Hi, Following the thread about some Universities policy about using computing services I'd like to ask if you can send me YOUR Uni policy about the above matter. I'd like to make somekindda compilation of them and put it on our ftp server (smup7.jussieu.fr). Cheers, jb
Well... This is available from our site via anonymous FTP... so I suppose there are no copyright problems by sending it to you... enjoy... OBTW, the title lines are my addition... and the file is normally printed (on the sheet they give you with your initial password) in small print, and so the file is formatted to about 132 columns... Univeristy of New Brunswick Computing Policies (UNB, Fredericton, New Brunswick, Canada) ---------------------------------------------- POLICIES 5. Improper use of Computing Services may result in withdrawal of access privileges or other The computing and communication systems at the penalties. The following (but not limited to University of New Brunswick are intended to be the following) may be considered improper: used in a manner that is supportive of the Univer- sity's objectives. All constituents of the ù Frivolous use of any workstation, computer University are able to apply to use the univer- or network. sity's computing facilities. When that privilege ù Inspection of data or functions which are is granted (e.g., when an account is issued), it neither allotted to the inspector, nor is granted with the understanding that the use of specified as public. the computing system will correspond to the ù Inspection of data which have to do with purpose(s) stated in the request. utilization, authorization or security. ù Modification of data which are not specif- At the University of New Brunswick Computing Ser- ically assigned to or created by the modi- vices Department, internal customers (students, fier. faculty and staff) are not personally billed for ù Use of another's account. use but are held personally responsible for use ù Interference with other persons accessing made of their accounts. Certain practices are the systems, networks or equipment. considered a misuse of university property. Exam- ù Destruction of data or property which is ples of such misuse are the use of any part of the not owned by the destroyer. computing system for personal or corporate profit, ù Attempting to gain access to another's re- or to provide free resources to unauthorized per- sources, programs, or data. sons. ù Use of another's programs or data without their permission. The following policies govern the use of the ù Sending obscene or vulgar messages. University of New Brunswick Computing Services ù Abusive or destructive use of hardware or Department facilities: public software. ù Use of the facilities for personal or 1. No person or persons shall use the facilities corporate gain without an external ac- of the University Computing Services Depart- count. Examples of such use include pro- ment without due authorization by Computing ducing invitations, posters, personal Services. correspondence, etc., and the sale of com- puter programs or results developed under 2. Every allocation of computing resources is an internal account. made on the understanding that it is to be used only for the purpose for which it was re- 6. Customers are expected to: quested and only by the person or persons by whom or on whose behalf the request was made. a. Be responsible for the use of their com- Use shall not be made of computing resources puter accounts. They should make appro- allocated to another person or group unless priate use of system provided security such use has been specifically authorized by features and take precautions against oth- Computing Services. ers obtaining access to their computing resources. 3. No person or persons shall by any wilful or deliberate act jeopardize the integrity of b. Refrain from engaging in deliberately computing equipment, networks, programs, or wasteful practices such as: other stored information. ù unnecessary holding of workstations or 4. Persons authorized to use computing and commu- telecommunications lines; nication resources shall be expected to treat ù producing unnecessarily large printer as privileged, any information not provided or listings; generated personally which may become avail- ù performing unnecessary computations; able to them through their use of these re- ù creating and retaining unnecessarily sources; they shall not copy, modify, large files; disseminate, or use any part of such infor- ù unnecessary holding of peripheral mation without permission of the appropriate equipment. person or body. c. Utilize efficient and effective techniques for program execution. --- Nick MacDonald | NMD on IRC i6t4@jupiter.sun.csd.unb.ca | PGP 2.1 Public key available via finger On Thu, 11 Mar 1993 jb@paris7.jussieu.fr wrote:
Hi,
Following the thread about some Universities policy about using computing services I'd like to ask if you can send me YOUR Uni policy about the above matter. I'd like to make somekindda compilation of them and put it on our ftp server (smup7.jussieu.fr).
Cheers, jb
POLICIES The computing and communication systems at the University of New Brunswick are intended to be used in a manner that is supportive of the University's objectives. All constituents of the University are able to apply to use the university's computing facilities. When that privilege is granted (e.g., when an account is issued), it is granted with the understanding that the use of the computing system will correspond to the purpose(s) stated in the request. At the University of New Brunswick Computing Services Department, internal customers (students, faculty and staff) are not personally billed for use but are held personally responsible for use made of their accounts. Certain practices are considered a misuse of university property. Examples of such misuse are the use of any part of the computing system for personal or corporate profit, or to provide free resources to unauthorized persons. The following policies govern the use of the University of New Brunswick Computing Services Department facilities: 1. No person or persons shall use the facilities of the University Computing Services Department without due authorization by Computing Services. 2. Every allocation of computing resources is made on the understanding that it is to be used only for the purpose for which it was requested and only by the person or persons by whom or on whose behalf the request was made. Use shall not be made of computing resources allocated to another person or group unless such use has been specifically authorized by Computing Services. 3. No person or persons shall by any wilful or deliberate act jeopardize the integrity of computing equipment, networks, programs, or other stored information. 4. Persons authorized to use computing and communication resources shall be expected to treat as privileged, any information not provided or generated personally which may become available to them through their use of these resources; they shall not copy, modify, disseminate, or use any part of such information without permission of the appropriate person or body. 5. Improper use of Computing Services may result in withdrawal of access privileges or other penalties. The following (but not limited to the following) may be considered improper: * Frivolous use of any workstation, computer or network. * Inspection of data or functions which are neither allotted to the inspector, nor specified as public. * Inspection of data which have to do with utilization, authorization or security. * Modification of data which are not specifically assigned to or created by the modifier. * Use of another's account. * Interference with other persons accessing the systems, networks or equipment. * Destruction of data or property which is not owned by the destroyer. * Attempting to gain access to another's resources, programs, or data. * Use of another's programs or data without their permission. * Sending obscene or vulgar messages. * Abusive or destructive use of hardware or public software. * Use of the facilities for personal or corporate gain without an external account. Examples of such use include producing invitations, posters, personal correspondence, etc., and the sale of computer programs or results developed under an internal account. 6. Customers are expected to: a. Be responsible for the use of their computer accounts. They should make appropriate use of system provided security features and take precautions against others obtaining access to their computing resources. b. Refrain from engaging in deliberately wasteful practices such as: * unnecessary holding of workstations or telecommunications lines; * producing unnecessarily large printer listings; * performing unnecessary computations; * creating and retaining unnecessarily large files; * unnecessary holding of peripheral equipment. c. Utilize efficient and effective techniques for program execution.
participants (3)
-
Chris Hibbert
-
jb@paris7.jussieu.fr
-
Nickey MacDonald