Access and Usage Policy, 2003

学术计算机网络:访问和使用政策:由教务委员会批准; October 2, 2003; approved by the Regents.

Introduction
Advisories
Access to Academic Computing Facilities
Client Priviliges and Responsibilities
Proper Use
Computer Staff Authorities and Responsibilities
Copyrights and Licenses
Violations
Bringing of Charges
Disciplinary Action
Appeal of Disciplinary Action
Discipline Policy
 

Introduction

开放访问学术网络和相关的学术计算机设施(学术) Computer Network or ACN) of the New Mexico Institute of Mining and Technology (Tech) and the world is a privilege and requires that individual users act responsibly. Users 必须尊重其他用户的权利,尊重相关系统的完整性 物理资源,并遵守所有相关法律法规和合同义务. This document has been prepared to help people retain that privilege. The preparation 本文档的每一页都包含了使用Tech academic的人员的审查和修改 network and computers.

此文件包含访问和使用学术计算的官方政策 facilities and the academic network at Tech. In addition to this policy academic departments at Tech may have supplemental computer usage policies. You will need to contact them to find out about their policy.

这里提出的政策适用于理工学院的所有学术计算机系统,无论如何 of their operating system or manufacturer.

The term "academic computer" is meant to include any computer that is used primarily for academic efforts at Tech. It may or may not be connected to the Ethernet network at Tech. The term "academic computer system" may include network resources as well as the computer.

The phrase "general use academic computer facility" is meant to include facilities, machines, and peripherals that are intended to be used by more than one person in support of the Tech's educational mission. (This would, as an example, include user areas that a department has created for use by students enrolled in its programs. It would not necessarily include computing facilities in a professor's office.)

“计算机员工”一词包括任何专业员工和兼职学生员工 who work in academic computer facilities.

None of the statements in this policy are to be interpreted in a manner that would hinder the educational mission of Tech. If there is conflict, or ambiguity, between 对于本政策和研究所其他政策的声明,将予以解决 by the Director for Academic Computing and the appropriate Tech representative(s).

这一政策自然会随着时间的推移而改变,以保持与时俱进 of changes in the direction of Tech, in the computer field, and in society. Any such changes will be subject to comment and review by the Tech community and will require approval by such bodies as the President of Tech deems necessary, before going into effect.

Advisories

在任何学术计算机上的所有数据都被认为是所有者的唯一财产 of the account that created the data, except in instance where the account owner has previously assigned those rights to another or the original work is not that of the account owner.

Access to Academic Computing Facilities

Any member of Tech may apply for an account to use designated general use academic computing facilities. Accounts may also be created for faculty and staff of other schools by special arrangement. Valid identification must be presented when applying for an account. Students may also be required to present a current class schedule and proof of validation to show that any required fees have been paid.

Each account holder (or applicant) is required to supply the Computer Staff with the information necessary to properly maintain the system's account information database. [应该指出的是,这些数据的一部分可能被任何有访问权限的人访问 一些计算机工作人员可以完全访问数据库. In particular, no right to anonymity or privacy exists. That is, users should know that it is possible for others to determine a user's name, given their login id.]

Persons granted special access means (e.g. means to access facilities outside the normal hours of operation) must restrict this access to themselves. If they wish to 有权限允许别人访问他们的特权,他们必须明确吗 ask for it. In any case they must understand that the responsibility for the facilities so accessed still rests with them. In no case should the means of access (keys, access cards, combinations, passwords, etc.) be lent or given to others and if this occurs, access may subsequently be denied to both the user and the borrower.

Client Privileges and Responsibilities

Prior to receiving the privileges associated with an academic computer account, users must sign a statement that they also accept the responsibilities that accompany those privileges. People using the academic computer facilities are responsible at all times for using those facilities in a manner that is consistent with this policy and its intent.

他们有责任遵守张贴在用户区域的所有官方通知,附件 to equipment, displayed in the message of the day, posted in local policy newsgroups by appropriate staff members, or announced using electronic mail. They are also responsible 知悉并遵守本文件中规定的政策及任何变更 announced by any of the means noted in this paragraph.

Users are also responsible for any and all activity initiated by their account. For 这个原因,以及为了保护自己的数据,他们应该选择一个安全的密码 for their account and keep that password secret at all times. Passwords should not be written down, stored online, or given to others. (Passwords should never be given to ANYONE, even to someone claiming to be a Computer Staff member.)

Users are responsible for protecting their own files and data from reading and/or writing by others, with whatever protection mechanics are provided by the operating system in use. They are also responsible for picking up their printer output in a timely fashion to avoid theft or disposal.

那些使用学术计算设备的人必须以一种不会引起 damage to the academic computing resources of Tech. Examples of acts that can damage Tech's computing resources include, but are not limited to, electronic distribution of chain-letters, pyramid-schemes, harassing mail, illegal mail and posting material inappropriate for a targeted Usenet news group.

Theft, accidental damage, or damage caused by other parties must be reported to the Computer Staff as soon as possible so that corrective action can be taken.

任何发现或怀疑违反安全规定、骚扰或其他不当行为的人 behavior (for example, noise pollution in a user area) is encouraged to report such behavior to the Computer Staff.

Proper Use

学术计算设施作为技术资源存在,以支持其使命. The academic computing facilities are not to be used for any commercial activity not already associated with legitimate research activity. Commercial activities include, 但不限于咨询、打字服务和开发销售软件.

Game playing and the development of computer games are permitted on academic systems only when resources and facilities permit. These activities may be limited by time and locations. Work in pursuit of the goals of Tech has priority over game playing and game development (unrelated to course work).

Many resources, such as consoles, disk space, CPU cycles, network bandwidth, printer queues, batch queues, and software licenses, are shared by many people. Use of one or more of these resources in any way that unreasonably restricts its use by others is inappropriate and may require action by the Computer Staff to free the resource. Anyone repeatedly using these limited resources in an unreasonable way, and showing 故意无视这一政策,可能被视为试图拒绝为他人提供服务 and may lose their access.

任何进行计算机安全实验或自我复制代码的人都必须拥有 that activity initially, and then periodically, reviewed to address the risks the work may place upon the rest of the Tech community. The Director of Academic Computing must be notified of the activities of such work well in advance of their occurrence in order to evaluate the risks involved. When possible, special arrangements will be made to provide an adequate environment for these efforts without risking damage to, or impairment of, other's work. Codes that fall into the above categories would include, but not be limited to, virus code, worm code, password cracking code, and password grabbing code.

The state of the systems security at any given time is not to be interpreted as an 滥用的机会,无论是试图破坏系统或窃取版权 or licensed software. Deliberate alteration of system files can be considered vandalism or malicious destruction of Tech property.

The ability to connect to other systems via the network does not imply the privilege to make use of or even connect to these systems unless properly authorized by the owner(s) of the system(s) in question. Tech facilities and network connections may not be used for the purposes of making unauthorized connections to, breaking into, 或者对网络上其他系统的性能产生不利影响,无论这些系统 systems are Tech owned or not.

Other organizations that operate computing and network facilities that are reachable from Tech may have their own policies governing the use of those resources. When accessing 用户有责任遵守这两项政策 set forth in this document and the policies of the other organizations.

Computer Staff Authorities and Responsibilities

科技试图获取和维护对大多数人有益的资源. Tech also makes every reasonable effort to provide sufficient resources to ensure that reasonable use is possible for all users.

Tech will not, at its own expense, acquire, write, or maintain programs or hardware peculiar to a particular person's application. Tech will maintain a person's resources, at that person's expense, if there is sufficient time and staff available to do so. The Computer Staff has the responsibility to provide, when possible, advance notice of system shutdowns for maintenance, upgrades, or changes so that people may plan around periods of system unavailability.

However, under some circumstances, the Computer Staff may shut down a system with little or no advance notification. Every effort will be made to give people a chance to save their work before the system is taken out of service.

From time to time the Computer Staff may be required to adversely affect a person's work (for example, terminate their process) to protect either the computer system (machines and/or network) or other people's work. When such action is required the Computer Staff will attempt to contact the users in question and inform them what needs to be done. If they cannot be contacted in the time permitted by the situation, 然后负责影响用户工作的计算机人员必须交付 通知用户发生了什么,如果可能的话可以做些什么来防止 it from happening again.

依照联邦及州法律,本电脑职员将承担合理的责任 努力维护个人文件、电子邮件和打印机清单的隐私. 以下行为需要教师或工作人员事先授权 负责在相关系统上授予帐户,然后才能进行操作 out:

电脑员工也有责任报告任何违反科技政策的行为 法律,或联邦法律有关使用科技电脑设施的适当 authorities whenever such violations come to their attention.

Copyrights and Licenses

It is against federal or state law and this policy to violate copyrights or patents. 这适用于,但不限于:软件,音乐,视频和任何符合条件的数字 item. It is against this policy and against federal or state law, to violate software license agreements.

Copying of licensed software is illegal except as allowed for by the license. Licensed software is not to be copied by anybody except as allowed by license. Many software 软件包的许可数量有限,因此需要人们共享这些许可. 在学术计算系统上发现的一些软件的许可协议可能特别 restrict the software to instructional use. The System Administrator for the system on which the software resides must be consulted beforehand when planning the use of 用于研究或管理的第三方软件(在学术计算系统上发现) tasks in lieu of purchasing research or administrative licenses for this software. 为确保合规性,只有系统管理员才能安装软件 on that system.

Source code for licensed software may not be included in any software developed at 部分或全部技术,除非相关许可证特别允许 to that source code.

If you have doubts, or questions, about the legality of copying any software, please contact the Director of Academic Computing before you undertake any copying.

Violations

新墨西哥矿业和技术学院的学生和其他用户 Computer Network (ACN) facilities and equipment are expected to adhere at all times to the rules and guidelines established by state or federal law and by this document and related documents adopted by other academic departments. Individuals who violate these rules are subject to disciplinary action as indicated below.

涉及违反本政策的情况的处理 文件和可能对违规者施加的处罚 are described in this section.

Accidental infractions of this policy such as poorly chosen passwords, overloading systems, excessive disk space consumption, poor judgment, and so on, are typically handled internally in an informal manner by electronic mail or in-person discussions.

More serious infractions, such as unauthorized use, denial of service, attempts to 窃取密码或数据,试图窃取授权软件,违反科技政策, harassment, or repeated minor infractions, may result in the temporary or permanent loss of academic computer system privileges without advance notice or warning.

违反州或联邦法律的违法行为会导致直接损失, without advance notice or warning, of all academic computing privileges. The appropriate authorities will be notified of any such infractions, and penalties may be imposed under Tech regulations, New Mexico law, or the laws of the United States including the New Mexico Statutes 1978, Annotated, Chapter 30, Article 45.

Bringing of Charges

学生团体的任何成员都可以对违反这些规定的行为提出指控。 staff, and faculty. Charges should be directed to the faculty or staff member responsible for the academic computing system involved with the infraction. That person will determine if further action is required. He or she may require that the charges be made in writing. Normally, charges will be brought within ten days of the alleged violation, but in special cases the time limitation may be extended.

Notification of Charges

If further action is required, the faculty or staff member will turn the matter over to the ACN Discipline Committee. This committee is comprised of two members of the faculty, two students, and a Computer Staff member from the system involved (all of whom are users of the ACN and familiar with its operations). Members are selected and appointed by the Vice President for Academic Affairs. The committee will, after meeting with the individual charged and other parties who have information relevant to the case, decide what penalties, if any, are appropriate to the case.

Disciplinary Action

Any individual who is found to have violated ACN rules and/or policies is subject to one or more of the following penalties:

委员会也可以决定对违反校园一般规则的行为提出指控 with the Dean of Students.

Appeal of Disciplinary Action

Students who have been found to have violated ACN policies may appeal that finding to the Dean of Students. Further appeals will follow Institute policies on appeals.

Discipline Policy

Users of New Mexico Tech Academic Computer Network (ACN) facilities and equipment 应完全遵守制定的一般规则、条例和指导方针 by the Vice President for Academic Affairs in the Student Handbook. Students who violate the rules will be subject to the disciplinary procedures and penalties as enumerated in the General Campus Rules and Disciplinary Policy sections of the Handbook. Faculty 及使用ACN设施和设备的员工须遵守政策和程序 set forth in the Disciplinary Action section of the New Mexico Tech Employee Handbook. Some situations involving faculty may be covered by regulations governing academic freedom and tenure. Users are fully subject to the appropriate state and federal laws as well.

如果违反行为足够严重,则将此事提交有关部门处理 authority (e.g., the Director of Academic Computing, Dean of Students, Vice President for Academic Affairs, Human Resources Director).

If a complaint concerns the appropriate nature of content, such as electronic mail or World-Wide-Web homepage, a Mediating Committee composed of the Dean of Students, Director of Public Information, Director of Academic Computing, and President of the Student Association, or their designees, will meet with the individual to discuss the complaint. If no voluntary remedy can be reached, the issue will be referred to the ACN Discipline Committee.