"Robert R. Blackmun" Submits: UNC Charlotte Computing Policy Statements Computer Use Policy - UNCC Policy Statement #66 Computing is a vital University resource which may be appropriately used in support of the instructional, research, administrative and public service functions of the University. Examples of such use include: instruction in computer programming; analysis of experimental data; simulation of complex systems; entry, storage and retrieval of research or administrative data; and maintenance of records of University resources and operations. Disruption or obstruction or attempts to disrupt any instructional, research, administrative or service function of the University is a violation of University policies and/or the laws of the State of North Carolina. It is impractical, if not impossible, to provide a computer system which can resist a determined effort to "break" into the system. Experience indicates that most computer abuse violations begin with experimentation designed to learn more about the internal operation of a central computer system. Computing Services will treat such unauthorized experi mentation with central or shared computer systems as computer abuse under University policies and will refer all violations to the appropriate bodies for prosecution. Computer abuse includes, but is not limited to: unauthorized use or tampering with the operation of any of the University's computer systems, including both hardware and software; inspecting, modifying or copying programs or data without the proper authorization or for purposes other than those for which authorization was given; and disrupting or interfering with the legitimate use of the University's computing systems by authorized users. Specific examples of the latter include "camping" on terminals to restrict use by others, invoking computer games during periods when their use is restricted, using unauthorized Usercodes for any purpose, and using Usercodes for purposes other than that for which the Usercode was provided. If there is any doubt about whether a particular action constitutes computer abuse, contact Computing Services. It is the responsibility of the Usercode owner or administrator to ensure that all users of the Usercode are aware of this policy. Computing Services may terminate any Usercode without giving prior notice if such action is considered necessary, for example, to assure continued computer availability to other users. (Approved by the Executive Staff May 23, 1983) Proprietary Software Policy - UNCC Policy Statement #67 The University acquires a substantial portion of its computer software from third party vendors under license agreements which restrict the use of the software to specific computer sytems and which require the University to limit the use and copying of the software. It is a violation of University policy and may be a violation of the laws of the State of North Carolina or the United State for individuals within the University or any external users of the University's computing facilities or ser vices to use or copy any software except as specifically authorized. Computing Services shall maintain an upto-date list showing each soft ware package purchased or licensed by the University (by purchase order number and designating the person responsible for insuring compliance with this policy for the software package). The Division of Business Affairs shall be responsible for notifying Computing Services of additions to the list as new software is acquired. Individuals who are responsible for Usercodes or for computer systems are responsible for ensuring that all users are aware of any restrictions and of their obligations under applicable license agreements, including any specific written authorizations or notices which may be required. Computing Services will also maintain a reference file of license agreements which shall be available for inspection by all members of the University community. The Division of Business Affairs shall assure that a copy of the license agreement is forwarded to Computing Services when the software package is received. In the event that the actions or failure to act of any member of the University community results in any claim or legal action against the University, the University reserves the right to seek compensation or take other appropriate action against the individual or to assist the third party in taking such action. (Approved by the Executive Staff May 23, 1983)