Access and Usage Policy, 2003

学术计算机网络:访问和使用政策:由教务委员会批准; October 2, 2003; approved by the Regents.

Introduction
Advisories
Access to Academic Computing Facilities
Client Priviliges and Responsibilities
Proper Use
Computer Staff Authorities and Responsibilities
Copyrights and Licenses
Violations
Bringing of Charges
Disciplinary Action
Appeal of Disciplinary Action
Discipline Policy
 

Introduction

开放访问学术网络和相关的学术计算机设施(学术) 计算机网络或ACN)的新墨西哥矿业与技术研究所(技术) and the world is a privilege and requires that individual users act responsibly. Users 必须尊重其他用户的权利,尊重相关系统的完整性 物理资源,并遵守所有相关法律法规和合同义务. This document has been prepared to help people retain that privilege. The preparation 本文档的每一页都包含了使用Tech academic的人员的审查和修改 network and computers.

此文件包含访问和使用学术计算的官方政策 facilities and the academic network at Tech. In addition to this policy academic departments at Tech may have supplemental computer usage policies. You will need to contact them to find out about their policy.

这里提出的政策适用于理工学院的所有学术计算机系统,无论如何 of their operating system or manufacturer.

术语“学术计算机”意味着包括任何主要使用的计算机 for academic efforts at Tech. It may or may not be connected to the Ethernet network at Tech. The term "academic computer system" may include network resources as well as the computer.

“通用学术计算机设施”一词的意思是包括设施, machines, and peripherals that are intended to be used by more than one person in support of the Tech's educational mission. (This would, as an example, include user areas that a department has created for use by students enrolled in its programs. It would not necessarily include computing facilities in a professor's office.)

“计算机员工”一词包括任何专业员工和兼职学生员工 who work in academic computer facilities.

本政策中的任何陈述都不能以下述方式加以解释 hinder the educational mission of Tech. If there is conflict, or ambiguity, between 对于本政策和研究所其他政策的声明,将予以解决 by the Director for Academic Computing and the appropriate Tech representative(s).

这一政策自然会随着时间的推移而改变,以保持与时俱进 of changes in the direction of Tech, in the computer field, and in society. Any such 更改将受到技术社区的评论和审查,并将要求 经理工学院院长认为必要的机构批准后,方可进入 effect.

Advisories

在任何学术计算机上的所有数据都被认为是所有者的唯一财产 创建数据的帐户的,除非帐户所有者具有 先前将这些权利转让给他人或原创作品的,不属于作者 account owner.

Access to Academic Computing Facilities

任何技术人员都可以申请使用指定的通用学术账户 computing facilities. Accounts may also be created for faculty and staff of other schools by special arrangement. Valid identification must be presented when applying for an account. Students may also be required to present a current class schedule and proof of validation to show that any required fees have been paid.

每个帐户持有人(或申请人)必须向电脑职员提供 正确维护系统帐户信息数据库所必需的信息. [应该指出的是,这些数据的一部分可能被任何有访问权限的人访问 一些计算机工作人员可以完全访问数据库. In particular, no right to anonymity or privacy exists. That is, users should know that it is possible for others to determine a user's name, given their login id.]

Persons granted special access means (e.g. means to access facilities outside the normal hours of operation) must restrict this access to themselves. If they wish to 有权限允许别人访问他们的特权,他们必须明确吗 ask for it. In any case they must understand that the responsibility for the facilities so accessed still rests with them. In no case should the means of access (keys, access cards, combinations, passwords, etc.) be lent or given to others and if this occurs, access may subsequently be denied to both the user and the borrower.

Client Privileges and Responsibilities

在获得与学术计算机帐户相关联的特权之前,用户 必须签署一份声明,表明他们也接受随之而来的责任吗 privileges. People using the academic computer facilities are responsible at all times for using those facilities in a manner that is consistent with this policy and its intent.

他们有责任遵守张贴在用户区域的所有官方通知,附件 到设备,显示在当天的消息,张贴在本地政策新闻组 by appropriate staff members, or announced using electronic mail. They are also responsible 知悉并遵守本文件中规定的政策及任何变更 announced by any of the means noted in this paragraph.

Users are also responsible for any and all activity initiated by their account. For 这个原因,以及为了保护自己的数据,他们应该选择一个安全的密码 for their account and keep that password secret at all times. Passwords should not be written down, stored online, or given to others. (Passwords should never be given to ANYONE, even to someone claiming to be a Computer Staff member.)

Users are responsible for protecting their own files and data from reading and/or 由他人编写,使用操作方提供的任何保护机制 system in use. They are also responsible for picking up their printer output in a timely fashion to avoid theft or disposal.

那些使用学术计算设备的人必须以一种不会引起 damage to the academic computing resources of Tech. Examples of acts that can damage 科技公司的计算资源包括但不限于电子分销 连锁信件,传销,骚扰邮件,非法邮件和张贴材料 inappropriate for a targeted Usenet news group.

被盗、意外损坏或其他原因造成的损坏必须报告给 Computer Staff as soon as possible so that corrective action can be taken.

任何发现或怀疑违反安全规定、骚扰或其他不当行为的人 鼓励举报此类行为(例如,用户区域的噪音污染) behavior to the Computer Staff.

Proper Use

学术计算设施作为技术资源存在,以支持其使命. 学术计算设施不得用于任何商业活动 already associated with legitimate research activity. Commercial activities include, 但不限于咨询、打字服务和开发销售软件.

学校系统允许玩游戏和开发电脑游戏 only when resources and facilities permit. These activities may be limited by time and locations. Work in pursuit of the goals of Tech has priority over game playing and game development (unrelated to course work).

许多资源,如控制台、磁盘空间、CPU周期、网络带宽、打印机 queues, batch queues, and software licenses, are shared by many people. Use of one 或者以任何不合理的方式限制他人使用这些资源 is inappropriate and may require action by the Computer Staff to free the resource. 任何人以不合理的方式反复使用这些有限的资源,并表现出 故意无视这一政策,可能被视为试图拒绝为他人提供服务 and may lose their access.

任何进行计算机安全实验或自我复制代码的人都必须拥有 that activity initially, and then periodically, reviewed to address the risks the work may place upon the rest of the Tech community. The Director of Academic Computing 是否必须在此类工作活动发生前得到通知 in order to evaluate the risks involved. When possible, special arrangements will 必须为这些努力提供适当的环境,而不会造成损害 to, or impairment of, other's work. Codes that fall into the above categories would include, but not be limited to, virus code, worm code, password cracking code, and password grabbing code.

The state of the systems security at any given time is not to be interpreted as an 滥用的机会,无论是试图破坏系统或窃取版权 or licensed software. Deliberate alteration of system files can be considered vandalism or malicious destruction of Tech property.

通过网络连接到其他系统的能力并不意味着特权 to make use of or even connect to these systems unless properly authorized by the owner(s) of the system(s) in question. Tech facilities and network connections may not be used for the purposes of making unauthorized connections to, breaking into, 或者对网络上其他系统的性能产生不利影响,无论这些系统 systems are Tech owned or not.

操作可访问的计算和网络设施的其他组织 from Tech may have their own policies governing the use of those resources. When accessing 用户有责任遵守这两项政策 set forth in this document and the policies of the other organizations.

Computer Staff Authorities and Responsibilities

科技试图获取和维护对大多数人有益的资源. Tech also makes every reasonable effort to provide sufficient resources to ensure that reasonable use is possible for all users.

技术部门不会自费购买、编写或维护程序或硬件 peculiar to a particular person's application. Tech will maintain a person's resources, 如果有足够的时间和人员,则由该人员承担费用. 电脑职员有责任在可能的情况下提供事先通知 of system shutdowns for maintenance, upgrades, or changes so that people may plan around periods of system unavailability.

However, under some circumstances, the Computer Staff may shut down a system with little or no advance notification. Every effort will be made to give people a chance to save their work before the system is taken out of service.

电脑职员可能不时被要求对某人的工作产生不利影响 work (for example, terminate their process) to protect either the computer system (machines and/or network) or other people's work. When such action is required the Computer Staff will attempt to contact the users in question and inform them what needs to be done. If they cannot be contacted in the time permitted by the situation, 然后负责影响用户工作的计算机人员必须交付 通知用户发生了什么,如果可能的话可以做些什么来防止 it from happening again.

依照联邦及州法律,本电脑职员将承担合理的责任 努力维护个人文件、电子邮件和打印机清单的隐私. 以下行为需要教师或工作人员事先授权 负责在相关系统上授予帐户,然后才能进行操作 out:

电脑员工也有责任报告任何违反科技政策的行为 法律,或联邦法律有关使用科技电脑设施的适当 authorities whenever such violations come to their attention.

Copyrights and Licenses

侵犯版权或专利是违反联邦或州法律和本政策的. 这适用于,但不限于:软件,音乐,视频和任何符合条件的数字 item. It is against this policy and against federal or state law, to violate software license agreements.

Copying of licensed software is illegal except as allowed for by the license. Licensed software is not to be copied by anybody except as allowed by license. Many software 软件包的许可数量有限,因此需要人们共享这些许可. 在学术计算系统上发现的一些软件的许可协议可能特别 restrict the software to instructional use. The System Administrator for the system 在计划使用时,必须事先咨询软件所在的位置 用于研究或管理的第三方软件(在学术计算系统上发现) tasks in lieu of purchasing research or administrative licenses for this software. 为确保合规性,只有系统管理员才能安装软件 on that system.

许可软件的源代码不得包含在本公司开发的任何软件中 部分或全部技术,除非相关许可证特别允许 to that source code.

如果您对复制任何软件的合法性有疑问或疑问,请 contact the Director of Academic Computing before you undertake any copying.

Violations

新墨西哥矿业和技术学院的学生和其他用户 计算机网络(ACN)设施和设备应始终保持正常 遵守州或联邦法律及本文件制定的规则和准则 and related documents adopted by other academic departments. Individuals who violate these rules are subject to disciplinary action as indicated below.

涉及违反本政策的情况的处理 文件和可能对违规者施加的处罚 are described in this section.

意外违反此策略,如选择不当的密码,超载 系统、磁盘空间消耗过多、判断力差等等,通常是 非正式的内部处理,通过电子邮件或面对面的讨论.

More serious infractions, such as unauthorized use, denial of service, attempts to 窃取密码或数据,试图窃取授权软件,违反科技政策, 骚扰,或多次轻微违规,可能导致暂时或永久 loss of academic computer system privileges without advance notice or warning.

违反州或联邦法律的违法行为会导致直接损失, without advance notice or warning, of all academic computing privileges. The appropriate authorities will be notified of any such infractions, and penalties may be imposed under Tech regulations, New Mexico law, or the laws of the United States including the New Mexico Statutes 1978, Annotated, Chapter 30, Article 45.

Bringing of Charges

学生团体的任何成员都可以对违反这些规定的行为提出指控。 staff, and faculty. Charges should be directed to the faculty or staff member responsible for the academic computing system involved with the infraction. That person will determine if further action is required. He or she may require that the charges be made in writing. Normally, charges will be brought within ten days of the alleged violation, but in special cases the time limitation may be extended.

Notification of Charges

如果需要采取进一步行动,教师或工作人员将移交此事 to the ACN Discipline Committee. This committee is comprised of two members of the 涉及系统的教员、两名学生和一名计算机工作人员 whom are users of the ACN and familiar with its operations). Members are selected and appointed by the Vice President for Academic Affairs. The committee will, after 会见被控人员和其他掌握相关信息的人员 to the case, decide what penalties, if any, are appropriate to the case.

Disciplinary Action

Any individual who is found to have violated ACN rules and/or policies is subject to one or more of the following penalties:

委员会也可以决定对违反校园一般规则的行为提出指控 with the Dean of Students.

Appeal of Disciplinary Action

Students who have been found to have violated ACN policies may appeal that finding to the Dean of Students. Further appeals will follow Institute policies on appeals.

Discipline Policy

Users of New Mexico Tech Academic Computer Network (ACN) facilities and equipment 应完全遵守制定的一般规则、条例和指导方针 by the Vice President for Academic Affairs in the Student Handbook. Students who violate 这些规则将受所列纪律程序和处罚的约束 in the General Campus Rules and Disciplinary Policy sections of the Handbook. Faculty 及使用ACN设施和设备的员工须遵守政策和程序 在新墨西哥州技术员工手册的纪律处分部分规定. Some situations involving faculty may be covered by regulations governing academic freedom and tenure. Users are fully subject to the appropriate state and federal laws as well.

如果违反行为足够严重,则将此事提交有关部门处理 authority (e.g., the Director of Academic Computing, Dean of Students, Vice President for Academic Affairs, Human Resources Director).

如果投诉涉及内容的适当性质,例如电子邮件 或万维网主页,由学生事务主任组成的调解委员会, 公共信息主任,学术计算主任,以及 Student Association, or their designees, will meet with the individual to discuss the complaint. If no voluntary remedy can be reached, the issue will be referred to the ACN Discipline Committee.