Return to CS Home

Computer Science @ Florida State University
Information for prospective, undergraduate, and graduate students in CS
Students, Alumni, Faculty, & Staff in CS
Job listings and employment resources
Department policies, technical information, and statistics
Access & Usage Policy
Email Information
Java Setup
Dial Up Services
FTP Information
Lab Information
Getting System Help
Unix Help
Misc. Technical Information
Online Man Pages
CS Hardware Information
Web Server Statistics
Repetitive Stress Injury

ACM, CLUE, and other sites related to CS

Search CS


                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

                                 THE NET
                     USER GUIDELINES AND NETIQUETTE


                          By: Arlene H. Rinaldi
                 Academic/Institutional Support Services
                       Florida Atlantic University
                               July, 1994



                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

                                 PREFACE

The formulation of this guide was motivated by a need to develop
guidelines for all Internet protocols to ensure that users at
Florida Atlantic University realize the Internet capabilities as
a resource available, with the provision that they are
responsible in how they access or transmit information through
the Internet (The Net).

It is assumed that the reader has some familiarization with the
terms and protocols that are referenced in this document.

Permission to duplicate or distribute this document is granted
with the provision that the document remains intact or if used in
pieces, that the original document source be referenced.

For additions, comments, suggestions and requests for revisions,
please send Email to RINALDI@ACC.FAU.EDU.

                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

                            ACKNOWLEDGEMENTS

Much of this guide was developed from comments and suggestions
from NETTRAIN@UBVM (formally NET-TRAIN) LISTSERV subscribers and
from several  sources available on The Net:

A special acknowledgment to Wes Morgan, University of Kentucky
Engineering Computing Center, for his advice and recommendations.

Pete Hoyle,William & Mary; Timothy A. Torres, San Jose State
University; Paul Brians, Washington State University ; Paul F.
Lambert, Bentley College; Philip M. Howard, Saint Mary's
University; Gordon Swan, Florida Atlantic University; Pauline
Kartrude, Florida Atlantic University; Beth Taney, Penn State;
Debbie Shaffer, Penn State and USDA-CIT; Henry DeVries, Cornell;
Jim Milles, SLU Law Library; Martin Raish, State University of
New York at Binghamton; Steve Cisler, Apple Corporation; Tom
Zillner, Wisconsin Interlibrary Services; Tom Goodrich, Stanford
University; Jim Gerland, State University of NY at Buffalo; Ros
Leibensperger, Cornell; Paul White, Northern Michigan University;
Marilyn S. Webb, Penn State, Judith Hopkins, State University of
NY at Buffalo, Ros McCarthy.


                       *-*-*-*-*-*-*-*-*-*-*-*-*-*
                              INTRODUCTION


It is essential for each user on the network to recognize his/her
responsibility in having access to vast services, sites, systems
and people.  The user is ultimately responsible for his/her
actions in accessing network services.

The "Internet" or "The Net", is not a single network; rather, it
is a group of thousands of individual networks which have chosen
to allow traffic to pass among them.  The traffic sent out to the
Internet may actually traverse several different networks before
it reaches its destination.  Therefore, users involved in this
internetworking must be aware of the load placed on other
participating networks.

As a user of the network, you may be allowed to access other
networks (and/or the computer systems attached to those
networks).  Each network or system has its own set of policies
and procedures.  Actions which are routinely allowed on one
network/system may be controlled, or even forbidden, on other
networks.  It is the users responsibility to abide by the
policies and procedures of these other networks/systems.
Remember, the fact that a user *can* perform a particular action
does not imply that they *should* take that action.

The use of the network is a privilege, not a right, which may
temporarily be revoked at any time for abusive conduct.  Such
conduct would include, the placing of unlawful information on a
system, the use of abusive or otherwise objectionable language in
either public or private messages, the sending of messages that
are likely to result in the loss of recipients' work or systems,
the sending of "Chain letters," or "broadcast" messages to lists
or individuals, and any other types of use which would cause
congestion of the networks or otherwise interfere with the work
of others..

Permanent revocations can result from disciplinary actions taken
by a panel judiciary board called upon to investigate network
abuses.


                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

             ELECTRONIC MAIL AND FILES- USER RESPONSIBILITY

The content and maintenance of a user's electronic mailbox is the
users responsibility:

-    Check Email daily and remain within your limited disk quota.

-    Delete unwanted messages immediately since they take up disk
     storage.

-    Keep messages remaining in your electronic mailbox to a
     minimum.

-    Mail messages can be downloaded or extracted to files then
     to disks for future reference.

-    Never assume that your Email can be read by no one except
     yourself; others may be able to read or access your mail.
     Never send or keep anything that you would not mind seeing
     on  the evening news.

The content and maintenance of a user's disk storage area is the
users responsibility:

-    Keep files to a minimum.  Files should be downloaded to your
     personal computer's hard drive or to disks.

-    Routinely and frequently virus scan your system, especially
     when receiving or downloading files from other systems to
     prevent the spread of a virus.

-    Your files may be accessible by persons with system
     privileges,  so do not maintain anything private in your
     disk storage area.

                       *-*-*-*-*-*-*-*-*-*-*-*-*-*
                             TELNET PROTOCOL

-    Many telnetable services have documentation files available
     online  (or via ftp).  Download and review instructions
     locally as opposed  to tying up ports trying to figure out
     the system.

-    Be courteous to other users wishing to seek information or
     the  institution might revoke Telnet access; remain only on
     the system long enough to get your information, then exit
     off of the system.

-    Screen captured data or information should be downloaded to
     your personal computer's hard disk or to disks.

                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

                 ANONYMOUS FTP - FILE TRANSFER PROTOCOL

-    Users should respond to the PASSWORD prompt with their Email
     address, so if that site chooses, it can track the level of
     FTP usage. If your Email address causes an error, enter
     GUEST for the next PASSWORD prompt.

-    When possible limit downloads, especially large downloads (1
     Meg+), for after normal business hours locally and for the
     remote ftp host; preferably late in the evening.

-    Adhere to time restrictions as requested by archive sites.
     Think in terms of the current time at the site that's being
     visited, not of local time.

-    Copy downloaded files to your personal computer hard drive
     or disks to remain within disk quota.

-    When possible, inquiries to Archie should be in mail form.

-    It's the user's responsibility when downloading programs, to
     check for copyright or licensing agreements.  If the program
     is beneficial to your use, pay any authors registration fee.
     If there is any doubt, don't copy it; there have been many
     occasions on which copyrighted software has found its way
     into ftp archives. Support for any downloaded programs
     should be requested from the originator of the application.
     Remove unwanted programs from your systems.

                       *-*-*-*-*-*-*-*-*-*-*-*-*-*

                        ELECTRONIC COMMUNICATIONS
           (Email, LISTSERV groups, Mailing lists, and Usenet)

-    Keep paragraphs and messages short and to the point.

-    Focus on one subject per message and always include a
     pertinent subject title for the message, that way the user
     can locate the message quickly.

-    Don't use the academic networks for commercial or
     proprietary work.

-    Include your signature at the bottom of Email messages.
     Your signature footer should include your name, position,
     affiliation and Internet and/or BITNET addresses and should
     not exceed more than 4 lines.  Optional information could
     include your address and phone number.

-    Capitalize words only to highlight an important point or to
     distinguish a title or heading.  *Asterisks* surrounding a
     word  also can be used to make a stronger point.
     Capitalizing whole words  that are not titles is generally
     termed as SHOUTING!

-    Limit line length and avoid control characters.

-    Follow chain of command procedures for corresponding with
     superiors. For example, don't send a complaint via Email
     directly to the "top" just because you can.

-    Be professional and careful what you say about others.
     Email is easily forwarded.

-    Cite all quotes, references and sources and respect
     copyright and license agreements.

-    It is considered extremely rude to forward personal email to
     mailing lists or Usenet without the original author's
     permission.

-    Be careful when using sarcasm and humor. Without face to
     face communications your joke may be viewed as criticism.

-    Acronyms can be used to abbreviate when possible, however 
     messages that are filled with acronyms can be confusing
     and annoying to the reader.
     Examples: IMHO=  in my humble/honest opinion
               FYI =  for your information
               BTW =  by the way
               Flame  =  antagonistic criticism
               :-) =  happy face for humor


                    *-*-*-*-*-*-*-*-*-*-*-*-*-*

               LISTSERVS/MAILING LISTS/ DISCUSSION GROUPS

Some mailing lists have low rates of traffic, others can flood
your mailbox with several hundred mail messages per day.
Numerous incoming messages from various listservers or mailing
lists by multiple users, requires extensive system processing
which can tie up valuable resources. Subscription to Interest
Groups or Discussion Lists should be kept to a minimum and should
not exceed what your disk quota can handle, or you for that
matter.

-    When you join a list, monitor the messages for a few days to
     get a feel for what common questions are asked, and what
     topics are deemed off-limits.  This is commonly referred to
     as lurking.  When you feel comfortable with the group, then
     start posting.

-    See if there is a FAQ (Frequently Asked Questions) for a
     group that you are interested in joining.  Veteran members
     get annoyed when they see the same questions every few
     weeks, or at the start of each semester.

-    Follow any and all guidelines that the listowner has posted;
     the listowner establishes the local "netiquette" standards
     for her/his list.

-    Keep in mind that some discussion lists or Usenet groups
     have members from many countries.  Don't assume that they
     will understand a reference to TV, movies, pop culture, or
     current events in your country.  If you must use the
     reference, please explain it.
-    Don't join a list just to post inflammatory messages - this
     upsets most system administrators and you could lose access
     to the net ("mail bombing").

-    Keep your questions and comments relevant to the focus of
     the discussion group.

-    If another person posts a comment or question that is off
     the subject, do NOT reply to the list and keep the off-
     subject conversation going publicly.

-    When someone posts an off-subject note, and someone else
     criticizes that posting, you should NOT submit a gratuitous
     note saying "well, I liked it and lots of people probably
     did as well and you guys ought to lighten up and not tell us
     to stick to the subject".

-    When going away for more than a week, unsubscribe or suspend
     mail from any mailing lists or LISTSERV services.

-    If you can respond to someone else's question, do so through
     email.  Twenty people answering the same question on a large
     list can fill your mailbox (and those of everyone else on
     the list) quickly.

Official Website of Florida State University
Comments and questions should be sent to webmaster@cs.fsu.edu.