(Administrative Policies) (Overview) The Center for Computing Activities is maintained by the University as an educational and research facility for its faculty, research staff, and students. It also supports the data processing requirements of its administrative offices. Usage of the facility is allowed to other organizations by special permission and upon the payment of appropriate fees. (Illegal Usage) Each user is responsible for insuring that his/her use of the computing facility does not interfere with other users or with proper functioning of the system. The Director of Computing Activities or his representative(s) may take any of the actions listed below against violators of this precept. This list is not inclusive. Termination of a program or online session: an irresponsible user at a terminal may be logged off. Similarly, a harmful job running on any system may be cancelled. Improper use of a project number may be reported to the project sponsor. Invalidation of a project number or ID. A project number or terminal system ID may be invalidated. Alternatively, a request may be made that the project number or terminal ID be changed. Serious incidents may be referred directly to the appropriate academic or outside authorities. . Listed below are some examples of activities which are harmful to other users and are not allowed. This list is illustrative and not inclusive. Unauthorized use of project numbers or ID's; unauthorized access to another person's files; using or changing another person's password without authorization. Use of a University project number to perform computing services for commercial or other organizations outside the University, except for outside users. Such prohibited services include development of programs for commercial users, data processing, computations, preparation of advertising material, etc. Possession in a file, or use of programs capable of fraudulently simulating system responses; modification of or possession of systems control information, especially that which reflects program state, status or accounting; attempts to modify or crash the system. Frivolous, disturbing, or otherwise inconsiderate conduct in the terminal areas, as well as the use of terminals for sending nuisance or obscene messages, wasteful use of the facilities for making signs, posters, calendars, etc., on the printers. No game playing is allowed on any CUCCA system. (System Security) CUCCA makes every effort to ensure the integrity of its various systems. All computer systems available to users offer some form of dataset protection which can be modified by an authorized user as needed. However, none of the systems offer absolute dataset security. Thus, users should never place sensitive information on publicly accessible online volumes (disks). The Center cannot, under any circumstance, be held liable for the consequences of such actions. (System Performance) CUCCA reserves the right to hold, cancel, or restart a job or program to improve system performance. The Computer Center also reserves the right to sign off any user--if possible, with proper notification--if CUCCA policy is violated, or it is believed that the programs being run are adversely affecting the performance of a system. (Statement of Liability) CUCCA cannot be held liable for any losses, including lost revenues, or for any claims or demands against the user by any other party. In no event can CUCCA be held liable for consequential damages even if CUCCA has been advised of the possibility of such damages. CUCCA cannot be held responsible for any damages due to the loss of output, loss of data, time delay, system performance, software performance, incorrect advice from a consultant, or any other damages arising from the use of CUCCA's computer facilities. CUCCA will attempt to correct conditions and make appropriate refunds in accordance with the conditions outlined in Chapter 3, ``Accounting,'' in the section on CUCCA Refund Policy. P.S. Some of this goes too far, like no games and such, but I think it's a pretty good document. You might want to put something about whether or not you will read a person's mail. There is a federal law about that, but I'm not sure what it is. I know the best thing to claim is that under normal cercumstances, you will not read a person's mail or files, but that you are not going to guarentee that the mail and/or files will *not* be read. (Otherwise a person can sue your pants off!)