The following is Mankato State University's official policy on academic computer usage. Leonard Schmidt n13@krypton.mankato.msus.edu asks for comments. --------------------------------------------------- POLICY ON ACADEMIC COMPUTER USAGE APPROPRIATE USE OF COMPUTING FACILITIES The faculty/staff of the University reserves the right to examine files and accounting system information generated through student use of the University computing facilities. Academic computing resources on the Mankato State University Campus are for use in the instructional, research, and outreach activities of the University only. USERID'S are defined as those identification characters which allow students, staff, faculty and other designated individuals access to the systems available through the facilities of Mankato State University and those systems for which it has responsibility. Some examples of USERID'S are, but are not limited to, the following: userid on Sperry username on all VAXes and networked VAXes for which Mankato State University has authority to issues userids userids' assigned for specific classes, courses, and/or projects Student users are authorized to use the resources only under their own userids, and only for those purposes authorized by their instructor or projects under which they have authorized access. Instructors have the right to review the class activity of any user in that class. Minnesota State Statutes 609.88 and 609.89, state that, unauthorized access to or unauthorized use of computing resources is a criminal offense. Unauthorized possession of or tampering with computer data can be a felony. Computer Services maintains a high degree of vigilance over the use of computing resources and will aggressively seek recourse (legal and/or otherwise) in cases of fraudulent or unauthorized use of resources. The users should protect themselves against unauthorized use of resources under their userids for which they are accountable. Do not allow others to use your userid, file space, or other resources. CHANGE YOUR PASSWORD whenever you feel it may have become known to someone else. Report promptly to Computer Services and your instructor if you suspect that someone has been making unauthorized use of resources. MINDING YOUR OWN BUSINESS The following are some examples of actions which may be considered as violations of this policy: Browsing and reading the files of another user Deleting the files of another user. Changing or otherwise manipulating the files of another user. Using another's userid to accomplish the above. Using userids to play games or send messages to another. Using either the Sperry or the VAXes system to solicit business. Using either the Sperry or the VAXes to harass other students. This is not a comprehensive list of all the possible violations nor is it to be construed as such.