Appropriate Use of Information Systems at Virginia Tech GENERAL PRINCIPLES Access to computer systems and networks owned or operated by Virginia Tech imposes certain responsibilities and obligations and is granted subject to University policies, and local, state, and federal laws. Ap- propriate use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates re- spect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from in- timidation, harassment, and unwarranted annoyance. GUIDELINES In making appropriate use of resources you must: o use resources only for authorized purposes. o protect your userid from unauthorized use. You are responsible for all activities on your userid or system. o access only files and data that are your own, that are publicly available, or to which you have been given authorized access. o use only legal versions of copyrighted software in compliance with vendor license requirements. o be considerate in your use of shared resources. Refrain from monop- olizing systems, overloading networks with excessive data, or wast- ing computer time, connect time, disk space, printer paper, manuals, or other resources. In making appropriate use of resources you must NOT: o use another person's userid, password, files, system or data without permission. o use computer programs to decode passwords or access control informa- tion. o attempt to circumvent or subvert system security measures. o engage in any activity that might be harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files. o use University systems for partisan political purposes, such as us- ing electronic mail to circulate advertising for political candi- dates. o make or use illegal copies of copyrighted software, store such copies on University systems, or transmit them over University net- works. o use mail or messaging services to harass, intimidate, or otherwise annoy another person, for example, by broadcasting unsolicited mes- sages or sending unwanted mail. o waste computing resources, for example, by intentionally placing a program in an endless loop or by printing excessive amounts of pa- per. o use the University's systems for personal gain, for example, by selling access to your userid or by performing work for profit in a manner not authorized by the University. o engage in any other activity that does not comply with the General Principles presented above. ENFORCEMENT The University considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on University systems allegedly related to inappropriate use. Violators are subject to disci- plinary action as prescribed in the honor codes and the student and em- ployee handbooks. Offenders also may be prosecuted under laws including (but not limited to) the Privacy Protection Act of 1974, The Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property, The Virginia Computer Crimes Act, and the Electronic Communications Privacy Act. Access to the text of these laws is available through the Reference Department of the Newman Library.