Application For Berkeley Network Of Workstations
Student Research Account

Please read the following account policy and proceed to request a new account for CS 258 and CS 267. If you already have a NOW account, you do not need to fill this out. If you do not know whether you have a NOW account, try login to using SSH.

Computer Science Research Account Policy

The Computer Science Division provides accounts for research purposes to Faculty, Staff, and Students under the sponsorship of Faculty members.

Rights and Responsibilities
    Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.
    Students and employees may have rights of access to information about themselves contained in computer files, as specified in federal and state laws. Files may be subject to search under court order. In addition, system administrators may access users files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.

Existing Legal Context
    All existing laws (federal and state) and University regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.
    Misuse of computing, networking, or information resources may result in the loss of computing privileges. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of Computer Science Division resources will be directed to those responsible for taking appropriate disciplinary action. Illegal reproduction of software protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment.

Examples of Misuse
    Examples of misuse include, but are not limited to, the activities in the following list:
    • Using a computer account that you are not authorized to use. Obtaining a password for a computer account without the consent of the account owner.
    • Using the Campus Network to gain unauthorized access to any computer systems.
    • Knowingly performing an act which will interfere with the normal operation of computers, terminals, peripherals, or networks.
    • Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms.
    • Attempting to circumvent data protection schemes or uncover security loopholes.
    • Violating terms of applicable software licensing agreements or copyright laws.
    • Deliberately wasting computing resources.
    • Using electronic mail to harass others.
    • Masking the identity of an account or machine.
    • Posting materials on electronic bulletin boards that violate existing laws or the University's codes of conduct.
    • Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files files or software without the explicit agreement of the owner.
    Activities will not be considered misuse when authorized by appropriate University officials for security or performance testing.

I have read and agree to the guidelines list above for use of this account. I further agree that this account is for my personal use, and that I will not give out my password or in any other way make the account available to others. I understand that misuse of this account may result in immediate denial of access.

Frederick Wong
Last modified: Jan. 20th, 1999