💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › umissc captured on 2022-07-17 at 01:57:45.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

Ethics of Computer Use
ETHICS RULES PASSWORD USERIDS SECURITY
 
	   Institution:  University of Missouri - Columbia
	   Date:         01 Feb 1989
	   Contact:      CSPKB@UMCVMB.MISSOURI.EDU or CCGREG@UMCVMB.MISSOURI.EDU
 
                           THE ETHICS OF COMPUTER USE
                           __________________________
 
Computing  on  the Columbia campus is available in much the same way as the re-
sources in the library.  Thus, computing and computers should not be used  just
to  solve  computing  problems  and assignments;   they should be thought of as
tools and resources to be used to facilitate education.
 
In accordance with this "Library Model", computing is available to any faculty,
staff, or student on the Columbia campus. These facilities, however, are  lim-
ited and should not be used frivolously.
 
 
GENERAL RULES FOR COMPUTER USE
 
o   Try  to conserve resources.  This includes disk and tape storage, CPU time,
    memory, paper, and plotter supplies, and other computing facilities.
 
o   Never unnecessarily prevent others from using a terminal or other resource.
 
o   Be careful to protect IDs, accounts, files, printouts, and  other  computer
    resources from unauthorized use.
 
o   Never use any ID, account, or file without proper authorization.
 
You must never:
 
o   use a student user ID other than your own
 
o   use or intentionally seek access to an ID other than yours
 
o   copy data or software without proper authorization
 
o   send messages to unwilling recipients
 
o   frivolously use electronic mail or messaging
 
o   spend excessive time playing games
 
o   distribute a program that damages the user or system environment
 
o   use  computing  facilities  for harassment, plagiarism, or other illegal or
    unethical activities
 
These rules are vigorously enforced.  IDs of users who don't comply with  these
rules are restricted from abused facilities or from all computer access. Severe
cases  of  abuse  have  resulted  in prosecution, termination, or academic pro-
bation.
 
 
YOU DON'T HAVE TO BE THE VICTIM OF COMPUTER ABUSE
 
Even the best of computer systems cannot protect the individual  who  fails  to
conceal  his  or her password.   Leaving a terminal without logging off is like
leaving the door of your home unlocked and open.  Using an obvious password  is
like  hiding your door key under the doormat.  So, physically protect your ses-
sion, pick a new password at random from some  magazine,  and  never  record  a
password where it could be found (desk, terminal, text book, etc.).
 
If  you  suspect  your  user ID's password has been compromised, change it.  On
UMCVMB, the command to do this is "VMSECURE USER", menu choice 1. If you  sus-
pect  someone  else's  password  has been compromised, report it to them or the
Help Desk.
 
Never share a ID's password with anyone.   Researchers needing  to  share  data
should  arrange  this  through individual IDs and linking to disks, rather than
sharing one user ID.
 
Under no circumstances are UMC students to share their  user  ID  and  password
with  anyone.    When  detected, both parties involved lose their IDs.  Any UMC
student can have a CMS user ID and sufficient space for academic  work.    Why,
then,  would anyone want another ID--except for unethical, malicious, or covert
activity?
 
Never run a program sent to you unless you know what  it  does  and  completely
trust the source.  Some "gifts" have been known to erase the recipient's files,
send obscene messages in the recipient's name, replicate themselves, and gener-
ally  cause  trouble  for  the ID on which they were run.  This applies to both
mainframe and micro computers.
 
 
GAME-PLAYING AND CHATTING
 
By far the most common abuse of computing that has been observed here is exces-
sive messaging and game playing.  Communication and games are excellent ways to
introduce people to computing.  UMC allows these activities for  this  purpose,
and most users move on to productive use of electronic mail and other computing
facilities.
 
A few people, however, become addicted to Bitnet, or Relay, or Zork games.  The
worst  public  effect  of  this compulsion has been a lack of free terminals at
some sites.  Anyone observing such unnecessary usage should not hesitate to ask
the user to desist or in reporting the problem to a User Consultant or the Help
Desk.
 
Rather than limit everyone, UMC Campus Computing has tried to identify and deal
with the worst abusers.   The Help Desk will  hear  and  verify  specific  com-
plaints.  Moreover, UM systems log networking, inter-user communications, logon
attempts,  printing,  links, and other activities.  These logs can reveal usage
trends and can be used to verify complaints.  Tape backups of disk  files  pro-
tect users from accidents but also can be used to trace an abuse long after the
incident.
 
 
PLAGIARISM
 
Copying  someone's  computer assignment takes little effort;  so does detecting
and proving such plagiarism.  The standard academic penalties for this are  se-
vere.   Systems staff have cooperated with instructors in verifying plagiarism.
Guilty students have not  only  lost  computing  privileges,  but  have  failed
courses  and have been placed on academic probation.  This has happened even to
students who completed a course and shared their old work with those in a  sub-
sequent semester.
 
Carelessness  can encourage plagiarism.  Be sure to pick up all your output and
discard it carefully!  Report individuals rummaging through  new  or  discarded
output.
 
 
WASTEFULNESS
 
To minimize waiting for processing, printer, or other resources, wasteful users
are  relegated  to low CPU priority, not allowed to print, etc., until they can
be warned and informed.
 
 
TEMPORARY DISKS
 
Temporary disk space (such as obtained by the  TEMPDISK  command)  is  obtained
from  a  shared  pool of space.  UMCVMB does not at this time restrict how much
temporary disk space one may define, so long as it is available. Whatever space
one user ID takes is that much less for others.  Therefore, we ask  that  users
voluntarily:
 
o   define only as much temporary disk space as they need,
 
o   release temporary space when it is no longer needed, and
 
o   on  the UMCVMB system restrict themselves to a total of at most 5 cylinders
    for up to 8 hours of use, or 50 cylinders for 1 hour.
 
Anyone needing more than 50 cylinders should consider working with tape instead
of disk (see "HELP UMCTAPE") or should contact the Help Desk. Inactive sessions
that have large amounts of temporary disk may be forced off.
 
If voluntary conservation does not work, then Campus Computing may have to make
the system enforce temporary disk space limits.
 
 
CONCLUSION
 
Campus Computing encourages you to explore the  University's  computer  system,
and  to  use it for genuine educational pursuits.  But if you have doubts about
any extra-curricular computing, consider whether  it  is  consistent  with  the
above rules and responsible, polite conduct.  Consult your advisor or the full-
time staff of Computing Services for counsel or to report suspicious activity.
 
__________
 
Reprinted from the _Campus_Computing_Newsletter_ of the University of Missouri-
Columbia, Vol 16 Number 2, October 1988, pages 5-6.