













|
(Revision 1.4 - 07/27/99)
Computer Access and Usage Policy
Department of Computer Science
Florida State University
1. Introduction
The Computer Science Department at Florida State University
operates and maintains a collection of servers, workstations,
microcomputers, and associated peripherals in order to promote its
instructional, research, and administrative efforts. These
machines are joined together into several local area networks
which are connected to the FSU campus backbone and to the
Internet.
In this policy statement the term ``user'' refers to any person
consuming computer resources in the Department's facilities; the
term ``Administration'' refers to the Department Chair and the
administrative and technical staff who are responsible for the
management of those computer resources; the term ``Department''
refers to the Florida State University Department of Computer
Science.
2. Disclaimers
- The Administration accepts no responsibility for any damage
or loss of data arising directly or indirectly from the use of
these facilities or for any consequential loss or damage.
- Although backups are performed to protect data in the event
of a hardware or software failure, the Administration makes no
warranty that all data can or will be restored, and accepts no
responsibility for any damage or loss of data arising directly or
indirectly from the failure of hardware or software, or from human
error.
- Because the goals of the Department are primarily educational
in nature, computer systems are generally open to perusal and
investigation by users, and security controls may be less
restrictive than they would be in other environments. The
Administration accepts no responsibility for any loss of privacy,
theft of information, damage, or loss of data arising directly or
indirectly from the absence or failure of system security
protection mechanisms.
- The Administration makes no warranty, express or implied,
regarding the computer service offered, or their fitness for any
particular purpose.
3. Access to Department Facilities
- The computing facilities of the Department are made available
to the faculty, staff, and students of the Department, generally
without charge. Limited guest privileges are offered to faculty,
staff, and students from other departments by special
arrangement.
- . Only properly authorized persons may access Department
facilities; authrization is provided in the form of a user
account. A student must have a valid FSU ID card to enter the
Department's computer labs.
- A user may not permit any other person, including other
authorized users, to access Department computing facilities
through his or her account.
- Those persons who have been issued access cards, or alarm
codes to obtain access to Department facilities may not use these
items to allow other persons to access the facilities. Access
cards, and codes may not be loaned to others.
4. User responsibilities
- Each user is required to provide true information concerning
University status, major, rank (if staff), and expected graduation
or termination date.
- Each user is responsible for any and all activity initiated in or on
Department facilities by his or her account.
- Users are responsible for maintaining the security of their
password. Passwords should not be kept online or placed into any
electronic mail message.
- Users are responsible for setting proper protection
permissions on their own user space. Most printers are placed in
public areas; users are responsible for picking up sensitive
output in a timely fashion.
- Users are responsible for reporting any system security
violation, or suspected security violation to the Administration
immediately.
- It is the responsibility of every user to act in such a
manner as to not cause physical damage to any of the Department
equipment. No food or drink is allowed in the Department's
computer labs.
- Users may not be abusive to others while using the Department
facilities, whether it be physical, verbal, electronic, or any
other form of abuse.
- Users may not intentionally develop or use programs which
harass other users of the system. Harassing or defamatory material
may not be sent via electronic mail, posted to electronic bulletin
boards, displayed on Department terminals or be output to printer
listings.
- Users are responsible for using the Department facilities in
a manner that is ethical, legal, and not to the detriment of
others.
- Many resources such as disk space, CPU cycles, floating
software licenses, login sessions, and printer queues are
resources that are shared by all users. No user may monopolize
these resources.
- Any user who intends to consume an abnormal amount of
resources should present a plan to the Administration before
embarking on his or her research project.
- Department facilities may not be used for any activity that
is commercial in nature without first obtaining written permission
to do so.
- Users may not develop or use programs which
- attempt to bypass the security mechanisms of the system,
- steal passwords or data,
- are designed to replicate themselves or attach themselves
to other programs (commonly called worms and viruses),
- are designed to bypass software licensing or copyright restrictions,
or
- alter the ``From'' line or other attribution of origin in
electronic mail.
Files owned by individual users are not to be read or altered
by users without permission of the owner even if the file
permissions make it accessible.
System files are generally readable to all users in an educational
environment. This read-only access is not to be abused by attempting
to harm the systems. Deliberate alteration of system files is vandalism
or malicious destruction of University property.
5. Administration Rights and Responsibilities
In general, the responsibility of the Administration is to keep the
computing resources operating and available.
- In the normal course of system administration, the Administration may
have to examine files, electronic mail, and printer listings to gather
sufficient information to diagnose and correct problems with system
software, or, with reasonable cause for suspicion, to determine if a
user is acting in violation of the policies set forth in this document.
- With reasonable cause for suspicion, the Administration has the right to
monitor any and all aspects of system activity, including individual
login sessions, to determine if a user is acting in violation of policies
set forth in this document.
- The Administration has the right to implement software that monitors user
activity and logs any and all system events.
- The Administration has the right to alter the priority or terminate the
execution of any process that is consuming excessive system resources or
objectionably degrading system response, with or without prior
notification.
- The Administration has the right to remove or compress disk files that
are not related to the Department mission and which are consuming large
amounts of disk space, with or without prior notification.
- The Administration has the right to terminate login sessions that have
been idle for long periods of time, in order to free resources.
- The Administration has the responsibility to provide advance notice of
system shutdown for maintenance or upgrades so that users may plan around
times of system unavailability. However, in the event of emergency, the
Administration has the right to shut down a system with little or no
advance notification.
6. Software Copyrights and Licenses
The software used on Department facilities is operated under license
agreements with various vendors.
- United States copyright and patent laws protect the interests of
authors, inventors, and software developers in their products.
Software license agreements serve to increase compliance with copyright
and patent laws. It is against federal law and Department policy to
violate the copyrights or patents on computer software. It is
against Department policy and may be a violation of state or federal
law to violate software license agreements.
- The Department's UNIX source code license binds each and every user to
respect the proprietary nature of the UNIX operating system and its
source code.
- Software in use on Department facilities, unless it is stored in areas
specifically marked as containing copyable software, may not be
copied to magnetic tape, hard or floppy disks, or otherwise removed
from Department facilities.
7. Violations, Enforcement, and Penalties
The disposition of situations involving a violation of the policies set
forth in this document and the penalties that may be imposed for these
violations are as described below.
- Minor infractions of this policy, when likely accidental in nature,
such as poorly chosen passwords, overloading systems, excessive disk
space consumption, and so on are typically handled internally by the
Administration in an informal manner by electronic mail or in-person
discussions. Infractions that are adversely affecting system
performance may result in the immediate but temporary loss of Department
access privileges.
- Infractions such as sharing accounts or passwords, harassment, or
repeated minor infractions as described above may result in the
temporary or permanent loss or modification of Department access
privileges.
- More serious infractions, such as unauthorized use, attempts to steal
passwords or data, attempts to steal licensed software, violations of
University policies, or repeated minor violations may result in
temporary or permanent loss of Department access privileges. In serious
cases, the Department Chair may refer the case to the Dean of Students,
the Dean of Faculties, or the Vice-President for Administration for
appropriate action.
- Offenses which are in violation of local, state or federal laws will be
reported to the University law enforcement authorities.
I have read, understand, and agree to abide by all elements of the Florida
State University Computer Science Department Computer Access and Usage Policy
(revision 1.4 - 07/27/99). I understand that upon violation of this policy,
the Administration retains the right to deny access privileges, and that if
warranted, further disciplinary action may be taken by the University,
including prosecution under applicable state and federal laws.
|