Access and Usage Policy, 2003

Academic Computer Network: Policy on Access and Usage: Approved by the 教师 Council, October 2, 2003; approved by the Regents.

介绍
报告
Access to Academic Computing Facilities
Client Priviliges and Responsibilities
正确使用
Computer 工作人员 Authorities and Responsibilities
版权和许可
违反
提出控罪
纪律处分
Appeal of 纪律处分
纪律政策
 

介绍

Open access to the academic network and associated academic computer facilities (Academic Computer Network or ACN) of the New Mexico Institute of Mining and Technology (Tech) 世界是一种特权,要求个人用户负责任地行动. 用户 must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. 制定本文件就是为了帮助人们保留这种特权. 准备 of this document included review and modification by the people using the Tech academic 网络与计算机.

This document contains the official policy on access and use of the academic computing facilities and the academic network 在科技. In addition to this policy academic departments 在科技 may have supplemental computer usage policies. You will need to contact them to find out about their policy.

The policy presented here applies to all academic computer systems 在科技, regardless of their operating system or manufacturer.

The term "academic computer" is meant to include any computer that is used primarily for academic efforts 在科技. It may or may not be connected to the Ethernet network 在科技. 术语“学术计算机系统”也可能包括网络资源 作为计算机.

The phrase "general use academic computer facility" is meant to include facilities, 供多人使用的机器和外设 support of the Tech's educational mission. (This would, as an example, include user 一个系为参加其课程的学生创建的区域. 它不一定包括教授办公室里的计算机设备.)

The term "Computer 工作人员" includes any professional staff and part-time student employees who work in academic computer facilities.

本政策中的任何陈述都不能以下述方式加以解释 hinder the educational mission of Tech. If there is conflict, or ambiguity, between statements of this policy and those of other Institute policies, they will be resolved 由学术计算署署长及适当的技术代表.

This policy will naturally change over the course of time as required to stay abreast 技术、计算机领域和社会方向的变化. 任何这样的 changes will be subject to comment and review by the Tech community and will require approval by such bodies as the President of Tech deems necessary, before going into 效果.

报告

All data on any academic computer are considered to be the sole property of the owner of the account that created the data, except in instance where the 账户所有者 has previously assigned those rights to another or the original work is not that of the 账户所有者.

Access to Academic Computing Facilities

Any member of Tech may apply 对于一个帐户 to use designated general use academic 计算机设备. Accounts may also be created for faculty and staff of other schools by special arrangement. Valid identification must be presented when applying 对于一个帐户. 学生也可能被要求出示当前的课程表 以及证明已支付所需费用的验证证明.

Each account holder (or applicant) is required to supply the Computer 工作人员 with the information necessary to properly maintain the system's account information database. [It should be noted that portions of this data may be accessible to anyone with access to the system and that some of the Computer 工作人员 would have full access to the database. In particular, no right to anonymity or privacy exists. That is, users should know 根据用户的登录id,其他人可以确定用户的名称.]

Persons granted special access means (e.g. means to access facilities outside the (正常操作时间)必须限制这种访问. 如果他们愿意的话 have permission to allow others access to their special privilege, they must specifically 主动要求. 在任何情况下,他们必须明白对设施的责任 so accessed still rests with them. In no case should the means of access (keys, access cards, combinations, passwords, etc.) be lent or given to others and if this occurs, 随后,用户和借阅者都可能被拒绝访问.

Client Privileges and Responsibilities

Prior to receiving the 特权 associated with an academic computer account, users must sign a statement that they also accept the responsibilities that accompany those 特权. 使用学术电脑设备的人必须随时负责 以符合本政策及其规定的方式使用这些设施 意图.

They are responsible for obeying all official notices posted in the user areas, attached to equipment, displayed in the message of the day, posted in local policy newsgroups by appropriate staff members, or announced using electronic mail. 他们也有责任 for knowing and abiding by the policy set forth in this document, along with any changes announced by any of the means noted in this paragraph.

用户还对其帐户发起的任何和所有活动负责. 为 this reason, 也 as to protect their own data, they should select a secure password for their account and keep that password secret at all times. 密码不应该 be written down, stored online, or given to others. (Passwords should never be given to ANYONE, even to someone claiming to be a Computer 工作人员 member.)

用户有责任保护自己的文件和数据不被读取和/或读取 writing by others, with whatever protection mechanics are provided by the operating 使用中的系统. 他们还负责拾取打印机输出 timely fashion to avoid theft or disposal.

Those using the academic 计算机设备 must act in a manner that will not cause damage to the academic computing resources of Tech. Examples of acts that can damage Tech's computing resources include, but are not limited to, electronic distribution of chain-letters, pyramid-schemes, harassing mail, illegal mail and posting material inappropriate for a targeted Usenet news group.

Theft, accidental damage, or damage caused by other parties must be reported to the 尽快通知电脑职员,以便采取纠正措施.

Anyone observing or suspecting security violations, harassment, or other inappropriate behavior (for example, noise pollution in a user area) is encouraged to report such behavior to the Computer 工作人员.

正确使用

The academic 计算机设备 exist as a resource of Tech to support its missions. The academic 计算机设备 are not to be used for any commercial activity not already associated with legitimate research activity. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale.

Game playing and the development of computer games are permitted on academic systems only when resources and facilities permit. These activities may be limited by time 和地点. 追求技术目标的工作比玩游戏更重要 and game development (unrelated to course work).

Many resources, such as consoles, disk space, CPU cycles, network bandwidth, printer 队列、批处理队列和软件许可证由许多人共享. 使用一个 or more of these resources in any way that unreasonably restricts its use by others 是不适当的,并可能需要电脑职员采取行动释放该资源. Anyone repeatedly using these limited resources in an unreasonable way, and showing willful disregard for this policy, may be seen as attempting to deny services to others 可能会失去访问权限.

Anyone conducting experiments on computer security or self-replicating code must have 该活动最初,然后定期进行审查,以解决风险 work may place upon the rest of the Tech community. The Director of Academic Computing must be notified of the activities of such work well in advance of their occurrence in order to evaluate the risks involved. When possible, special arrangements will be made to provide an adequate environment for these efforts without risking damage to, or impairment of, other's work. Codes that fall into the above categories would include, but not be limited to, virus code, worm code, password cracking code, and 密码抓取代码.

在任何给定时间的系统安全状态都不能被解释为 opportunity for abuse either by attempting to harm the systems or by stealing copyrighted 或授权软件. Deliberate alteration of system files can be considered vandalism or malicious destruction of Tech property.

The ability to connect to other systems via the network does not imply the privilege 使用或连接到这些系统,除非得到适当的授权 owner(s) of the system(s) in question. Tech facilities and network connections may 不得用于未经授权连接、闯入、 or adversely affecting the performance of other systems on the network, whether these systems are Tech owned or not.

Other organizations that operate computing and network facilities that are reachable 科技公司可能有自己的政策来管理这些资源的使用. 当访问 remote resources from Tech facilities users are responsible for obeying both the policies 在本文件和其他组织的政策中规定.

Computer 工作人员 Authorities and Responsibilities

Tech attempts to acquire and maintain resources that will be beneficial to most people. 科技也尽一切合理的努力提供足够的资源,以确保 that reasonable use is possible for all users.

Tech will not, at its own expense, acquire, write, or maintain programs or hardware peculiar to a particular person's application. Tech will maintain a person's resources, at that person's expense, if there is sufficient time and staff available to do so. The Computer 工作人员 has the responsibility to provide, when possible, advance notice 为维护、升级或更改而关闭系统,以便人们进行计划 around periods of system unavailability.

然而,在某些情况下,电脑职员可能会关闭一个系统 little or no advance notification. Every effort will be made to give people a chance to save their work before the system is taken out of service.

From time to time the Computer 工作人员 may be required to adversely affect a person's 工作(例如,终止其进程)以保护计算机系统 (machines and/or network) or other people's work. When such action is required the 计算机工作人员将尝试联系有问题的用户,并告知他们什么 需要去做. 如果在情况允许的时间内无法联系到他们, then the Computer 工作人员 member responsible for affecting the users' work must deliver notification, to the user, of what happened and if possible what can be done to prevent 防止再次发生.

In accordance with federal and state law, the Computer 工作人员 will undertake reasonable effort to maintain the privacy of a person's files, electronic mail, and printer listings. The following actions will require prior authorization, by the faculty or staff member responsible for granting accounts on the systems in question, before they can be carried :

Computer 工作人员 are also responsible for reporting any violations of Tech policy, state law, or federal law pertaining to the use of Tech computer facilities to the appropriate authorities whenever such violations come to their attention.

版权和许可

It is against federal or state law and this policy to violate copyrights or patents. This applies to, but is not limited to: software, music, video, and any eligible digital 项. 违反软件是违反这一政策和联邦或州法律的 许可协议.

复制许可软件是非法的,除非许可允许. 许可 除非获得许可,否则任何人不得复制软件. 许多软件 packages have a limited number of licenses and so require people to share the licenses. The 许可协议 for some software found on academic computing systems may specifically restrict the software to instructional use. The System Administrator for the system on which the software resides must be consulted beforehand when planning the use of third party software (found on academic computing systems) for research or administrative 代替购买本软件的研究或管理许可的任务. To ensure compliance, only the System Administrator for the system may install software 在这个系统中.

许可软件的源代码不得包含在本公司开发的任何软件中 Tech, in part or in whole, except as specifically permitted by the license pertaining 到源代码.

If you have doubts, or questions, about the legality of copying any software, please 在进行任何复制之前,请与学术计算主任联系.

违反

Students and other users of the New Mexico Institute of Mining and Technology Academic Computer Network (ACN) facilities and equipment are expected to adhere at all times to the rules and guidelines established by state or federal law and by this document and related documents adopted by other academic departments. 违反规定的个人 these rules are subject to disciplinary action as indicated below.

The disposition of situations involving a violation of the policies set forth in this document and the penalties that may be imposed upon the person guilty of the violation(s) are described in this section.

意外违反此策略,如选择不当的密码,超载 系统、磁盘空间消耗过多、判断力差等等,通常是 handled internally in an informal manner by electronic mail or in-person discussions.

更严重的违规行为,如未经授权使用,拒绝服务,企图 steal passwords or data, attempts to steal licensed software, violations of Tech policies, harassment, or repeated minor infractions, may result in the temporary or permanent 在没有事先通知或警告的情况下失去学术计算机系统的特权.

Offenses that are in violation of state or federal laws can result in immediate loss, 没有事先通知或警告,所有的学术计算特权. 适当的 authorities will be notified of any such infractions, and penalties may be imposed under Tech regulations, New Mexico law, or the laws of the United States including the New Mexico Statutes 1978, Annotated, Chapter 30, Article 45.

提出控罪

Charges of violations of these rules may be brought by any member of the student body, 教职员工. 费用应直接支付给负责的教职员工 for the academic computing system involved with the infraction. 那个人将决定 if further action is required. He or she may require that the charges be made in writing. 通常情况下,指控将在涉嫌违规的十天内提出,但在 special cases the time limitation may be extended.

收费通知书

If further action is required, the faculty or staff member will turn the matter over to the ACN Discipline Committee. This committee is comprised of two members of the faculty, two students, and a Computer 工作人员 member from the system involved (all of whom are users of the ACN and familiar with its operations). 选择成员 and appointed by the Vice President for Academic Affairs. 委员会将在 meeting with the individual charged and other parties who have information relevant 对于这种情况,决定什么样的处罚是适当的,如果有的话.

纪律处分

任何被发现违反ACN规则和/或政策的个人都将受到处罚 to one or more of the following penalties:

The committee may also decide to file charges of violation of the General Campus Rules 与教务长会面.

Appeal of 纪律处分

被发现违反ACN政策的学生可以对这一发现提出上诉 给学生教务长. Further appeals will follow Institute policies on appeals.

纪律政策

新墨西哥科技学术计算机网络(ACN)设施和设备的用户 are expected to fully adhere to the general Rules, Regulations, and Guidelines established 由主管学术事务的副校长在学生手册中注明. 违反规定的学生 the rules will be subject to the disciplinary procedures and penalties as enumerated 请参阅《威尼斯人app》的一般校园规则和纪律政策部分. 教师 and staff using ACN facilities and equipment are subject to the policies and procedures set forth in the 纪律处分 section of the 威尼斯人app下载 Employee Handbook. Some situations involving faculty may be covered by regulations governing academic 自由和任期. 用户 are fully subject to the appropriate state and federal laws 也.

If a violation is sufficiently serious, the matter will be referred to the appropriate 权威(e.g.,学术计算主任,学生主任,副校长 for Academic Affairs, 人力资源 Director).

If a complaint concerns the appropriate nature of content, such as electronic mail or World-Wide-Web homepage, a Mediating Committee composed of the Dean of Students, Director of Public Information, Director of Academic Computing, and President of the 学生协会或其指定人员将与个人会面讨论 起诉书. 如果不能达成自愿补救,问题将被提交 the ACN Discipline Committee.