|The Computer Science Division provides accounts for research purposes
to Faculty, Staff, and Students under the sponsorship of Faculty members.
|Rights and Responsibilities|
Computers and networks can provide access to resources on and off campus,
as well as the ability to communicate with other users worldwide. Such
open access is a privilege, and requires that individual users act responsibly.
Users must respect the rights of other users, respect the integrity of
the systems and related physical resources, and observe all relevant laws,
regulations, and contractual obligations.
Students and employees may have rights of access to information about
themselves contained in computer files, as specified in federal and state
laws. Files may be subject to search under court order. In addition, system
administrators may access users files as required to protect the integrity
of computer systems. For example, following organizational guidelines,
system administrators may access or examine files or accounts that are
suspected of unauthorized use or misuse, or that have been corrupted or
Existing Legal Context
All existing laws (federal and state) and University regulations and
policies apply, including not only those laws and regulations that are
specific to computers and networks, but also those that may apply generally
to personal conduct.
Misuse of computing, networking, or information resources may result
in the loss of computing privileges. Additionally, misuse can be prosecuted
under applicable statutes. Users may be held accountable for their conduct
under any applicable University or campus policies, procedures, or collective
bargaining agreements. Complaints alleging misuse of Computer Science Division
resources will be directed to those responsible for taking appropriate
disciplinary action. Illegal reproduction of software protected by U.S.
Copyright Law is subject to civil damages and criminal penalties including
fines and imprisonment.
Examples of Misuse
Examples of misuse include, but are not limited to, the activities in
the following list:
- Using a computer account that you are not authorized to use.
Obtaining a password for a computer account without the consent of the account owner.
- Using the Campus Network to gain unauthorized access to any computer
- Knowingly performing an act which will interfere with the
normal operation of computers, terminals, peripherals, or networks.
- Knowingly running or installing on any computer system or network, or
giving to another user, a program intended to damage or to place excessive
load on a computer system or network. This includes but is not limited
to programs known as computer viruses, Trojan horses, and worms.
- Attempting to circumvent data protection schemes or uncover security
- Violating terms of applicable software licensing agreements or
- Deliberately wasting computing resources.
- Using electronic mail to harass others.
- Masking the identity of an account or machine.
- Posting materials on electronic bulletin boards that violate existing
laws or the University's codes of conduct.
- Attempting to monitor or tamper with another user's electronic
communications, or reading, copying, changing, or deleting another user's files
files or software without the explicit agreement of the owner.
Activities will not be considered misuse when authorized by
appropriate University officials for security or performance testing.