM OF COMPUTER ABUSE Even the best of computer systems cannot protect the individual who fails to conceal his or her password. Leaving a terminal without logging off is like leaving the door of your home unlocked and open. Using an obvious password is like hiding your door key under the doormat. So, physically protect your ses- sion, pick a new password at random from some magazine, and never record a password where it could be found (desk, terminal, text book, etc.). If you suspect your user ID's password has been compromised, change it. On UMCVMB, the command to do this is "VMSECURE USER", menu choice 1. If you sus- pect someone else's password has been compromised, report it to them or the Help Desk. Never share a ID's password with anyone. Researchers needing to share data should arrange this through individual IDs and linking to disks, rather than sharing one user ID. Under no circumstances are UMC students to share their user ID and password with anyone. When detected, both parties involved lose their IDs. Any UMC student can have a CMS user ID and sufficient space for academic work. Why, then, would anyone want another ID--except for unethical, malicious, or covert activity? Never run a program sent to you unless you know what it does and completely trust the source. Some "gifts" have been known to erase the recipient's files, send obscene messages in the recipient's name, replicate themselves, and gener- ally cause trouble for the ID on which they were run. This applies to both mainframe and micro computers. GAME-PLAYING AND CHATTING By far the most common abuse of computing that has been observed here is exces- sive messaging and game playing. Communication and games are excellent ways to introduce people to computing. UMC allows these activities for this purpose, and most users move on to productive use of electronic mail and other computing facilities. A few people, however, become addicted to Bitnet, or Relay, or Zork games. The worst public effect of this compulsion has been a lack of free terminals at some sites. Anyone observing such unnecessary usage should not hesitate to ask the user to desist or in reporting the problem to a User Consultant or the Help Desk. Rather than limit everyone, UMC Campus Computing has tried to identify and deal with the worst abusers. The Help Desk will hear and verify specific com- plaints. Moreover, UM systems log networking, inter-user communications, logon attempts, printing, links, and other activities. These logs can reveal usage trends and can be used to verify complaints. Tape backups of disk files pro- tect users from accidents but also can be used to trace an abuse long after the incident. PLAGIARISM Copying someone's computer assignment takes little effort; so does detecting and proving such plagiarism. The standard academic penalties for this are se- vere. Systems staff have cooperated with instructors in verifying plagiarism. Guilty students have not only lost computing privileges, but have failed courses and have been placed on academic probation. This has happened even to students who completed a course and shared their old work with those in a sub- sequent semester. Carelessness can encourage plagiarism. Be sure to pick up all your output and discard it carefully! Report individuals rummaging through new or discarded output. WASTEFULNESS To minimize waiting for processing, printer, or other resources, wasteful users are relegated to low CPU priority, not allowed to print, etc., until they can be warned and informed. TEMPORARY DISKS Temporary disk space (such as obtained by the TEMPDISK command) is obtained from a shared pool of space. UMCVMB does not at this time restrict how much temporary disk space one may define, so long as it is available. Whatever space one user ID takes is that much less for others. Therefore, we ask that users voluntarily: o define only as much temporary disk space as they need, o release temporary space when it is no longer needed, and o on the UMCVMB system restrict themselves to a total of at most 5 cylinders for up to 8 hours of use, or 50 cylinders for 1 hour. Anyone needing more than 50 cylinders should consider working with tape instead of disk (see "HELP UMCTAPE") or should contact the Help Desk. Inactive sessions that have large amounts of temporary disk may be forced off. If voluntary conservation does not work, then Campus Computing may have to make the system enforce temporary disk space limits. CONCLUSION Campus Computing encourages you to explore the University's computer system, and to use it for genuine educational pursuits. But if you have doubts about any extra-curricular computing, consider whether it is consistent with the above rules and responsible, polite conduct. Consult your advisor or the full- time staff of Computing Services for counsel or to report suspicious activity. __________ Reprinted from the _Campus_Computing_Newsletter_ of the University of Missouri- Columbia, Vol 16 Number 2, October 1988, pages 5-6.