Marquette University Part I. General Computing Policy Milwaukee, Wisconsin Part II. WiscNet/Internet Policy December 17, 1991 I. Policy on Authorized Use of M.U. Public Computer Systems The use of the facilities of Computer Services are available at no direct charge to all faculty, registered students, and staff for University research, educational purposes, and administrative work only. Persons using computing resources for other than the above stated purposes, such as for outside consulting, or for work for another institution, or person, must apply for a funded/industrial access code, submit a purchase order, and pay for resources at the current rate. All computer clients must use computing equipment, software, and network access in a manner consistent with appropriate University codes of conduct and not prohibited by applicable statutes of the Wisconsin Criminal Code. The unauthorized use of access codes or privileges associated with an access code not assigned to a client, or the reading, copying, altering or destroying of files or software for which the client has not been given authorized access by the owner; the intentional, or negligent altering or destroying of files or software provided by Computer Services, or actions which interfere with computer access by other clients is serious misuse of the system. STUDENTS, UNDERGRADUATE OR GRADUATE, MAY NOT ALLOW ANYONE EXCEPT THE ENDORSER TO USE THE COMPUTER SYSTEMS WITH THEIR ACCESS CODE. All client user access code applications must be endorsed by a member of the faculty or an administrator at the director or department chairperson level, or an administrator designated by them. The person endorsing a project is responsible for direct supervision of all work associated with it. Any resource limit change must be requested by the person who endorsed the project and will be implemented only with the approval of the appropriate C.S.D. Manager. When the nature of a renewable access code changes, such that a new endorser code will result, or when an access code can be deleted before the standard expiration date, C.S.D. should be informed in writing as soon as possible. In the event that C.S.D. observes what we consider to be misuse of the computer resources, we will contact the endorser or their supervisor and recommend one or more of the following actions be taken: o the project be more carefully supervised, o the client be required to pay for computer resources, o the offender be denied access to the system temporarily or permanently, o that appropriate University disciplinary action or civil action be taken. All other appropriate C.S.D. policies, including the use of valid Marquette University identification in order to secure input/output, apply. II. WiscNet/Internet - Policy Policy Statements WiscNet, like CSD and other computing support facilities has formal usage policy statements. Such statements provide information on the purpose of the network, what activities the network is designed to support and general uses. Users are expected to both know the letter of all applicable computing policy statements, as well as be able to discern the spirit of such statements since a complete list of every possible acceptable or unacceptable use would be impractical. Please also refer to the MU mainframe usage policy which is printed in Chapter 1 of the VAX User's Guide and on all access code application forms. Legal Issues WiscNet and the Internet should never be used for purposes intended to incite crime. For example, it is illegal to post a credit card number, a telephone credit card number, or a computer password. In addition, the networks cannot be used for personal profit. For example, do not use a discussion list to advertise items for sale or to solicit business. Copyright is also an important issue. When sharing programs with others over the network, be sure the software is not copyrighted or licensed, or if it is, be sure to secure permission of the copyright holder. Security and Privacy Issues Never consider electronic communications either private or secure. Remember that email messages can be saved indefinitely on the receiving computer. Copies can easily be made and forwarded to others either electronically or on paper. In addition, messages sent to nonexisting or incorrect usernames are delivered to a person designated as Postmaster for either the remote or local site. WiscNet Acceptable Use Policy (June 15, 1990) "The purpose of WiscNet is to advance education, research and public service by assisting in the exchange of information among research and educational institutions by means of high-speed data communication techniques and to assist those institutions in gaining access to scientific and educational resources. The network will support collaborative instruction, research and public service; facilitate access to regional, national and international networks and hence to such resources as supercomputer centers; and generally support the education and research mission of the members. - Use which is consistent with the purposes of WiscNet is acceptable. - Activities in direct support of acceptable use are also acceptable, such as administrative communications, which support the infra- structure needed for education and research. - Use by for-profit organizations for collaborative activities with education and research institutions is acceptable. - Use for commercial and industrial activities is generally not acceptable and may be permitted only when it can be justified under items 1-3 above. - Communications which violate Wisconsin, federal or international laws are not acceptable. - Activities designed to interfere with the ability of other users to make effective use of the network are not acceptable." The above statements of policy are not meant to be exhaustive. The WiscNet Board of Directors is the final authority on questions of acceptable use of the network. Until an issue is resolved, questionable use should be considered "not acceptable." WiscNet member organizations are responsible for seeing that their communities are aware of this acceptable use policy, and that the policy is followed in both letter and spirit. Members are expected to take reasonable measures, given the constraints of technology and management practices, to ensure that traffic entering WiscNet from other networks conforms to this acceptable use policy. Conversely, members are expected to take similar measures to avoid situations where traffic from their organization violates the policies of connecting networks which receive WiscNet traffic. Submitted by: Ann Mallinger, User Services Manager Computer Services Division