存取与使用政策,2003

Academic Computer Network: Policy on Access and Usage: Approved by the Faculty Council, October 2, 2003; approved by the Regents.

Introduction
Advisories
使用学术计算设施
客户的权限和责任
Proper Use
计算机职员的权限和职责
Copyrights and Licenses
Violations
Bringing of Charges
Disciplinary Action
纪律处分上诉
Discipline Policy
 

Introduction

Open access to the academic network and associated academic computer facilities (Academic Computer Network or ACN) of the New Mexico Institute of Mining and Technology (Tech) and the world is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. This document has been prepared to help people retain that privilege. The preparation of this document included review and modification by the people using the Tech academic network and computers.

This document contains the official policy on access and use of the academic computing 设施和学术网络. 除了这个政策学术部门 在Tech可能有补充的电脑使用政策. 你需要联系他们 去了解他们的政策.

The policy presented here applies to all academic computer systems at Tech, regardless 他们的操作系统或制造商.

The term "academic computer" is meant to include any computer that is used primarily 在理工学院的学术努力. 它可以连接到以太网,也可以不连接到以太网 at Tech. The term "academic computer system" may include network resources as well as the computer.

The phrase "general use academic computer facility" is meant to include facilities, machines, and peripherals that are intended to be used by more than one person in 支持理工学院的教育使命. (例如,这将包括user areas that a department has created for use by students enrolled in its programs. It would not necessarily include computing facilities in a professor's office.)

The term "Computer Staff" includes any professional staff and part-time student employees 谁在学术计算机设施工作.

None of the statements in this policy are to be interpreted in a manner that would 阻碍了理工学院的教育使命. 如果两者之间存在冲突或歧义 statements of this policy and those of other Institute policies, they will be resolved by the Director for Academic Computing and the appropriate Tech representative(s).

This policy will naturally change over the course of time as required to stay abreast of changes in the direction of Tech, in the computer field, and in society. Any such changes will be subject to comment and review by the Tech community and will require approval by such bodies as the President of Tech deems necessary, before going into effect.

Advisories

All data on any academic computer are considered to be the sole property of the owner of the account that created the data, except in instance where the account owner has previously assigned those rights to another or the original work is not that of the account owner.

使用学术计算设施

Any member of Tech may apply for an account to use designated general use academic computing facilities. 也可以为其他学校的教职工创建账户 特别安排学校. 申请时必须出示有效证件 for an account. 学生也可能被要求出示当前的课程表 and proof of validation to show that any required fees have been paid.

Each account holder (or applicant) is required to supply the Computer Staff with the information necessary to properly maintain the system's account information database. [It should be noted that portions of this data may be accessible to anyone with access to the system and that some of the Computer Staff would have full access to the database. 特别是,不存在匿名权或隐私权. That is, users should know that it is possible for others to determine a user's name, given their login id.]

获准特别进入的人指(e).g. 是指进入外部设施 normal hours of operation) must restrict this access to themselves. If they wish to have permission to allow others access to their special privilege, they must specifically ask for it. In any case they must understand that the responsibility for the facilities 这样的访问仍然取决于他们. 在任何情况下,访问的方式(钥匙,访问)都不应该 卡片、密码、密码等.)借给或送给他人,如果发生这种情况, access may subsequently be denied to both the user and the borrower.

客户的特权和责任

Prior to receiving the privileges associated with an academic computer account, users must sign a statement that they also accept the responsibilities that accompany those privileges. People using the academic computer facilities are responsible at all times for using those facilities in a manner that is consistent with this policy and its intent.

They are responsible for obeying all official notices posted in the user areas, attached to equipment, displayed in the message of the day, posted in local policy newsgroups 由适当的工作人员,或以电子邮件公布. They are also responsible for knowing and abiding by the policy set forth in this document, along with any changes 以本段所述的任何方式宣布的.

Users are also responsible for any and all activity initiated by their account. For this reason, as well as to protect their own data, they should select a secure password 为他们的帐户,并保持密码的秘密任何时候. Passwords should not 被写下来,存储在网上,或者给别人. (永远不要给出密码 to ANYONE, even to someone claiming to be a Computer Staff member.)

Users are responsible for protecting their own files and data from reading and/or writing by others, with whatever protection mechanics are provided by the operating system in use. They are also responsible for picking up their printer output in a 及时时尚,避免被盗或处置.

Those using the academic computing facilities must act in a manner that will not cause 对理工学院学术计算资源的破坏. 可以造成伤害的行为的例子 Tech's computing resources include, but are not limited to, electronic distribution of chain-letters, pyramid-schemes, harassing mail, illegal mail and posting material 不适合作为Usenet的目标新闻组.

Theft, accidental damage, or damage caused by other parties must be reported to the Computer Staff as soon as possible so that corrective action can be taken.

Anyone observing or suspecting security violations, harassment, or other inappropriate behavior (for example, noise pollution in a user area) is encouraged to report such 对电脑职员的行为.

Proper Use

The academic computing facilities exist as a resource of Tech to support its missions. The academic computing facilities are not to be used for any commercial activity not 已经与合法的研究活动相关联. 商业活动包括: but are not limited to, consulting, typing services, and developing software for sale.

Game playing and the development of computer games are permitted on academic systems 只有在资源和设施允许的情况下. 这些活动可能受时间限制 and locations. Work in pursuit of the goals of Tech has priority over game playing 游戏开发(与课程无关).

Many resources, such as consoles, disk space, CPU cycles, network bandwidth, printer queues, batch queues, and software licenses, are shared by many people. Use of one or more of these resources in any way that unreasonably restricts its use by others is inappropriate and may require action by the Computer Staff to free the resource. Anyone repeatedly using these limited resources in an unreasonable way, and showing willful disregard for this policy, may be seen as attempting to deny services to others and may lose their access.

Anyone conducting experiments on computer security or self-replicating code must have that activity initially, and then periodically, reviewed to address the risks the 工作可能会落在技术社区的其他人身上. 学术计算主任 must be notified of the activities of such work well in advance of their occurrence 以评估所涉及的风险. 如有可能,我们会作出特别安排 be made to provide an adequate environment for these efforts without risking damage 损害他人的工作或损害他人的工作. 属于上述类别的代码将 include, but not be limited to, virus code, worm code, password cracking code, and password grabbing code.

The state of the systems security at any given time is not to be interpreted as an opportunity for abuse either by attempting to harm the systems or by stealing copyrighted or licensed software. 故意更改系统文件可被视为故意破坏 或恶意破坏科技财产.

The ability to connect to other systems via the network does not imply the privilege to make use of or even connect to these systems unless properly authorized by the 有关系统的拥有人. 技术设施和网络连接可能 not be used for the purposes of making unauthorized connections to, breaking into, or adversely affecting the performance of other systems on the network, whether these 系统是否属于科技公司.

Other organizations that operate computing and network facilities that are reachable from Tech may have their own policies governing the use of those resources. When accessing remote resources from Tech facilities users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.

计算机职员的权限和职责

Tech attempts to acquire and maintain resources that will be beneficial to most people. Tech also makes every reasonable effort to provide sufficient resources to ensure 所有用户都可以合理使用.

Tech will not, at its own expense, acquire, write, or maintain programs or hardware 特殊的:特定的人的应用所特有的. 科技会维护一个人的资源, at that person's expense, if there is sufficient time and staff available to do so. The Computer Staff has the responsibility to provide, when possible, advance notice of system shutdowns for maintenance, upgrades, or changes so that people may plan 围绕系统不可用的时期.

However, under some circumstances, the Computer Staff may shut down a system with 很少或没有事先通知. 将尽一切努力给人们一个机会 在系统停止服务之前保存他们的工作.

From time to time the Computer Staff may be required to adversely affect a person's work (for example, terminate their process) to protect either the computer system (机器和/或网络)或其他人的工作. 当需要这样的行动时 Computer Staff will attempt to contact the users in question and inform them what needs to be done. If they cannot be contacted in the time permitted by the situation, then the Computer Staff member responsible for affecting the users' work must deliver notification, to the user, of what happened and if possible what can be done to prevent it from happening again.

In accordance with federal and state law, the Computer Staff will undertake reasonable effort to maintain the privacy of a person's files, electronic mail, and printer listings. The following actions will require prior authorization, by the faculty or staff member responsible for granting accounts on the systems in question, before they can be carried out:

Computer Staff are also responsible for reporting any violations of Tech policy, state law, or federal law pertaining to the use of Tech computer facilities to the appropriate 当局一旦注意到这种违法行为.

Copyrights and Licenses

It is against federal or state law and this policy to violate copyrights or patents. This applies to, but is not limited to: software, music, video, and any eligible digital item. It is against this policy and against federal or state law, to violate software license agreements.

Copying of licensed software is illegal except as allowed for by the license. Licensed software is not to be copied by anybody except as allowed by license. Many software packages have a limited number of licenses and so require people to share the licenses. The license agreements for some software found on academic computing systems may specifically 限制软件的教学用途. 系统管理员 on which the software resides must be consulted beforehand when planning the use of third party software (found on academic computing systems) for research or administrative tasks in lieu of purchasing research or administrative licenses for this software. To ensure compliance, only the System Administrator for the system may install software on that system.

Source code for licensed software may not be included in any software developed at Tech, in part or in whole, except as specifically permitted by the license pertaining to that source code.

If you have doubts, or questions, about the legality of copying any software, please contact the Director of Academic Computing before you undertake any copying.

Violations

Students and other users of the New Mexico Institute of Mining and Technology Academic Computer Network (ACN) facilities and equipment are expected to adhere at all times to the rules and guidelines established by state or federal law and by this document 及其他学术部门采纳的相关文件. Individuals who violate 这些规则将受到如下所述的纪律处分.

The disposition of situations involving a violation of the policies set forth in this document and the penalties that may be imposed upon the person guilty of the violation(s) 在本节中描述的.

Accidental infractions of this policy such as poorly chosen passwords, overloading systems, excessive disk space consumption, poor judgment, and so on, are typically handled internally in an informal manner by electronic mail or in-person discussions.

More serious infractions, such as unauthorized use, denial of service, attempts to steal passwords or data, attempts to steal licensed software, violations of Tech policies, harassment, or repeated minor infractions, may result in the temporary or permanent loss of academic computer system privileges without advance notice or warning.

Offenses that are in violation of state or federal laws can result in immediate loss, without advance notice or warning, of all academic computing privileges. The appropriate authorities will be notified of any such infractions, and penalties may be imposed under Tech regulations, New Mexico law, or the laws of the United States including 1978年新墨西哥州法规,注释,第30章,第45条.

Bringing of Charges

Charges of violations of these rules may be brought by any member of the student body, staff, and faculty. Charges should be directed to the faculty or staff member responsible 为学术计算系统所涉及的违规. That person will determine 如果需要采取进一步行动. 他或她可要求以书面提出控罪. Normally, charges will be brought within ten days of the alleged violation, but in 有特殊情况的,可以顺延.

Notification of Charges

If further action is required, the faculty or staff member will turn the matter over 给ACN纪律委员会. 这个委员会由两名委员会成员组成 faculty, two students, and a Computer Staff member from the system involved (all of 是ACN的使用者并熟悉其运作). Members are selected 由主管学术事务的副校长任命. The committee will, after meeting with the individual charged and other parties who have information relevant to the case, decide what penalties, if any, are appropriate to the case.

Disciplinary Action

Any individual who is found to have violated ACN rules and/or policies is subject 对下列一项或多项处罚:

The committee may also decide to file charges of violation of the General Campus Rules with the Dean of Students.

纪律处分上诉

Students who have been found to have violated ACN policies may appeal that finding to the Dean of Students. 进一步的上诉将遵循研究所的上诉政策.

Discipline Policy

Users of New Mexico Tech Academic Computer Network (ACN) facilities and equipment are expected to fully adhere to the general Rules, Regulations, and Guidelines established by the Vice President for Academic Affairs in the Student Handbook. Students who violate the rules will be subject to the disciplinary procedures and penalties as enumerated in the General Campus Rules and Disciplinary Policy sections of the Handbook. Faculty and staff using ACN facilities and equipment are subject to the policies and procedures set forth in the Disciplinary Action section of the New Mexico Tech Employee Handbook. Some situations involving faculty may be covered by regulations governing academic freedom and tenure. 用户完全遵守相应的州和联邦法律 as well.

If a violation is sufficiently serious, the matter will be referred to the appropriate authority (e.g., the Director of Academic Computing, Dean of Students, Vice President 教务主任、人力资源总监).

If a complaint concerns the appropriate nature of content, such as electronic mail or World-Wide-Web homepage, a Mediating Committee composed of the Dean of Students, Director of Public Information, Director of Academic Computing, and President of the Student Association, or their designees, will meet with the individual to discuss the complaint. If no voluntary remedy can be reached, the issue will be referred to ACN纪律委员会.