Boston University Information Technology ethics Conditions of Use and Policy on Computing Ethics September 1, 1988 ------------------------------------------------------------------------ CONDITIONS OF USE To protect the integrity of the computer system against unauthorized or improper use, and to protect authorized users from the effects of unau- thorized or improper usage of the system, Boston University reserves the rights to: limit or restrict any account holder's usage, inspect, copy, remove or otherwise alter any data, file, or system resources which may undermine the authorized use of that system with or without notice to the user. The University also reserves the right to periodically check the system and any other rights necessary to protect the University com- puter facilities. The University disclaims responsibility for loss of data or interference with files resulting from its efforts to maintain the privacy and secur- ity of the University's computer facilities. Users of the University's facilities are required to comply with the University Policy on Computing Ethics, and by using the system, the user agrees to comply with and be subject to the Policy on Computing Ethics and these Conditions of Use. The University reserves the right to amend this statement at any time with or without notice. POLICY ON COMPUTING ETHICS Thousands of users share the computing facilities at Boston University. Most people use these resources responsibly. However, a few users who misuse the computing facilities have the potential for seriously dis- rupting the work of other users. You are expected to exercise responsible, ethical behavior when using the University's computing facilities. This includes the following: 1. You must use only those computer accounts which have been author- ized for your use by the University. The unauthorized use of another's account, as well as the providing of false or misleading information for the purpose of obtaining access to computing facilities is prohibited and may be regarded as a criminal act and will be treated accordingly by the University. 2. You may not authorize anyone to use your account(s) for any rea- son. You are responsible for all usage on your accounts. You must take all reasonable precautions, including password mainte- nance and file protection measures, to prevent use of your accounts by unauthorized persons. 3. You must use your accounts only for the purposes for which they were authorized. For example, non-funded research or student accounts may not be used for funded research or private consulting without prior approval from the University. You must not use your accounts for unlawful purposes, such as the installation of fraud- ulently or illegally obtained software. 4. You must not access or copy files (including programs, members of subroutine libraries, and data) that belong to another account without prior authorization from the account holder. Files may not be taken to other computer sites without permission from the holder of the account under which the files reside. 5. You must not use the system irresponsibly, or needlessly affect the work of others. This includes transmitting or making accessi- ble offensive, annoying or harassing material; intentionally dam- aging the system; intentionally damaging information not belonging to you; or intentionally misusing system resources or allowing misuse of system resources by others. 6. You are responsible for reporting to Information Technology any violation of these guidelines by another individual. You are also encouraged to report any information relating to a flaw in, or bypass of, computer facilities security. Failure to comply with the above guidelines, or the unauthorized or illegitimate use of Boston University's computing facilities or resourc- es, shall constitute a violation of University policy and will subject the violator to disciplinary or legal action by the University. In addition, the University may require restitution for any use of service which is in violation of these guidelines. Any questions about this policy or of the applicability of this policy to a particular situation should be referred to Information Technology.