Access and Usage Policy, 2003

Academic Computer Network: Policy on Access and Usage: Approved by the Faculty Council, October 2, 2003; approved by the Regents.

Introduction
Advisories
Access to Academic Computing Facilities
Client Priviliges and Responsibilities
Proper Use
Computer Staff Authorities and Responsibilities
Copyrights and Licenses
Violations
Bringing of Charges
Disciplinary Action
Appeal of Disciplinary Action
Discipline Policy
 

Introduction

Open access to the academic network and associated academic computer facilities (Academic 计算机网络或ACN)的新墨西哥矿业与技术研究所(技术) and the world is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. This document has been prepared to help people retain that privilege. The preparation of this document included review and modification by the people using the Tech academic network and computers.

This document contains the official policy on access and use of the academic computing facilities and the academic network at Tech. In addition to this policy academic departments at Tech may have supplemental computer usage policies. You will need to contact them to find out about their policy.

The policy presented here applies to all academic computer systems at Tech, regardless of their operating system or manufacturer.

术语“学术计算机”意味着包括任何主要使用的计算机 for academic efforts at Tech. It may or may not be connected to the Ethernet network at Tech. The term "academic computer system" may include network resources as well as the computer.

“通用学术计算机设施”一词的意思是包括设施, machines, and peripherals that are intended to be used by more than one person in support of the Tech's educational mission. (This would, as an example, include user areas that a department has created for use by students enrolled in its programs. It would not necessarily include computing facilities in a professor's office.)

The term "Computer Staff" includes any professional staff and part-time student employees who work in academic computer facilities.

本政策中的任何陈述都不能以下述方式加以解释 hinder the educational mission of Tech. If there is conflict, or ambiguity, between statements of this policy and those of other Institute policies, they will be resolved by the Director for Academic Computing and the appropriate Tech representative(s).

这一政策自然会随着时间的推移而改变,以保持与时俱进 of changes in the direction of Tech, in the computer field, and in society. Any such 更改将受到技术社区的评论和审查,并将要求 经理工学院院长认为必要的机构批准后,方可进入 effect.

Advisories

在任何学术计算机上的所有数据都被认为是所有者的唯一财产 创建数据的帐户的,除非帐户所有者具有 先前将这些权利转让给他人或原创作品的,不属于作者 account owner.

Access to Academic Computing Facilities

Any member of Tech may apply for an account to use designated general use academic computing facilities. Accounts may also be created for faculty and staff of other schools by special arrangement. Valid identification must be presented when applying for an account. Students may also be required to present a current class schedule and proof of validation to show that any required fees have been paid.

每个帐户持有人(或申请人)必须向电脑职员提供 正确维护系统帐户信息数据库所必需的信息. [It should be noted that portions of this data may be accessible to anyone with access to the system and that some of the Computer Staff would have full access to the database. In particular, no right to anonymity or privacy exists. That is, users should know that it is possible for others to determine a user's name, given their login id.]

Persons granted special access means (e.g. means to access facilities outside the normal hours of operation) must restrict this access to themselves. If they wish to have permission to allow others access to their special privilege, they must specifically ask for it. In any case they must understand that the responsibility for the facilities so accessed still rests with them. In no case should the means of access (keys, access cards, combinations, passwords, etc.) be lent or given to others and if this occurs, access may subsequently be denied to both the user and the borrower.

Client Privileges and Responsibilities

Prior to receiving the privileges associated with an academic computer account, users must sign a statement that they also accept the responsibilities that accompany those privileges. People using the academic computer facilities are responsible at all times 以符合本政策及其规定的方式使用这些设施 intent.

They are responsible for obeying all official notices posted in the user areas, attached 到设备,显示在当天的消息,张贴在本地政策新闻组 by appropriate staff members, or announced using electronic mail. They are also responsible for knowing and abiding by the policy set forth in this document, along with any changes announced by any of the means noted in this paragraph.

Users are also responsible for any and all activity initiated by their account. For this reason, as well as to protect their own data, they should select a secure password for their account and keep that password secret at all times. Passwords should not be written down, stored online, or given to others. (Passwords should never be given to ANYONE, even to someone claiming to be a Computer Staff member.)

Users are responsible for protecting their own files and data from reading and/or 由他人编写,使用操作方提供的任何保护机制 system in use. They are also responsible for picking up their printer output in a timely fashion to avoid theft or disposal.

Those using the academic computing facilities must act in a manner that will not cause damage to the academic computing resources of Tech. Examples of acts that can damage 科技公司的计算资源包括但不限于电子分销 连锁信件,传销,骚扰邮件,非法邮件和张贴材料 inappropriate for a targeted Usenet news group.

被盗、意外损坏或其他原因造成的损坏必须报告给 Computer Staff as soon as possible so that corrective action can be taken.

Anyone observing or suspecting security violations, harassment, or other inappropriate 鼓励举报此类行为(例如,用户区域的噪音污染) behavior to the Computer Staff.

Proper Use

The academic computing facilities exist as a resource of Tech to support its missions. 学术计算设施不得用于任何商业活动 already associated with legitimate research activity. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale.

学校系统允许玩游戏和开发电脑游戏 only when resources and facilities permit. These activities may be limited by time and locations. Work in pursuit of the goals of Tech has priority over game playing and game development (unrelated to course work).

许多资源,如控制台、磁盘空间、CPU周期、网络带宽、打印机 queues, batch queues, and software licenses, are shared by many people. Use of one 或者以任何不合理的方式限制他人使用这些资源 is inappropriate and may require action by the Computer Staff to free the resource. 任何人以不合理的方式反复使用这些有限的资源,并表现出 willful disregard for this policy, may be seen as attempting to deny services to others and may lose their access.

Anyone conducting experiments on computer security or self-replicating code must have that activity initially, and then periodically, reviewed to address the risks the work may place upon the rest of the Tech community. The Director of Academic Computing 是否必须在此类工作活动发生前得到通知 in order to evaluate the risks involved. When possible, special arrangements will 必须为这些努力提供适当的环境,而不会造成损害 to, or impairment of, other's work. Codes that fall into the above categories would include, but not be limited to, virus code, worm code, password cracking code, and password grabbing code.

在任何给定时间的系统安全状态都不能被解释为 opportunity for abuse either by attempting to harm the systems or by stealing copyrighted or licensed software. Deliberate alteration of system files can be considered vandalism or malicious destruction of Tech property.

通过网络连接到其他系统的能力并不意味着特权 to make use of or even connect to these systems unless properly authorized by the owner(s) of the system(s) in question. Tech facilities and network connections may 不得用于未经授权连接、闯入、 or adversely affecting the performance of other systems on the network, whether these systems are Tech owned or not.

操作可访问的计算和网络设施的其他组织 from Tech may have their own policies governing the use of those resources. When accessing remote resources from Tech facilities users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.

Computer Staff Authorities and Responsibilities

Tech attempts to acquire and maintain resources that will be beneficial to most people. Tech also makes every reasonable effort to provide sufficient resources to ensure that reasonable use is possible for all users.

技术部门不会自费购买、编写或维护程序或硬件 peculiar to a particular person's application. Tech will maintain a person's resources, at that person's expense, if there is sufficient time and staff available to do so. 电脑职员有责任在可能的情况下提供事先通知 of system shutdowns for maintenance, upgrades, or changes so that people may plan around periods of system unavailability.

However, under some circumstances, the Computer Staff may shut down a system with little or no advance notification. Every effort will be made to give people a chance to save their work before the system is taken out of service.

电脑职员可能不时被要求对某人的工作产生不利影响 work (for example, terminate their process) to protect either the computer system (machines and/or network) or other people's work. When such action is required the Computer Staff will attempt to contact the users in question and inform them what needs to be done. If they cannot be contacted in the time permitted by the situation, then the Computer Staff member responsible for affecting the users' work must deliver notification, to the user, of what happened and if possible what can be done to prevent it from happening again.

In accordance with federal and state law, the Computer Staff will undertake reasonable effort to maintain the privacy of a person's files, electronic mail, and printer listings. The following actions will require prior authorization, by the faculty or staff member responsible for granting accounts on the systems in question, before they can be carried out:

Computer Staff are also responsible for reporting any violations of Tech policy, state law, or federal law pertaining to the use of Tech computer facilities to the appropriate authorities whenever such violations come to their attention.

Copyrights and Licenses

侵犯版权或专利是违反联邦或州法律和本政策的. This applies to, but is not limited to: software, music, video, and any eligible digital item. It is against this policy and against federal or state law, to violate software license agreements.

Copying of licensed software is illegal except as allowed for by the license. Licensed software is not to be copied by anybody except as allowed by license. Many software packages have a limited number of licenses and so require people to share the licenses. The license agreements for some software found on academic computing systems may specifically restrict the software to instructional use. The System Administrator for the system 在计划使用时,必须事先咨询软件所在的位置 third party software (found on academic computing systems) for research or administrative tasks in lieu of purchasing research or administrative licenses for this software. To ensure compliance, only the System Administrator for the system may install software on that system.

许可软件的源代码不得包含在本公司开发的任何软件中 Tech, in part or in whole, except as specifically permitted by the license pertaining to that source code.

如果您对复制任何软件的合法性有疑问或疑问,请 contact the Director of Academic Computing before you undertake any copying.

Violations

Students and other users of the New Mexico Institute of Mining and Technology Academic 计算机网络(ACN)设施和设备应始终保持正常 遵守州或联邦法律及本文件制定的规则和准则 and related documents adopted by other academic departments. Individuals who violate these rules are subject to disciplinary action as indicated below.

The disposition of situations involving a violation of the policies set forth in this document and the penalties that may be imposed upon the person guilty of the violation(s) are described in this section.

意外违反此策略,如选择不当的密码,超载 系统、磁盘空间消耗过多、判断力差等等,通常是 非正式的内部处理,通过电子邮件或面对面的讨论.

More serious infractions, such as unauthorized use, denial of service, attempts to steal passwords or data, attempts to steal licensed software, violations of Tech policies, 骚扰,或多次轻微违规,可能导致暂时或永久 loss of academic computer system privileges without advance notice or warning.

Offenses that are in violation of state or federal laws can result in immediate loss, without advance notice or warning, of all academic computing privileges. The appropriate authorities will be notified of any such infractions, and penalties may be imposed under Tech regulations, New Mexico law, or the laws of the United States including the New Mexico Statutes 1978, Annotated, Chapter 30, Article 45.

Bringing of Charges

Charges of violations of these rules may be brought by any member of the student body, staff, and faculty. Charges should be directed to the faculty or staff member responsible for the academic computing system involved with the infraction. That person will determine if further action is required. He or she may require that the charges be made in writing. Normally, charges will be brought within ten days of the alleged violation, but in special cases the time limitation may be extended.

Notification of Charges

如果需要采取进一步行动,教师或工作人员将移交此事 to the ACN Discipline Committee. This committee is comprised of two members of the 涉及系统的教员、两名学生和一名计算机工作人员 whom are users of the ACN and familiar with its operations). Members are selected and appointed by the Vice President for Academic Affairs. The committee will, after 会见被控人员和其他掌握相关信息的人员 to the case, decide what penalties, if any, are appropriate to the case.

Disciplinary Action

Any individual who is found to have violated ACN rules and/or policies is subject to one or more of the following penalties:

The committee may also decide to file charges of violation of the General Campus Rules with the Dean of Students.

Appeal of Disciplinary Action

Students who have been found to have violated ACN policies may appeal that finding to the Dean of Students. Further appeals will follow Institute policies on appeals.

Discipline Policy

Users of New Mexico Tech Academic Computer Network (ACN) facilities and equipment are expected to fully adhere to the general Rules, Regulations, and Guidelines established by the Vice President for Academic Affairs in the Student Handbook. Students who violate 这些规则将受所列纪律程序和处罚的约束 in the General Campus Rules and Disciplinary Policy sections of the Handbook. Faculty and staff using ACN facilities and equipment are subject to the policies and procedures 在新墨西哥州技术员工手册的纪律处分部分规定. Some situations involving faculty may be covered by regulations governing academic freedom and tenure. Users are fully subject to the appropriate state and federal laws as well.

If a violation is sufficiently serious, the matter will be referred to the appropriate authority (e.g., the Director of Academic Computing, Dean of Students, Vice President for Academic Affairs, Human Resources Director).

If a complaint concerns the appropriate nature of content, such as electronic mail 或万维网主页,由学生事务主任组成的调解委员会, 公共信息主任,学术计算主任,以及 Student Association, or their designees, will meet with the individual to discuss the complaint. If no voluntary remedy can be reached, the issue will be referred to the ACN Discipline Committee.