💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › umissrol captured on 2022-07-17 at 01:57:47.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

contact "Greg Johnson -aka CCGREG@UMCVMB.MISSOURI.EDU" 

                     University of Missouri-Rolla
                         Computing Guidelines
                            June 15, 1989


The computing facilities are provided in order to promote and support
academic pursuits.  Academic computing facilities are therefore to be
used only for instruction and research activities.

Listed here are certain responsibilities and the ethical behavior
expected of you as a computer user.  The guidelines presented here
reflect U.S. Copyright Law, the Law of the State of Missouri, and
additional specific rules imposed by UMR Computing Services.  The
Computer Center will try to keep current copies of the pertinent
federal and state statutes on hand for your reference.


               U.S. Copyright Law and Software Licensing




  proprietary and is protected by legal licensing agreements in
  addition to the copyright law.


  and will be specified within the software package, documentation, or
  license agreement.  Inspect these provisions carefully before making
  any copies.


  outside the university through any mechanism, electronic or
  otherwise.


  for the software you use on any system.  Lack of knowledge does not
  justify a violation of the law.


  agreements may result in university disciplinary action and/or may
  result in legal action.


              State of Missouri Law  RSMo 569.094-569.099

A state law makes unauthorized access and interference with computer
systems, computer data, and other computer users illegal.




  your userid as well as for refraining from using someone else's
  userid.


  are unprotected, is illegal.


  system.


                         Additional UMR Rules

Always apply normal standards of academic ethics and polite conduct to
your use of computing services.




  university computing facilities.




  other users.  Examples of activities you should avoid:

  - tying up computer resources for game playing or trivial
    applications,

  - sending annoying or obscene messages to any other user,

  - using computing systems for personal activities that are not
    required for class of for research.

  - importing software of unknown function and quality.  This is the
    primary mechanism for spreading viruses.


  vendors, you may be asked to produce the manuals, original
  diskettes, serial number, or other proof of proper software
  licensing.  In addition, vendors normally do not allow users of
  questionable software to upgrade to a new version of the product.


                         Disciplinary Action

Misuse of university computing facilities will be reported to the
Director of Computing Services.  The Director can impose restrictions
on the offender's computer access, report the incident to either the
Vice Chancellor of Student Affairs or the Vice Chancellor of Academic
Affairs (whichever is appropriate).  Please keep in mind that
violation of U.S. or Missouri laws may result in legal action.

Note: The Rolla statement is interesting in that it references Missouri Revised
Statutes.