Draft: Acceptable Use Policy -- 1/27/92 University of San Diego Department of Academic Computing and Department of Information Systems January 1992 The Department of Academic Computing, the Department of Information Systems, and the University of San Diego provide computing resources to students, faculty and staff in support of programs of the University. Computing resources include local area networks and connections to other computer networks -- specifically, but not exclusively, the Internet and BITNET. All students, faculty, and staff are responsible for seeing that computing resources are used in an effective, ethical, and lawful manner. The University disclaims responsibility for the loss of data or interference with files resulting from its efforts to maintain the privacy and security of the University's computer facilities. The following policies relate to the use of Department of Academic Computing and Department of Information Systems facilities.1 These policies are in addition to existing University policies on plagiarism and appropriate use of facilities. 1. Computer facilities are owned by the University or department and are to be used for department-related or appropriate professional activities only. Facilities will not be used for non-University sanctioned commercial purposes or the installation of fraudulently or illegally obtained software or data. 2. An account assigned to an individual by the department must not be used by others. The individual is responsible for the proper use of the account, including password protection. The individual must take all reasonable precautions, including password maintenance and file and directory protection measures, to prevent use of their account by unauthorized persons. 3. Programs and files are confidential unless they have explicitly been made available to other authorized users. Copying, renaming, changing, examining, or deleting files belonging to someone else is against policy. department faculty and staff may access others' files when necessary for the maintenance of the computing facilities. When performing maintenance, however, every effort will be made to insure the privacy of users' files. 4. Departmental computing resources, including electronic mail and other electronic communication, will not be used to annoy others. It is against policy to send obscene, abusive, or threatening messages. 5. Attempts to bypass standard procedures are not allowed. This includes, but is not limited to, attempts to discover another user's password, taking resources from other users, distribution or execution of a program that damages another user's files or departmental computing resources, and gaining access to resources for which proper authorization has not been given. 6. Physical tampering with departmental resources is not allowed. 7. Users will not deliberately attempt to degrade system performance or to deprive authorized users access to departmental computing resources. Failure to comply with the above guidelines shall constitute a violation of department policy and may subject the violator to disciplinary or legal action by the department or University. In addition, the University may require restitution for any use of computing resources that is in violation of the above guidelines. Users of departmental computing resources are also subject to local, state, and federal laws. 1 A possible alternative to the previous sentence is the following: "The following policies relate to the use of Departmental facilities."