Usage Policy

Computer Access and Usage Policy

(Revision 1.4 – 07/27/99)

Computer Access and Usage Policy
Department of Computer Science
Florida State University

1. Introduction

The Computer Science Department at Florida State University operates and maintains a collection of servers, workstations, microcomputers, and associated peripherals in order to promote its instructional, research, and administrative efforts. These machines are joined together into several local area networks which are connected to the FSU campus backbone and to the Internet.

In this policy statement the term “user” refers to any person consuming computer resources in the Department’s facilities; the term “Administration” refers to the Department Chair and the administrative and technical staff who are responsible for the management of those computer resources; the term “Department” refers to the Florida State University Department of Computer Science.

2. Disclaimers

  1. The Administration accepts no responsibility for any damage or loss of data arising directly or indirectly from the use of these facilities or for any consequential loss or damage.
  2. Although backups are performed to protect data in the event of a hardware or software failure, the Administration makes no warranty that all data can or will be restored, and accepts no responsibility for any damage or loss of data arising directly or indirectly from the failure of hardware or software, or from human error.
  3. Because the goals of the Department are primarily educational in nature, computer systems are generally open to perusal and investigation by users, and security controls may be less restrictive than they would be in other environments. The Administration accepts no responsibility for any loss of privacy, theft of information, damage, or loss of data arising directly or indirectly from the absence or failure of system security protection mechanisms.
  4. The Administration makes no warranty, express or implied, regarding the computer service offered, or their fitness for any particular purpose.

3. Access to Department Facilities

  1. The computing facilities of the Department are made available to the faculty, staff, and students of the Department, generally without charge. Limited guest privileges are offered to faculty, staff, and students from other departments by special arrangement.
  2. . Only properly authorized persons may access Department facilities; authrization is provided in the form of a user account. A student must have a valid FSU ID card to enter the Department’s computer labs.
  3. A user may not permit any other person, including other authorized users, to access Department computing facilities through his or her account.
  4. Those persons who have been issued access cards, or alarm codes to obtain access to Department facilities may not use these items to allow other persons to access the facilities. Access cards, and codes may not be loaned to others.

4. User responsibilities

  1. Each user is required to provide true information concerning University status, major, rank (if staff), and expected graduation or termination date.
  2. Each user is responsible for any and all activity initiated in or on Department facilities by his or her account.
  3. Users are responsible for maintaining the security of their password. Passwords should not be kept online or placed into any electronic mail message.
  4. Users are responsible for setting proper protection permissions on their own user space. Most printers are placed in public areas; users are responsible for picking up sensitive output in a timely fashion.
  5. Users are responsible for reporting any system security violation, or suspected security violation to the Administration immediately.
  6. It is the responsibility of every user to act in such a manner as to not cause physical damage to any of the Department equipment. No food or drink is allowed in the Department’s computer labs.
  7. Users may not be abusive to others while using the Department facilities, whether it be physical, verbal, electronic, or any other form of abuse.
  8. Users may not intentionally develop or use programs which harass other users of the system. Harassing or defamatory material may not be sent via electronic mail, posted to electronic bulletin boards, displayed on Department terminals or be output to printer listings.
  9. Users are responsible for using the Department facilities in a manner that is ethical, legal, and not to the detriment of others.
  10. Many resources such as disk space, CPU cycles, floating software licenses, login sessions, and printer queues are resources that are shared by all users. No user may monopolize these resources.
  11. Any user who intends to consume an abnormal amount of resources should present a plan to the Administration before embarking on his or her research project.
  12. Department facilities may not be used for any activity that is commercial in nature without first obtaining written permission to do so.
  13. Users may not develop or use programs which
    1. attempt to bypass the security mechanisms of the system,
    2. steal passwords or data,
    3. are designed to replicate themselves or attach themselves to other programs (commonly called worms and viruses),
    4. are designed to bypass software licensing or copyright restrictions, or
    5. alter the “From” line or other attribution of origin in electronic mail.
  14. Files owned by individual users are not to be read or altered by users without permission of the owner even if the file permissions make it accessible.
  15. System files are generally readable to all users in an educational environment. This read-only access is not to be abused by attempting to harm the systems. Deliberate alteration of system files is vandalism or malicious destruction of University property.

5. Administration Rights and Responsibilities

In general, the responsibility of the Administration is to keep the computing resources operating and available.

  1. In the normal course of system administration, the Administration may have to examine files, electronic mail, and printer listings to gather sufficient information to diagnose and correct problems with system software, or, with reasonable cause for suspicion, to determine if a user is acting in violation of the policies set forth in this document.
  2. With reasonable cause for suspicion, the Administration has the right to monitor any and all aspects of system activity, including individual login sessions, to determine if a user is acting in violation of policies set forth in this document.
  3. The Administration has the right to implement software that monitors user activity and logs any and all system events.
  4. The Administration has the right to alter the priority or terminate the execution of any process that is consuming excessive system resources or objectionably degrading system response, with or without prior notification.
  5. The Administration has the right to remove or compress disk files that are not related to the Department mission and which are consuming large amounts of disk space, with or without prior notification.
  6. The Administration has the right to terminate login sessions that have been idle for long periods of time, in order to free resources.
  7. The Administration has the responsibility to provide advance notice of system shutdown for maintenance or upgrades so that users may plan around times of system unavailability. However, in the event of emergency, the Administration has the right to shut down a system with little or no advance notification.

6. Software Copyrights and Licenses

The software used on Department facilities is operated under license agreements with various vendors.

  1. United States copyright and patent laws protect the interests of authors, inventors, and software developers in their products. Software license agreements serve to increase compliance with copyright and patent laws. It is against federal law and Department policy to violate the copyrights or patents on computer software. It is against Department policy and may be a violation of state or federal law to violate software license agreements.
  2. The Department’s UNIX source code license binds each and every user to respect the proprietary nature of the UNIX operating system and its source code.
  3. Software in use on Department facilities, unless it is stored in areas specifically marked as containing copyable software, may not be copied to magnetic tape, hard or floppy disks, or otherwise removed from Department facilities.

7. Violations, Enforcement, and Penalties

The disposition of situations involving a violation of the policies set forth in this document and the penalties that may be imposed for these violations are as described below.

  1. Minor infractions of this policy, when likely accidental in nature, such as poorly chosen passwords, overloading systems, excessive disk space consumption, and so on are typically handled internally by the Administration in an informal manner by electronic mail or in-person discussions. Infractions that are adversely affecting system performance may result in the immediate but temporary loss of Department access privileges.
  2. Infractions such as sharing accounts or passwords, harassment, or repeated minor infractions as described above may result in the temporary or permanent loss or modification of Department access privileges.
  3. More serious infractions, such as unauthorized use, attempts to steal passwords or data, attempts to steal licensed software, violations of University policies, or repeated minor violations may result in temporary or permanent loss of Department access privileges. In serious cases, the Department Chair may refer the case to the Dean of Students, the Dean of Faculties, or the Vice-President for Administration for appropriate action.
  4. Offenses which are in violation of local, state or federal laws will be reported to the University law enforcement authorities.

I have read, understand, and agree to abide by all elements of the Florida State University Computer Science Department Computer Access and Usage Policy (revision 1.4 – 07/27/99). I understand that upon violation of this policy, the Administration retains the right to deny access privileges, and that if warranted, further disciplinary action may be taken by the University, including prosecution under applicable state and federal laws.