Policy Statement - 96-18 Computing Resources, Access to and Use of 黑料网

Policy Governing Access To and Use of 黑料网 Computing Resources
Approved by 黑料网 Academic Senate in May 1996 and by President Maxson in August 1996

 

Paper copies of this document are available from the Academic Senate office.

  • 1. Introduction
  • 2. Policy
    • 2.1. Basic Rights
      • 2.1.1. Privacy
      • 2.1.2. Freedom of Speech
      • 2.1.3. A Fair Share of Resources
    • 2.2. Governing Principles
      • 2.2.1. Individual Access
      • 2.2.2. Responsible Use
      • 2.2.3. Illegal Acts
      • 2.2.4. No Commercial Use
      • 2.2.5. Fair Sharing
  • 3. Examples of Violations
    • 3.1. Sharing Passwords
    • 3.2. Unauthorized Access
    • 3.3. Abuse of Authority
    • 3.4. Copyrighted Material
    • 3.5. Unauthorized Remote Activities
    • 3.6. System Crashing and Viruses
    • 3.7. Forging Messages
    • 3.8. Harassment
    • 3.9. Interception
    • 3.10. Failure to Protect Account
    • 3.11. Academic Dishonesty
    • 3.12. Violating Priorities
    • 3.13. Interfering With Others 
  • 4. Response to Violations 
    • 4.1. Legal Sanctions
    • 4.2. University Sanctions
    • 4.3. Investigation and Review of Charges 
  • 5. Disclaimers
  • 6. Glossary


 
1. INTRODUCTION

In support of its mission to provide excellent instruction, modern research, and meaningful service, California State University, Long Beach (黑料网) offers computing resources to its students, faculty, and staff. These resources contribute to the work of all members of the University community and, therefore, must be used with great care.

This document is intended to help set the tone for computing and for the use of computing resources at 黑料网: respect for the rights of all users and fair use by all so as to guarantee equitable access to all users. The goal of the University in providing computing resources is to give users powerful tools to further their academic endeavors. (Administrative computing resources at 黑料网 -- those not used in academic endeavors -- are not addressed by this policy.) The privacy of all users and of all of their files is a fundamental right that should be respected by all. You should never use the computing resources in any way that violates the privacy of others. Clearly defined procedures established to protect your rights will consistently be followed as the University maintains the computing system.

Careful and ethical use of computing resources is the responsibility of every user. As a user of these resources, you agree to be subject to the guidelines of the "Policy Governing Access to and Use of 黑料网 Computing Resources." These guidelines apply to all computing resources provided by the University; some guidelines are more directly related to time sharing systems, some to microcomputers and local area networks, and some to all systems. This document includes and expands upon those guidelines, and contains a glossary of the technical terms used in the policy.

Acknowledgements: This Policy has been adapted primarily from the policy in use at the University of Kentucky, with additional ideas from the University of Delaware (especially the section on plagiarism!) and elsewhere.