Department of Computer Science Computer Use Policy 1. Introduction This policy governs use of computers and related equipment operated by the Department of Computer Sciences of The University of Texas at Austin. Each computer user is a member of a community; the purpose of this policy is to maximize the value of our resources to that community. The intent of the policy is to permit maximum freedom of use consistent with State Law, University policy, and a productive working environment. The policy applies to all those who use CS computers. Depending on the seriousness of an offense, violation of the policy can result in penalties ranging from reprimand to loss of account to referral to University authorities for disciplinary action. 2. State Law and University Policy Use of CS computers must comply with Texas law and University policies. Therefore, CS computers may not be used for commercial or profit-making purposes (except for the production of drafts of scholarly tests), for political purposes, or for personal benefit where such use incurs a cost to the Department and is not academically related. State law prohibits unauthorized access to computer systems. Access of or attempts to access another person's directory, files, or mail, whether protected or not, without permission of the owner is prohibited. Attempts to access unauthorized machines via the computer network, to decrypt encrypted materials, or to obtain privileges to which the user is not entitled are prohibited. The University has signed software licenses for much of the software that is available on CS computer systems; removal or transfer of such software without authorization is prohibited. User acknowledgment of this policy statement authorizes CS computer systems staff to examine the user's files if required as part of their official duties. Sharing of a computer account with other persons is prohibited; each user must have an individual account. Passwords should be protected, an the user should not leave a machine logged on when the user is not present unless the machine is in a secure area, such as a private office. 3. Working Environment Users of CS machines should conduct themselves in a manner that promotes a productive working environment. Conduct that creates a disturbance to other users is prohibited; this includes making noise, taking beverages into the computer labs, and printing or displaying materials that are unsuitable for public display. Conduct that intentionally or negligently interferes with the proper operation of the system or its use by others is prohibited. Users of electronic mail and bulletin boards should avoid sending messages that are libelous, patently offensive, or that intimidate, threaten, demean, or harass individuals or groups, or that would otherwise bring discredit to the University or the Department. 4. Use of Resources Users of CS computers should not consume unreasonable amounts of limited resources. Resources that are in limited supply include laser printing, disk space and, in some cases, machine access itself. Laser printing should be used only when necessary; it should not be used for multiple copies. Picture files or other large files should not be stored on disk unless they are academically relevant. Playing of games and other non-academic activities should be restricted to periods of off-peak usage. The Department may impose restrictions or limits on use of resources.