OF LOUISIANA AT LAFAYETTE
POLICIES ON ACCESS AND USAGE OF COMPUTERS AND NETWORKS
DATE: JUNE 6, 1989
AVAILABILITY STATEMENT ADDED AT BEGINNING: 9/14/94
FROM: D. T. BONNETTE DCIS; S. J. MAHLER DIN
The University of Louisiana at Lafayette developed and maintains
various computing and network facilities in order to enhance the
effectiveness of the instructional, research, and administrative
missions of the University. The primary goal of the related staffs
is to maximize the available computation resources within prevailing
constraints. Historically, available computational resources have
not adequately handled all of the various needs. Thus, prudent utilization
of available resources is a necessity. The following policies have
been adopted in order to maintain a reasonable level of computing
and networking resources. In relation to all the various University
missions, policies given here seek to promote directly-related usage,
curtail moderately-related usage, and eliminate unrelated, illegal
and abusive usage. In addition, policies are included to help maintain
an ethical and amicable working environment for all computer and
network users. Network facilities (refered to as `network') are defined
as any University network (such as OUINET) or any other network accessed
through any University network or computer facility. Computer facilities
(refered to as `computer') are defined as any University computer
or any other computer accessed through network or University computer
Only persons properly authorized may access network or computer facilities.
Proper authorization is provided by authorized staff or their designate
in the form of an `account', `id' or `signon' issued in the name
of the authorized person. Users may not permit other persons to
access a network or host computer via their account. Users who
violate this policy will lose their access authorization for a
period of time commensurate with the infraction. Repeat offenders
may be denied access indefinitely.
To enable staff to accurately maintain information about the user
of each account, each user has the responsibility to provide current
status information to necessary staff, including school or department
of affiliation, degree program (undergraduate or graduate), expected
graduation/termination date, and University position (faculty, professional,
clerical, graduate assistant, graduate student or undergradute).
To check the current information a staff has on file, contact that
staff directly. If you are classified incorrectly, or the account
termination date is incorrect, contact your site administrator or
your school's office which handles computer accounts.
Computer networks and host machines are intended to provide students,
staff, and faculty the computational resources needed to meet
their recognized educational, research, and administrative commitments
to the University of Southwestern Louisiana. All other uses are
proper only if machine load is low, the terminal is not otherwise
needed, and the use is not prohibited by other applicable policy,
i.e. University, School, Department or Information Networks.
Low machine load is considered to be times when your presence
will not be noted by any user with a primary mission session.
If your computer or network usage is detectable (by delayed response
times or performance or any other factor), you are in violation.
Users may NOT harass or threaten other users, attempt to steal
passwords, files, or other user/system information, attempt
to crash, violate the integrity of, or adversely affect the
activities of a computer system or network. When any process
is consuming excessive system resources or objectionably degrading
system response it may be terminated, or its priority may be
altered, without notice. Distasteful or offensive displays,
messages and printouts are not permitted. Physical abuse, mishandling
and modification of terminals, printers and other hardware
is not permitted. Occurrences of misconduct in these areas
will result in loss of computer access. If you believe your
account has been compromised by another party you are responsible
for reporting (during the same or next business day) to the
system administrator. Failure to do so will make you accountable
for any (mis)use of your account. Computer files can be inspected
without notice by the system administrator. Computer files
not related to official missions of the University and which
consume large amounts of space may be removed without warning
by staff. When users exceed their storage allocation, they
are notified. Some systems notify users by system electronic
mail or direct message. The message (frequently) will indicate
resource usage at the time storage accounting was performed,
and the user's storage space allocation limit. If the storage
allocation is exceeded for an extended period, the user account
may be disabled.
Many systems are operated at the University under license agreements
with companies such as AT&T, Honeywell, IBM, and organizations
such as SURA and NSF. Under these agreements some computers
and networks may be used for instructional, research and
administrative purposes only. The various licenses bind each
and every user to respect the proprietary nature of the software;
the specifics of the operating system may not be taught,
nor may the system or any part thereof be moved to, or copies
released to ANY other site. Under the license agreements
and state regulations, there is a strict policy that network
and computer facilities may under no circumstances be used
for personal gain, or to place a third party in a position
of commercial advantage. To protect our license status, the
University requires that any person wishing to transport
software from a host or personal computer, which he or she
did not personally develop, get approval from the system
administrator for the machine that the software was developed
- WASTEFUL AND ABUSIVE USAGE
In general, the University does not have enough computing
resources to meet the needs of students, faculty, and staff. Therefore,
all users are expected to use good judgment in sharing limited resources.
Computer usage not necessary to meet recognized educational, research,
and administrative commitments of the University will be considered
wasteful, abusive, and theft committed against users attempting to complete
recognized work. Waste can also be in the forms of unnecessary storage
of disk files, careless execution of high resource consuming programs,
or generation of excessive printed output. Users should also be aware
that hard copy output devices are expensive to operate and that wasteful
usage of such devices must be avoided. GAME PLAYING (even considering
redeeming qualities of user familiarization to computers) is considered
wasteful and abusive except as prescribed here.
``Game playing'' is defined here as development or execution
of a computer program which primarily provides amusement or pastime diversion.
Game playing is permitted only when the game is a class assignment. Other
uses including campus and non-profit organizations must be approved in
advance by the Director of Computing and Information Services. Application
for such use should be made in writing to the appropiate system administrator.
- LOSS OF ACCESS REPORTS
Loss of Access Authorization and/or Account reports are
always distributed to the system administrator of the involved computer
system and to the Director of Information Networks. Subsequent report
disposition and actions vary for the various organizations envolved.
Typically, reports involving students are handled as follows:
First report: filed with student's records within his respective
Second report: same as first report with copies sent to
his respective School's Academic Affairs Office and the Dean of Students
Third report: same as second report with referal for University
disciplinary action and indefinite loss of access authorization.
Any number of report levels may be skipped dependent upon
the nature of the incident.
This policy does not preclude enforcement under the laws
and regulations of Federal, State and Local Authorities. Any questions
concerning ethical or legal use of computing or network facilities
should be directed to the Director of Computing and Information Services.